Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large user and resource pools, administering the access control based on any framework could in itself be a daunting task. This work presents X-GTRBAC Admin, an administration model that aims at enabling policy administration within a large enterprise. In particular, it simplifies the process of user-to-role and permission-to-role assignments, and thus allows decentralization of the policy administration tasks. Secondly, it also allows for specifying the domain of authority of the system administrators, and hence provides mechanism to distribute the administrative author...
Access control (AC) is a necessary defense against a large variety of security attacks on the resour...
Abstract. Applications are continuously increasing in both complex-ity and number of users they serv...
Since its emergence in the early 1990s, role-based access control (RBAC) has gained more and more po...
Access control in enterprises is a key research area in the realm of Computer Security because of th...
Access control in enterprises is a key research area in the realm of Computer Security because of th...
Modern day enterprises exhibit a growing trend toward adoption of enterprise computing services for ...
Modern day enterprises exhibit a growing trend toward adoption of enterprise computing services for ...
A key issue in computer system security is to protect information against unauthorized access. Emerg...
We outline a framework for specifying management roles which defines both authorisation and obligati...
Administration of an access control model deals with the question of who is authorized to update pol...
Federated systems are an emerging paradigm for information sharing and integration. Such systems req...
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource ma...
AbstractOne of the most important characteristics of current enterprise systems is the existence of ...
Abstract. Security of an information system is becoming an increas-ingly critical issue. Access cont...
Abstract—The fast evolving workflow technologies facilitate organizations to interact and cooperate ...
Access control (AC) is a necessary defense against a large variety of security attacks on the resour...
Abstract. Applications are continuously increasing in both complex-ity and number of users they serv...
Since its emergence in the early 1990s, role-based access control (RBAC) has gained more and more po...
Access control in enterprises is a key research area in the realm of Computer Security because of th...
Access control in enterprises is a key research area in the realm of Computer Security because of th...
Modern day enterprises exhibit a growing trend toward adoption of enterprise computing services for ...
Modern day enterprises exhibit a growing trend toward adoption of enterprise computing services for ...
A key issue in computer system security is to protect information against unauthorized access. Emerg...
We outline a framework for specifying management roles which defines both authorisation and obligati...
Administration of an access control model deals with the question of who is authorized to update pol...
Federated systems are an emerging paradigm for information sharing and integration. Such systems req...
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource ma...
AbstractOne of the most important characteristics of current enterprise systems is the existence of ...
Abstract. Security of an information system is becoming an increas-ingly critical issue. Access cont...
Abstract—The fast evolving workflow technologies facilitate organizations to interact and cooperate ...
Access control (AC) is a necessary defense against a large variety of security attacks on the resour...
Abstract. Applications are continuously increasing in both complex-ity and number of users they serv...
Since its emergence in the early 1990s, role-based access control (RBAC) has gained more and more po...