Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large user and resource pools, administering the access control based on any framework could in itself be a daunting task. This work presents X-GTRBAC Admin, an administration model that aims at enabling policy administration within a large enterprise. In particular, it simplifies the process of user-to-role and permission-to-role assignments, and thus allows decentralization of the policy administration tasks. Secondly, it also allows for specifying the domain of authority of the system administrators, and hence provides mechanism to distribute the administrative author...
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource ma...
Since its emergence in the early 1990s, role-based access control (RBAC) has gained more and more po...
Applications are continuously increasing in both complexity and number of users they serve. Moreover...
Access control in enterprises is a key research area in the realm of Computer Security because of th...
Access control in enterprises is a key research area in the realm of Computer Security because of th...
Modern day enterprises exhibit a growing trend toward adoption of enterprise computing services for ...
Modern day enterprises exhibit a growing trend toward adoption of enterprise computing services for ...
A key issue in computer system security is to protect information against unauthorized access. Emerg...
We outline a framework for specifying management roles which defines both authorisation and obligati...
Administration of an access control model deals with the question of who is authorized to update pol...
Federated systems are an emerging paradigm for information sharing and integration. Such systems req...
AbstractOne of the most important characteristics of current enterprise systems is the existence of ...
Access control (AC) is a necessary defense against a large variety of security attacks on the resour...
Abstract—The fast evolving workflow technologies facilitate organizations to interact and cooperate ...
Abstract. Security of an information system is becoming an increas-ingly critical issue. Access cont...
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource ma...
Since its emergence in the early 1990s, role-based access control (RBAC) has gained more and more po...
Applications are continuously increasing in both complexity and number of users they serve. Moreover...
Access control in enterprises is a key research area in the realm of Computer Security because of th...
Access control in enterprises is a key research area in the realm of Computer Security because of th...
Modern day enterprises exhibit a growing trend toward adoption of enterprise computing services for ...
Modern day enterprises exhibit a growing trend toward adoption of enterprise computing services for ...
A key issue in computer system security is to protect information against unauthorized access. Emerg...
We outline a framework for specifying management roles which defines both authorisation and obligati...
Administration of an access control model deals with the question of who is authorized to update pol...
Federated systems are an emerging paradigm for information sharing and integration. Such systems req...
AbstractOne of the most important characteristics of current enterprise systems is the existence of ...
Access control (AC) is a necessary defense against a large variety of security attacks on the resour...
Abstract—The fast evolving workflow technologies facilitate organizations to interact and cooperate ...
Abstract. Security of an information system is becoming an increas-ingly critical issue. Access cont...
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource ma...
Since its emergence in the early 1990s, role-based access control (RBAC) has gained more and more po...
Applications are continuously increasing in both complexity and number of users they serve. Moreover...