Security polices in accounting systems are always related with the active contexts, including times, locations, user trust levels, and the properties of data objects. We analyzed the multiformities of constraints in the access control model and present a context-constraint access control model and security polices. Contexts in the security field of applications can be classified into subject contexts, role contexts, object contexts, environment contexts and history contexts. They have different data types and can be evaluated through context functions. Context constraints can be used to describe the security polices concerned to data objects in complex accounting systems. A conceptual structure extended from the simple access control model ...
A key issue in computer system security is to protect information against unauthorized access. Emerg...
We show how a range of role-based access control (RBAC) models may be usefully represented as constr...
Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote se...
As computer infrastructures become more complex, security models must provide means to handle more f...
The role-based access control (RBAC) has become the widely used access control system for providing ...
In the present age, context-awareness is an important aspect of the dynamic environments and the dif...
Department Head: L. Darrell Whitley.2010 Summer.Includes bibliographical references.With the growing...
International audienceSecuring the access to a server, guaranteeing a certain level of protection ov...
AbstractConfidentiality of information is an important aspect that developers should take into consi...
International audienceThe successful deployment of a security policy is closely related not only to ...
Abstract. To date, no methodical approach has been found to integrate multiple access control extens...
International audienceIn conventional security systems, protected resources such as documents, hardw...
Coordenação de Aperfeiçoamento de Pessoal de Nível SuperiorA model of access control aims to limit t...
Abstract. This paper focuses on problems of access control for business processes. The subject of th...
Abstract. The universal adoption of the Internet requires a fine grained access control in the shari...
A key issue in computer system security is to protect information against unauthorized access. Emerg...
We show how a range of role-based access control (RBAC) models may be usefully represented as constr...
Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote se...
As computer infrastructures become more complex, security models must provide means to handle more f...
The role-based access control (RBAC) has become the widely used access control system for providing ...
In the present age, context-awareness is an important aspect of the dynamic environments and the dif...
Department Head: L. Darrell Whitley.2010 Summer.Includes bibliographical references.With the growing...
International audienceSecuring the access to a server, guaranteeing a certain level of protection ov...
AbstractConfidentiality of information is an important aspect that developers should take into consi...
International audienceThe successful deployment of a security policy is closely related not only to ...
Abstract. To date, no methodical approach has been found to integrate multiple access control extens...
International audienceIn conventional security systems, protected resources such as documents, hardw...
Coordenação de Aperfeiçoamento de Pessoal de Nível SuperiorA model of access control aims to limit t...
Abstract. This paper focuses on problems of access control for business processes. The subject of th...
Abstract. The universal adoption of the Internet requires a fine grained access control in the shari...
A key issue in computer system security is to protect information against unauthorized access. Emerg...
We show how a range of role-based access control (RBAC) models may be usefully represented as constr...
Abstract. As mobile computing continues to rise, users are increasingly able to connect to remote se...