Role-based access policies model the users domain by means of complex structures where roles, which represent jobs or responsibilities assumed by users, are specialized into more concrete subroles which inherit properties and authorizations from their parents. Such an approach can be applied within the context of educational applications, where different roles are easily identified each of which has different views of the same information items and different capabilities to modify them. Moreover, even though this approach, has only been oriented towards modeling security requirements, it can be extended to support personalized access to the information. In this paper, we describe how to combine the basic principles of RBAC policies and adap...
In the 21st century, the network of teaching management not only improves its quality and efficiency...
The definition of security policies in information systems and programming applications is often acc...
Abstract This article introduces a family of reference models for role-based access control (RBAC) i...
Role-based access policies model the users domain by means of complex structures where roles, which ...
Role-based access policies model the users domain by means of complex structures where roles, which ...
A role based authorization program (RBAP) is a logic based framework which supports administrative p...
Researches on access control models have been conducted on a diversity of application areas. For tho...
We present an approach based on roles and access policies to improve security management of Web appl...
Motivated by the need to manage and enforce the strong access control technology of Web environments...
We present a role-based access control (RBAC) mechanism for a Web Services based data integration sy...
This paper presents RBACvisual, a user-level visualization tool designed to facilitate the study and...
Existing software systems designed to support learning do not adequately provide for vicarious learn...
This paper describes a policy driven role based access control system. The user's roles, and the po...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
The definition of security policies in information systems and programming applications is often acc...
In the 21st century, the network of teaching management not only improves its quality and efficiency...
The definition of security policies in information systems and programming applications is often acc...
Abstract This article introduces a family of reference models for role-based access control (RBAC) i...
Role-based access policies model the users domain by means of complex structures where roles, which ...
Role-based access policies model the users domain by means of complex structures where roles, which ...
A role based authorization program (RBAP) is a logic based framework which supports administrative p...
Researches on access control models have been conducted on a diversity of application areas. For tho...
We present an approach based on roles and access policies to improve security management of Web appl...
Motivated by the need to manage and enforce the strong access control technology of Web environments...
We present a role-based access control (RBAC) mechanism for a Web Services based data integration sy...
This paper presents RBACvisual, a user-level visualization tool designed to facilitate the study and...
Existing software systems designed to support learning do not adequately provide for vicarious learn...
This paper describes a policy driven role based access control system. The user's roles, and the po...
The basic concept of role-based access control (RBAC) is that permissions are associated with roles,...
The definition of security policies in information systems and programming applications is often acc...
In the 21st century, the network of teaching management not only improves its quality and efficiency...
The definition of security policies in information systems and programming applications is often acc...
Abstract This article introduces a family of reference models for role-based access control (RBAC) i...