Showing 61 - 70 of 25,455
Persistent link: https://www.econbiz.de/10012271210
Persistent link: https://www.econbiz.de/10012503570
Persistent link: https://www.econbiz.de/10011719156
Persistent link: https://www.econbiz.de/10014307565
<Para ID="Par2">In the paper, an integrated approach for the modeling and enforcement of delegation policies in process-aware information systems is presented. In particular, a delegation extension for process-related role-based access control (RBAC) models is specified. The extension is generic in the sense...</para>
Persistent link: https://www.econbiz.de/10011001385
an untrusted service provider. We explore the limits of the security that is achievable in these scenarios. When … discussing security, we refer to the state of the art definitions from cryptography and complexity theory. The key contributions … prove its correctness and security. - We describe a new searchable encryption scheme that exceeds existing analogues with …
Persistent link: https://www.econbiz.de/10009467071
Collaborative and distributed applications, such as dynamic coalitions and virtualized grid computing, often require integrating access control policies of collaborating parties. Such an integration must be able to support complex authorization specifications and the fine-grained integration...
Persistent link: https://www.econbiz.de/10009430789
Persistent link: https://www.econbiz.de/10012256829
Nowadays, Cloud Computing is considered one of the important fields in both research and industry. Users enjoy membership of cloud providing effective services called time-limited services. This paper addresses time-limited services offering an attribute-based access control method and...
Persistent link: https://www.econbiz.de/10012045683
shows an approach that provides all the benefits of modern technological advances in the fields of biometrics and …
Persistent link: https://www.econbiz.de/10009416786