Quantcast
Channel: Publications of the Laboratory for Education and Research in Secure Systems Engineering (LERSSE)
Browsing latest articles
Browse All 11 View Live

A Method for Assessing the Trustworthiness of an Entity by Cooperating...

In this thesis a Model of Trust based on Bayesian Networks is introduced. The model determines the trustworthiness of a new or hitherto unknown entity by utilizing information exchanged with...

View Article



A Framework for Implementing Role-based Access Control Using CORBA Security...

The paper shows how role-based access control (RBAC) models could be implemented using CORBA Security service. A configuration of CORBA protection system is defined. We provide definitions of RBAC0 and...

View Article

A Framework for Implementing Role-based Access Control Using CORBA Security...

The presentation shows how role-based access control (RBAC) models could be implemented using CORBA Security service. A configuration of CORBA protection system is defined. We provide definitions of...

View Article

Future Direction of Access Control Models, Architectures, and Technologies

The goal of this panel is to explore future directions in the research and practice of Access Control Models, Architectures, and Technologies (ACMAT). The panelists will offer their (speculative)...

View Article

Recycling Authorizations: Toward Secondary and Approximate Authorizations...

In large and complex enterprises, obtaining authorizations could be communicationally and/or computationally expensive, and, due to infrastructure failures, some times even impossible. This paper...

View Article


Requirements for Access Control: US Healthcare Domain

Roles are important factors in authorization rules. However, other information is essential in order to make authorization decisions at healthcare enterprises. An effective authorization language that...

View Article

Requirements for Access Control: US Healthcare Domain

Roles are important factors in authorization rules. However, other information is essential in order to make authorization decisions at healthcare enterprises. An effective authorization language that...

View Article

Supporting Relationships in Access Control Using Role Based Access Control

The Role Based Access Control (RBAC) model and mechanism have proven to be useful and effective. This is clear from the many RBAC implementations in commercial products. However, there are many common...

View Article


The Secondary and Approximate Authorization Model and its Application to...

The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures, with security enforcement logic obtaining decisions from authorization servers...

View Article


Employing Secondary and Approximate Authorizations to Improve Access Control...

The request-response paradigm used for developing access control solutions commonly leads to point-to-point (PTP) architectures, with security enforcement logic obtaining decisions from authorization...

View Article

Support for ANSI RBAC in CORBA

We describe access control mechanisms of the Common Ob ject Request Broker Architecture (CORBA) and define a configuration of the CORBA protection system in more precise and less ambiguous language...

View Article
Browsing latest articles
Browse All 11 View Live




Latest Images