Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Crampton, Jason Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 2 of 2 reviews    
  Practical and efficient cryptographic enforcement of interval-based access control policies
Crampton J. ACM Transactions on Information and System Security 14(1): 1-30, 2011.  Type: Article

Cryptography-based hierarchical access control has received considerable attention, particularly in recent years. Since its conception, various enforcement schemes have been proposed that address the performance issues and various acce...
...
Dec 12 2011  
  Administrative scope: A foundation for role-based administrative models
Crampton J., Loizou G. ACM Transactions on Information and System Security 6(2): 201-231, 2003.  Type: Article

Role-based access control (RBAC) is a modeling framework for operating system access control policies, in which users are assigned to roles, and roles are assigned permissions to perform system-specific operations. The user-permission-...
...
Aug 5 2003  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy