45 pages matching algorithm in this book
Results 1-3 of 45
What people are saying - Write a review
We haven't found any reviews in the usual places.
Declaration and Enforcement of FineGrained Access Restrictions
A Reference Monitor for Workflow Systems with Constrained Task Execution
7 other sections not shown
AC-XML document access control lists access control models access control policies access purpose access request Accesses element algorithm annotated application approach authorization constraints Bertino cluster Computer Computer Security conditional delegation credentials database defined Definition delegation rules denoted domain element types enforcement entailment constraints evaluated example feature type Figure function GEO-RBAC geometry IBAC IEEE intended purpose interoperability label node object operation path perfect hash functions performed permissions platform policy class position proposed protection query RBAC reference monitor relation relevancy requirements restr restriction revocation role extent role hierarchy role schema Role-Based Access Control Sandhu satisfied security view separation of duty sequence diagram server set of roles set of users signGRN spatial role specification subject attribute subtree target task tion trust negotiation update URAG(W user attributes user's valid execution assignment version edges workflow workflow authorization XACML XML documents XPath