Proceedings of ... ACM Symposium on Access Control Models and Technologies: SACMAT ...Association for Computing Machinery, 2005 - Computers |
Contents
Applications | 10 |
for a ServiceBased Geospatial Data Infrastructure | 21 |
Access Control Model I | 29 |
Copyright | |
15 other sections not shown
Other editions - View all
Common terms and phrases
AC-XML document access control models access control policies access purpose access request Accesses element algorithm annotated application approach authorization constraints Bertino cluster Computer credentials database defined DEFINITION denoted domain element types enforcement evaluated example false positives feature type Figure GEO-RBAC geometry IBAC IEEE intended purpose interoperability label mapping minimal perfect hash node object attributes operation path perfect hash functions performed permissions platform proposed protection query r.nodes r₁ RBAC reference monitor relation relevancy requirements restr restriction revocation role activation role hierarchy role schema Role-Based Access Control Sandhu satisfied security view separation of duty sequence diagram server set of users signGRN spatial role specification t₁ target task tion trust negotiation u₁ update URAG(W user attributes user's valid execution assignment version edges workflow workflow authorization XACML XML documents XPath