Showing 1 - 14 results of 14 for search '"access control"', query time: 0.07s Refine Results
  1. 1

    The formalisation and transformation of access control policies by Slaymaker, M, Mark Slaymaker

    Published 2011
    “…Each data owner will have access control policies that are carefully crafted and understood --- defined in terms of the access control representation that they use, which may be very different from the model of access control utilised by other data owners or by the technology facilitating the data sharing. …”
    Thesis
  2. 2

    Conformance Checking of Dynamic Access Control Policies by Power, D, Slaymaker, M, Simpson, A

    Published 2011
    “…The capture, deployment and enforcement of appropriate access control policies are crucial aspects of many modern software-based systems. …”
    Journal article
  3. 3
  4. 4

    Evolving access control: formal models and analysis by Sieunarine, C, Clint Sieunarine

    Published 2011
    “…Traditionally, approaches to access control have fallen into one of two categories: discretionary access control (DAC) or mandatory access control (MAC). …”
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8

    On Formalizing and Normalizing Role-Based Access Control Systems by Power, D, Slaymaker, M, Simpson, A

    Published 2009
    “…Role-based access control (RBAC) has emerged as the dominant access control paradigm for service-oriented systems, with this dominance being reflected by the popularity of RBAC both with the research community and with information technology vendors. …”
    Journal article
  9. 9
  10. 10
  11. 11
  12. 12

    On the need for user-defined fine-grained access control policies for social networking applications by Simpson, A

    Published 2008
    “…Specifically, we concern ourselves with authorisation, and argue that members of such social networks should have the opportunity to construct fine-grained access control policies that meet their particular requirements and circumstances, and, in addition, should be able to observe appropriate audit information.…”
    Journal article
  13. 13
  14. 14

    Securing web services for deployment in health grids by Power, D, Politou, E, Slaymaker, M, Simpson, A

    Published 2006
    “…In this paper we describe an approach to the facilitation of system-wide security that enables fine-grained access control within systems in which third party web services are deployed. …”
    Journal article