|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
SS, KBSE |
2013-07-26 11:40 |
Hokkaido |
|
A Context Representation for Access Control Models by using Object-oriented Petri Nets Tadashi Iijima (Keio Univ.) SS2013-27 KBSE2013-27 |
This paper describes a proposal to adopt
a nets-within-nets semantics based object-oriented petri net model as
a con... [more] |
SS2013-27 KBSE2013-27 pp.85-90 |
SS |
2010-12-14 17:30 |
Gunma |
Ikaho-Onsen Hotel Tenbo |
Secure User-Role Assignment in Cross-Organizational Role-Based Access Control Yuki Tomotani, Yuichi Kaji, Hiroyuki Seki (NAIST) SS2010-46 |
This paper proposes a mechanism for representing user-role assignments
of the role-based access control (RBAC) system. ... [more] |
SS2010-46 pp.43-48 |
ISEC |
2009-12-16 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Redesigning of a role hierarchy for role-based access control Yoshiharu Asakura (NEC/Univ. of Hyogo), Yukikazu Nakamoto (Univ. of Hyogo) ISEC2009-79 |
Role-based access control (RBAC) is widely used as an access control mechanism in various computer systems. A role graph... [more] |
ISEC2009-79 pp.57-63 |
DE |
2007-07-02 13:55 |
Miyagi |
Akiu hot springs (Sendai) |
A Role Distribution Method for RBAC and its Implementation to Smart Card Management Seiichi Kondo (Mitsubishi Electric Corp./Kyoto Univ.), Mizuho Iwaihara, Masatoshi Yoshikawa (Kyoto Univ.), Takashi Komiya, Toshihisa Onuma, Koichi Yamada (Mitsubishi Electric Corp.) DE2007-23 |
Role-Bases Access Control has emerged as an implementation model for
users and access contol administration in enterpri... [more] |
DE2007-23 pp.7-12 |
KBSE, JSAI-KBS |
2005-01-24 16:00 |
Kanagawa |
Keio University |
XML-Based Access Control Protocol and Temporal Constraints for Business Kazushi Tanihira, Hiromi Kobayashi (Tokai Univ.) |
This paper first presents basic temporal markup language (BTML) to describe an access control list (ACL) involving tempo... [more] |
KBSE2004-32 pp.49-54 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|