Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,293,887 papers from all fields of science
Search
Sign In
Create Free Account
Organisation-based access control
Known as:
OrBAC
In computer security, organization-based access control (OrBAC) is an access control model first presented in 2003. The current approaches of the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
15 relations
Access control
Access control list
Bell–LaPadula model
Capability-based security
Expand
Broader (1)
Computer access control
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Dynamic Delegation Based on Temporal Context
Ouarda Bettaz
,
Boustia Narhimene
,
A. Mokhtari
International Conference on Knowledge-Based…
2016
Corpus ID: 46499314
2010
2010
Firewall Configuration based on Specifications of Access Policy and Network Environment
A. Titov
,
V. Zaborovsky
Security and Management
2010
Corpus ID: 17712957
A network firewall is a widespread means to enforce a security policy, however it remains a network device. Such a duality has…
Expand
2010
2010
Watermarking to Enforce Medical Image Access and Usage Control Policy
Wei Pan
,
G. Coatrieux
,
N. Cuppens-Boulahia
,
F. Cuppens
,
C. Roux
Sixth International Conference on Signal-Image…
2010
Corpus ID: 2958542
In this paper, we propose integrating watermarking technology and access control model in order to enhance the protection of…
Expand
2009
2009
Reaction Policy Model Based on Dynamic Organizations and Threat Context
F. Autrel
,
N. Cuppens-Boulahia
,
F. Cuppens
Database Security
2009
Corpus ID: 10581682
The tasks a system administrator must fulfill become more and more complex as information systems increase in complexity and…
Expand
2008
2008
Mutating DAC and MAC Security Policies: A Generic Metamodel Based Approach
Tejeddine Mouelhi
,
Franck Fleurey
,
B. Baudry
,
Y. L. Traon
MODSEC@MoDELS
2008
Corpus ID: 1232781
In this paper we show how DAC and MAC security policies can be specified, implemented and validated through mutation testing…
Expand
2008
2008
Deploying Access Control in Distributed Workflow
S. Ayed
,
N. Cuppens-Boulahia
,
F. Cuppens
Artificial Intelligence and Symbolic Computation
2008
Corpus ID: 6243647
Workflows are operational business processes. Workfow Management Systems (WFMS) are concerned with the control and coordination…
Expand
2007
2007
An Integrated Model for Access Control and Information Flow Requirements
S. Ayed
,
N. Cuppens-Boulahia
,
F. Cuppens
Asian Computing Science Conference
2007
Corpus ID: 12909627
Current information systems are more and more complex. They require more interactions between different components and users. So…
Expand
2007
2007
Multi-Granular Licences to Decentralize Security Administration
F. Cuppens
,
N. Cuppens-Boulahia
,
C. Coma
2007
Corpus ID: 12678369
There has been for several years a growing interest in defining new access control models and administration facilities for these…
Expand
2007
2007
Integration of Security Policy into System Modeling
Nazim Benaïssa
,
Dominique Cansell
,
D. Méry
Formal Specification and Development in B
2007
Corpus ID: 37018146
We address the proof-based development of (system) models satisfying a security policy. The security policy is expressed in a…
Expand
2005
2005
Dynamic creation of inter-organizational grid virtual organizations
B. Nasser
,
R. Laborde
,
A. Benzekri
,
F. Barrère
,
M. Kamel
IEEE International Conference on e-Science
2005
Corpus ID: 7881486
The grid has emerged as a platform that enables inter-organizational Internet-based collaborations in a sharing space called…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE