Zobrazeno 1 - 10
of 35
pro vyhledávání: '"Fong, Philip W. L."'
Autor:
Zhang, Si, Fong, Philip W. L.
This paper proposes a computational model for policy administration. As an organization evolves, new users and resources are gradually placed under the mediation of the access control model. Each time such new entities are added, the policy administr
Externí odkaz:
http://arxiv.org/abs/2401.00086
Autor:
Zhang, Si, Fong, Philip W. L.
Protection domains are one of the most enduring concepts in Access Control. Entities with identical access control characteristics are grouped under the same protection domain, and domain-based policies assign access privileges to the protection doma
Externí odkaz:
http://arxiv.org/abs/2312.15596
Controlled sharing is fundamental to distributed systems. We consider a capability-based distributed authorization system where a client receives capabilities (access tokens) from an authorization server to access the resources of resource servers. C
Externí odkaz:
http://arxiv.org/abs/2211.04980
Event-based systems lie at the heart of many cloud-based Internet-of-Things (IoT) platforms. This combination of the Broker architectural style and the Publisher-Subscriber design pattern provides a way for smart devices to communicate and coordinate
Externí odkaz:
http://arxiv.org/abs/1809.10134
Autor:
Fong, Philip W. L.
First proposed by Wang and Li in 2007, workflow resiliency is a policy analysis for ensuring that, even when an adversarial environment removes a subset of workers from service, a workflow can still be instantiated to satisfy all the security constra
Externí odkaz:
http://arxiv.org/abs/1809.10106
Permissions are highly sensitive in Internet-of-Things (IoT) applications, as IoT devices collect our personal data and control the safety of our environment. Rather than simply granting permissions, further constraints shall be imposed on permission
Externí odkaz:
http://arxiv.org/abs/1804.00086
Inspired by the access control models of social network systems, Relationship-Based Access Control (ReBAC) was recently proposed as a general-purpose access control paradigm for application domains in which authorization must take into account the re
Externí odkaz:
http://arxiv.org/abs/1503.06154
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Fong, Philip W. L.1 pwlfong@cs.uregina.ca
Publikováno v:
International Journal of Information Security. Apr2008, Vol. 7 Issue 2, p137-154. 18p. 13 Diagrams.