Zobrazeno 1 - 10
of 95
pro vyhledávání: '"Winsborough, William H."'
We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then we address
Externí odkaz:
http://arxiv.org/abs/cs/0503061
Publikováno v:
Journal of the ACM; May2005, Vol. 52 Issue 3, p474-514, 41p
Publikováno v:
Journal of Computer Security. 2003, Vol. 11 Issue 1, p35. 52p.
Autor:
Finin, Tim, Joshi, Anupam, Kagal, Lalana, Niu, Jianwei, Sandhu, Ravi, Winsborough, William H., Thuraisingham, Bhavani
Proceedings of the 13th Symposium on Access control Models and Technologies
There have been two parallel themes in access control research in recent years. On the one hand there are efforts to develop new access control models to meet the policy
There have been two parallel themes in access control research in recent years. On the one hand there are efforts to develop new access control models to meet the policy
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4947a4caeb495653be5b6d499eae80af
Autor:
Finin, Tim, Joshi, Anupam, Kagal, Lalana, Niu, Jianwei, Sandhu, Ravi, Winsborough, William H., Thuraisingham, Bhavani
Current access control research follows two parallel themes: many efforts focus on developing novel access control models meeting the policy needs of real world application domains while others are exploring new policy languages. This paper is motiva
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::76d25805a49f5388bb341cb27d82b0a4
Trust Management (TM) is a novel flexible approach to access control in distributed systems, where the access control decisions are based on the policy statements, called credentials, made by different principals and stored in a distributed manner. I
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::4386987d7b0f6797f12e3e867a9b263e
https://research.tue.nl/nl/publications/93f71aba-240d-41dd-9d6d-705e8d64417c
https://research.tue.nl/nl/publications/93f71aba-240d-41dd-9d6d-705e8d64417c
Publikováno v:
STARTPAGE=1;ENDPAGE=10;TITLE=10th ACM Symp. on Access Control Models and Technologies (SACMAT)
We introduce the use, monitoring, and enforcement of integrity constraints in trust managementstyle authorization systems. We consider what portions of the policy state must be monitored to detect violations of integrity constraints. Then we address
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::ea4d02a02d6da9ea4ce1eec08b3a4443
https://research.utwente.nl/en/publications/integrity-constraints-in-trust-management-extended-abstract(cc258d19-41a0-49d3-a61d-4122f4ea1de1).html
https://research.utwente.nl/en/publications/integrity-constraints-in-trust-management-extended-abstract(cc258d19-41a0-49d3-a61d-4122f4ea1de1).html
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Proceedings of the Second ACM Conference Data & Application Security & Privacy; 2/7/2012, p149-156, 8p
Autor:
Pontual, Murillo, Gampe, Andreas, Chowdhury, Omar, Kone, Bazoumana, Ashik, Md. Shamim, Winsborough, William H.
Publikováno v:
Proceedings of the Second ACM Conference Data & Application Security & Privacy; 2/7/2012, p133-140, 8p