There would seem to be a natural connection between graphs and information security. This is particularly so in the arena of access control and authorization. Research on applying ...
A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with both subjects...
Francis B. Afinidad, Timothy E. Levin, Cynthia E. ...
A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with subjects and...
Francis B. Afinidad, Timothy E. Levin, Cynthia E. ...
Role-based access control has been a focal area for many security researchers over the last decade. There have been a large number of models, and many rich specification language...
The IEEE 802.11 standard for medium access control in wireless local area networks has been adopted as the de-facto medium access control standard in multi-hop wireless networks. I...