Abstract--As the information flowing around in social networking systems is mainly related or can be attributed to their users, controlling access to such information by individual...
We argue that games are expressive enough to encompass (history-based) access control, (resource) usage control (e.g., dynamic adaptive access control of reputation systems), acco...
Abstract. This paper proposes a door access control system with mobile phones which allows off-line delegations of an access. A model of door access control with mobile phones is ...
In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
Abstract. We consider the interpretations of notions of access control (permissions, interdictions, obligations, and user rights) as run-time properties of information systems spec...