Abstract. Existing Peer to Peer (P2P) collaborative editing systems do not allow any user to undo any modification. However, in such systems, users are not aware of others’ modi...
—Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the pol...
In this paper, we present the design and implementation of and interdisciplinary research project involving an intelligent agent-based framework for collaborative e-commerce appli...
Xiaojun Shen, Shervin Shirmohammadi, Chris Desmara...
We present a simple, yet powerful, approach for the specification and enforcement of authorizations regulating data release among data holders collaborating in a distributed comp...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
Abstract. Some security problems can be often solved through authorization rather than authentication. Furthermore, certificate-based authorization approach can alleviate usual dr...