Access control is one of the key requirements in enterprise security. A number of approaches in distributed systems have been designed that support various (new) paradigms such as...
Pascal Fenkam, Schahram Dustdar, Engin Kirda, Gera...
Many agent-based systems have been developed over the past decade; however, the security issues are usually not addressed adequately. In order to make the mobile agent paradigm mo...
The need for content access control in hierarchies (CACH) appears naturally in all contexts where a set of users have different access rights to a set of resources. The hierarchy...
H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Be...
Shen and Chen proposed a novel key management scheme for dynamic access control in a hierarchy. In this article, the authors shall present an improved version of Shen and Chen’s...
In group communication, users often have different access rights to multiple data streams. Based on the access relation of users and data streams, users can form partially ordered...