Abstract. Currently, the major focus on the network security is securing individual components as well as preventing unauthorized access to network service. In this paper, we propo...
Access-control policies have grown from simple matrices to non-trivial specifications written in sophisticated languages. The increasing complexity of these policies demands corres...
Daniel J. Dougherty, Kathi Fisler, Shriram Krishna...
A significant opportunity presented by the availability of high-speed network access in the classroom is the ability to collaborate with remote students and mentors. To be success...
Philip L. Isenhour, John M. Carroll, Dennis C. Nea...
We present a risk management framework which allows to reason about and manage risk for role based access control systems. The framework expresses essential characteristics of risk...
Controlling access to resources is one of the most important protection goals for web-based services in practice. In general, access control requires identification of subjects t...