Role-based access control has been a focal area for many security researchers over the last decade. There have been a large number of models, and many rich specification language...
In this paper we analyze the requirements access control mechanisms must fulfill in the context of group communication and define a framework for supporting fine-grained access co...
This paper studies the connectivity maintenance problem in linear and nonlinear cyclic pursuit, when different control gains are assigned to each agent. Feasibility/infeasibility c...
Fabio Morbidi, Antonio Giannitrapani, Domenico Pra...
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capab...
: Role-based access control associates roles with privileges and users with roles. Changes to these associations are infrequent and explicit. This may not reflect business requirem...
Damian G. Cholewka, Reinhardt A. Botha, Jan H. P. ...