Sciweavers

221 search results - page 18 / 45
» Delegation in Role-Based Access Control
Sort
View
POLICY
2004
Springer
14 years 4 months ago
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
We study the speciļ¬cation of access control policy in large-scale distributed systems. Our work on real-world policies has shown that standard policy idioms such as role hierarc...
Moritz Y. Becker, Peter Sewell
CONCUR
2010
Springer
14 years 17 hour ago
Session Types for Access and Information Flow Control
We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both sessi...
Sara Capecchi, Ilaria Castellani, Mariangiola Deza...
EJWCN
2010
118views more  EJWCN 2010»
13 years 5 months ago
Controlled Delegation Protocol in Mobile RFID Networks
To achieve off-line delegation for mobile readers, we propose a delegation protocol for mobile RFID allowing its readers access to specific tags through back-end server. That is t...
Ming-Hour Yang
DEON
2008
Springer
14 years 21 days ago
Variations in Access Control Logic
Abstract. In this paper we investigate the design space of access control logics. Specifically, we consider several possible axioms for the common operator says. Some of the axioms...
Martín Abadi
SACMAT
2003
ACM
14 years 4 months ago
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBACā...
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Ber...