Trust management credentials directly authorize actions, rather than divide the authorization task into authentication and access control. Unlike traditional credentials, which bi...
Stefan Miltchev, Vassilis Prevelakis, Sotiris Ioan...
The per-method access control lists of standard middleware technologies allow only simple forms of access control to be expressed and enforced. Given the increasing use of webbase...
We study the portfolio selection problem of an investor who can optimally exert costly effort for more income. The possibility of generating more income, if necessary, increases ...
Jaksa Cvitanic, Levon Goukasian, Fernando Zapatero
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...