Sciweavers

374 search results - page 8 / 75
» Managing Delegation in Access Control Models
Sort
View
139
Voted
ISW
2004
Springer
15 years 9 months ago
Model-Checking Access Control Policies
We present a model of access control which provides fine-grained data-dependent control, can express permissions about permissions, can express delegation, and can describe syste...
Dimitar P. Guelev, Mark Ryan, Pierre-Yves Schobben...
EUROSEC
2009
ACM
15 years 10 months ago
QuanTM: a quantitative trust management system
Quantitative Trust Management (QTM) provides a dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities inv...
Andrew G. West, Adam J. Aviv, Jian Chang, Vinayak ...
172
Voted
CCS
2010
ACM
15 years 4 months ago
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
Cloud computing, as an emerging computing paradigm, enables users to remotely store their data into a cloud so as to enjoy scalable services on-demand. Especially for small and me...
Guojun Wang, Qin Liu, Jie Wu
ESCIENCE
2006
IEEE
15 years 9 months ago
Supporting Decentralized, Security Focused Dynamic Virtual Organizations across the Grid
The ability to dynamically create and subsequently manage secure virtual organisations (VO) is one of the key challenges facing the Grid community. Existing approaches for establi...
Richard O. Sinnott, David W. Chadwick, Jos Koetsie...
124
Voted
IM
1997
15 years 5 months ago
Active Objects in TMN
Telecommunications Management Network (TMN) systems use the object-oriented information modelling techniques and communication facilities provided by OSI Systems Management (SM). ...
Anastasia Vassila, George Pavlou, Graham Knight