Abstract. This paper argues that Haigh and Young’s definition of noninterference for intransitive security policies admits information flows that are not in accordance with the...
This paper proposes a modelling of information security policies in the framework of possibilistic logic. Our modelling is based on the concept of roles associated with users. Acc...
—Usage control goes beyond traditional access control, addressing its limitations related to attribute mutability and continuous usage permission validation. The recently propose...
Rafael Teigao, Carlos Maziero, Altair Olivo Santin
Access control has been studied for sometime, and there are a number of theories and techniques for handling access control for single or centralised systems; however, unique and ...
Daisy Daiqin He, Michael Compton, Kerry Taylor, Ji...
Relation Based Access Control (RelBAC) is an access control model designed for the new scenarios of access control on Web 2.0. Under this model, we discuss in this paper how to for...