In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
In this paper we analyze the requirements access control mechanisms must fulfill in the context of group communication and define a framework for supporting fine-grained access co...
Context is a key factor in making make access control decision in modern information system. But a formal context model is needed to guide research of implementation of Context-se...
In distributed component environment, a Role-Based Access Control (RBAC) server manages all authorization policies of components in the same domains whereas the components are dist...
This paper briefly traces the evolution of information system architectures from mainframe-connected terminals to distributed multi-tier architectures. It presents the challenges ...
Susan Chapin, Donald B. Faatz, Sushil Jajodia, Amg...