Sciweavers

852 search results - page 54 / 171
» Model-Checking Access Control Policies
Sort
View
XMLSEC
2003
ACM
14 years 3 months ago
First experiences using XACML for access control in distributed systems
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as com...
Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis ...
JLP
2011
94views more  JLP 2011»
13 years 5 months ago
Permission to speak: A logic for access control and conformance
Formal languages for policy have been developed for access control and conformance checking. In this paper, we describe a formalism that combines features that have been developed...
Nikhil Dinesh, Aravind K. Joshi, Insup Lee, Oleg S...
ESORICS
2006
Springer
14 years 1 months ago
Delegation in Role-Based Access Control
User delegation is a mechanism for assigning access rights available to a user to another user. A delegation operation can either be a grant or transfer operation. Delegation for r...
Jason Crampton, Hemanth Khambhammettu
IEEECIT
2010
IEEE
13 years 8 months ago
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML
—In this paper we describe extensions to the access control industry standards XACML and SAML to enable privacy-preserving and credential-based access control. Rather than assumi...
Claudio Agostino Ardagna, Sabrina De Capitani di V...
SEMWEB
2007
Springer
14 years 4 months ago
Access Control for Sharing Semantic Data across Desktops
Abstract. Personal Information Management (PIM) systems aim to provide convenient access to all data and metadata on a desktop to the user itself as well as the co-workers. Obvious...
Ekaterini Ioannou, Juri Luca De Coi, Arne Wolf Koe...