Large-Scale network such as the Internet consist of a large number of sub-networks. Since each subnetwork has management privileges and policies individually, it is difficult to r...
Kanghee Lee, Zhefan Jiang, Sangok Kim, Sangwook Ki...
An outstanding security problem in mobile agent systems is resource access control, or authorization in its broader sense. In this paper we present an authorization framework for m...
ing and Refining Authorization in SQL Arnon Rosenthal, Edward Sciore1 The SQL standard specifies authorization via a large set of rather opaque rules, which are difficult to unders...
We propose a logic for specifying security policies at a very el of abstraction. The logic accommodates the subjective nature of affirmations for authorization and knowledge withou...
Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pf...
Distributed management of user profiles and identities allow reuse of profile information for different personalization services but also raises privacy issues. Users need a possi...