We describe a new design for authorization in operating systems in which applications are first-class entities. In this design, principals reflect application identities. Access c...
In this paper we present our research and development experience in the context of Interactive Multimedia Documents (IMDs). We define a rich model for such documents covering the ...
Michalis Vazirgiannis, D. Tsirikos, Th. Markousis,...
Imagine what kind of applications become possible when our mobile devices not only present data but provide valuable information to other users. Users become able to instantaneousl...
The usage control (UCON) model was introduced as a unified approach to capture a number of extensions for traditional access control models. While the policy specification flexibi...
Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Pre...
A well-known concern in the setting of identity based encryption is that the PKG is all powerful and has to be completely trusted. To mitigate this problem, the notion of Accounta...