Sciweavers

3712 search results - page 149 / 743
» Role-Based Access Control
Sort
View
SP
2005
IEEE
149views Security Privacy» more  SP 2005»
14 years 3 months ago
Distributed Proving in Access-Control Systems
We present a distributed algorithm for assembling a proof that a request satisfies an access-control policy expressed in a formal logic, in the tradition of Lampson et al. [16]. ...
Lujo Bauer, Scott Garriss, Michael K. Reiter
ATVA
2005
Springer
93views Hardware» more  ATVA 2005»
14 years 3 months ago
A Static Analysis Using Tree Automata for XML Access Control
Isao Yagi, Yoshiaki Takata, Hiroyuki Seki
CCS
2005
ACM
14 years 3 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone