Abstract. This paper proposes a door access control system with mobile phones which allows off-line delegations of an access. A model of door access control with mobile phones is ...
We extend a particular access control framework, the Privilege Calculus, with a possibility to override denied access for increased flexibility in hard to define or unanticipated...
Erik Rissanen, Babak Sadighi Firozabadi, Marek J. ...
The functioning of modern IT-systems with autonomously acting components requires an elaborate access control system in which each participant can maintain her own trust structure....
Sandra Wortmann, Barbara Sprick, Christoph Kobusch
The problem of key management for access control systems has been well-studied, and the literature contains several schemes for hierarchy-based and temporal-based access control. ...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
—Current access control schemes focus on the user and their rights and privileges relating to the access to both initiating functionality and accessing information. This approach...