In this paper, we model agent role adoption when they are under the influence of peers and must account for their capabilities as well. Our model suggests a strategy for role adopt...
Abstract--Highly distributed environments such as pervasive computing environments not having global or broad control, need another attribute certificate management technique. For ...
Role hierarchies are fundamental to the role based access control (RBAC) model. The notion of role hierarchy is a well understood concept that allows senior roles to inherit the p...
on, a model is an abstraction of the real thing. In practice, engineers work with partial descriptions (models) and add/remove model at each level of abstraction. Models describe a...
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where larg...