Abstract. Extensions of the role based access control (RBAC) paradigm have been proposed based in the use of attribute certificates. In order to overcome some of the limitations of RBAC and be able to implement security requirements such as the “originator controlled ” (ORCON) policy, the concept of mobile policy has been recently prop osed. Mobile policies are attached to the data that they control and are enforced by their execution in trusted servers. In this paper we present an extension of this idea that allows the execution of the policies in untrusted systems. We also extend the scheme to allow the policies to be linked to the data but not attached to it. By this modification security administrators are able to change policies dynami...
Abstract. Distributed systems usually contain objects with heterogeneous security requirements that ...
Modern day enterprises exhibit a growing trend toward adoption of enterprise computing services for ...
Over the last few years there has been a rapid development of technologies such as ubiquitous comput...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
This paper describes a policy driven role based access control system. The user's roles, and the po...
This paper describes a role based access control policy template for use by privilege management inf...
We propose an access control scheme for developing authorization rules for XML documents, allowing f...
Abstract. Distributed systems usually contain objects with heterogeneous security requirements that ...
Abstract. In this paper, we present a novel fine-grained access control system for applications wher...
Abstract. An outstanding security problem in mobile agent systems is resource access control, or aut...
The XML Role-Based Access Control (X-RBAC) specification language addresses multidomain environments...
Abstract: We consider the setting of secure publishing of XML documents, in which read-only access c...
While security is often supported in standard management frameworks, security is of major importance...
Modern day enterprises exhibit a growing trend toward adoption of enterprise computing services for ...
International audienceIn the age of mobile computing and distributed systems, healthcare systems are...
Abstract. Distributed systems usually contain objects with heterogeneous security requirements that ...
Modern day enterprises exhibit a growing trend toward adoption of enterprise computing services for ...
Over the last few years there has been a rapid development of technologies such as ubiquitous comput...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
This paper describes a policy driven role based access control system. The user's roles, and the po...
This paper describes a role based access control policy template for use by privilege management inf...
We propose an access control scheme for developing authorization rules for XML documents, allowing f...
Abstract. Distributed systems usually contain objects with heterogeneous security requirements that ...
Abstract. In this paper, we present a novel fine-grained access control system for applications wher...
Abstract. An outstanding security problem in mobile agent systems is resource access control, or aut...
The XML Role-Based Access Control (X-RBAC) specification language addresses multidomain environments...
Abstract: We consider the setting of secure publishing of XML documents, in which read-only access c...
While security is often supported in standard management frameworks, security is of major importance...
Modern day enterprises exhibit a growing trend toward adoption of enterprise computing services for ...
International audienceIn the age of mobile computing and distributed systems, healthcare systems are...
Abstract. Distributed systems usually contain objects with heterogeneous security requirements that ...
Modern day enterprises exhibit a growing trend toward adoption of enterprise computing services for ...
Over the last few years there has been a rapid development of technologies such as ubiquitous comput...