Abstract. We apply SecPAL, a logic-based policy language for decentralized authorization and trust management, to our case study of automated software distribution for airplanes. In contrast to established policy frameworks for authorization like XACML, SecPAL offers constructs to express trust relationships and delegation explicitly and to form chains of trusts. We use these constructs in our case study to specify and reason about dynamic, ad-hoc trust relationships between airlines and contractors of suppliers of software that has to be loaded into airplanes
In distributed environments, access control decisions depend on statements of multiple agents rather...
In this paper, we will address privacy and trust issues that arise in more advanced software systems...
International audienceWe propose in this paper a framework in which the security policies of service...
Contemporary developments in airplane manufacturing and maintenance are motivating the introduction ...
We address the problem of authorization in large-scale, open, distributed systems. Authorization dec...
Abstract. Existing authorization mechanisms fail to provide powerful and robust tools for handling s...
Thesis (S.M.M.O.T.)--Massachusetts Institute of Technology, Sloan School of Management, Management o...
UAVs are gaining momentum in various areas, whether it is in the commercial or private sector. Novel...
The Internet enables connectivity between many strangers- entities that don't know each other. ...
. Existing authorization mechanisms fail to provide powerful and robust tools for handling security ...
The availability and adoption of open protocols allow applications to integrate Web services offered...
The availability and adoption of open protocols allow applications to integrate Web services offered...
This chapter explores the concept of trust management in access control. We introduce the concepts b...
Trust policies enable the automated processing of trust decisions for electronic transactions. We co...
The concept of trusted computing technology is becoming significant in that such technologies are be...
In distributed environments, access control decisions depend on statements of multiple agents rather...
In this paper, we will address privacy and trust issues that arise in more advanced software systems...
International audienceWe propose in this paper a framework in which the security policies of service...
Contemporary developments in airplane manufacturing and maintenance are motivating the introduction ...
We address the problem of authorization in large-scale, open, distributed systems. Authorization dec...
Abstract. Existing authorization mechanisms fail to provide powerful and robust tools for handling s...
Thesis (S.M.M.O.T.)--Massachusetts Institute of Technology, Sloan School of Management, Management o...
UAVs are gaining momentum in various areas, whether it is in the commercial or private sector. Novel...
The Internet enables connectivity between many strangers- entities that don't know each other. ...
. Existing authorization mechanisms fail to provide powerful and robust tools for handling security ...
The availability and adoption of open protocols allow applications to integrate Web services offered...
The availability and adoption of open protocols allow applications to integrate Web services offered...
This chapter explores the concept of trust management in access control. We introduce the concepts b...
Trust policies enable the automated processing of trust decisions for electronic transactions. We co...
The concept of trusted computing technology is becoming significant in that such technologies are be...
In distributed environments, access control decisions depend on statements of multiple agents rather...
In this paper, we will address privacy and trust issues that arise in more advanced software systems...
International audienceWe propose in this paper a framework in which the security policies of service...