Abstract. Access control is concerned with granting access to sensitive data based on conditions that relate to the past or present, so-called provisions. Expressing requirements from the domain of data protection necessitates extending this notion with conditions that relate to the fu-ture. Obligations, in this sense, are concerned with commitments of the involved parties. At the moment of granting access, adherence to these commitments cannot be guaranteed. An example is the requirement \do not re-distribute data", where the actions of the involved parties may not even be observable. We provide a formal framework that allows us to precisely specify data protection policies. A syntactic classication of formulas gives rise to natural a...
We consider the extension of fair event system specifications by concepts of access control (prohibi...
International audienceThe main aim of access control models is to provide means to simplify the mana...
Access control is a mechanism which defmes and controls the privileges of users in a system. Nowaday...
Traditional security policies largely focus on access control requirements, which specify who can ac...
Obligations are an important and indispensable part of many access control policies, such as those i...
A major drawback of existing access control systems is that they have all been developed with a spec...
Formal languages for policy have been developed for access control and confor-mance checking. In thi...
International audienceObligations are generally actions that users are required to take and are esse...
The increasing need to share information in dynamic environments has created a requirement for risk-...
International audienceAccess control policies are set of facts and rules that determine whether an a...
In this paper, we present a novel obligation model for the Core Privacy-aware Role Based Access Cont...
Permission to Speak: A Logic for Access Control and Conformance Formal languages for policy have bee...
The increased awareness of the importance of data protection has made access control a relevant comp...
The increased awareness of the importance of data protection has made access control a relevant comp...
Policies are widely used in many different systems and applications. Recently, it has been recognize...
We consider the extension of fair event system specifications by concepts of access control (prohibi...
International audienceThe main aim of access control models is to provide means to simplify the mana...
Access control is a mechanism which defmes and controls the privileges of users in a system. Nowaday...
Traditional security policies largely focus on access control requirements, which specify who can ac...
Obligations are an important and indispensable part of many access control policies, such as those i...
A major drawback of existing access control systems is that they have all been developed with a spec...
Formal languages for policy have been developed for access control and confor-mance checking. In thi...
International audienceObligations are generally actions that users are required to take and are esse...
The increasing need to share information in dynamic environments has created a requirement for risk-...
International audienceAccess control policies are set of facts and rules that determine whether an a...
In this paper, we present a novel obligation model for the Core Privacy-aware Role Based Access Cont...
Permission to Speak: A Logic for Access Control and Conformance Formal languages for policy have bee...
The increased awareness of the importance of data protection has made access control a relevant comp...
The increased awareness of the importance of data protection has made access control a relevant comp...
Policies are widely used in many different systems and applications. Recently, it has been recognize...
We consider the extension of fair event system specifications by concepts of access control (prohibi...
International audienceThe main aim of access control models is to provide means to simplify the mana...
Access control is a mechanism which defmes and controls the privileges of users in a system. Nowaday...