Abstract. The functioning of modern IT-systems with autonomously acting components requires an elaborate access control system in which each participant can maintain her own trust structure. In this work, we discuss ideas for an extension of capability based access control systems that allow the specification of dynamically changing trust of participants. We propose a classification of credentials and distinguish between credentials that have a positive and those that have a negative impact on access decisions. Furthermore, we investigate, how our ideas can be implemented in existing approaches for capability based access control systems.
International audienceThe spread of high-speed networks changes the way in which organizations manag...
AbstractDifferent from traditional access control technologies, such as discretionary access control...
Dynamic self-organizing groups like wikipedia, and f/oss have special security requirements not addr...
We use a state-transition approach to analyze and compare the core access control mechanisms that ar...
Delegation is a mechanism that allows one agent to act on another’s privilege. It is important that ...
AbstractIn open and distributed property-based access control systems, access rights are granted bec...
Abstract. The Role-Based Access Control (RBAC) model has been widely applied to a single domain in w...
The Role-Based Access Control (RBAC) model has been widely applied to a single domain in which users...
In traditional multi-level security systems, trust and risk values are pre-computed. Any change in t...
The topic of this paper is the role-based trust-management language RT_0, a formalism inspired by lo...
Access control is an important component in the security of communication systems. While cryptograph...
Abstract. Trust management is a concept of automatic verification of access rights against distribut...
This chapter explores the concept of trust management in access control. We introduce the concepts b...
This paper proposes a logic based framework that supports dynamic delegation for role based access c...
This paper is a natural continuation of previous research on the implementation of confidentiality i...
International audienceThe spread of high-speed networks changes the way in which organizations manag...
AbstractDifferent from traditional access control technologies, such as discretionary access control...
Dynamic self-organizing groups like wikipedia, and f/oss have special security requirements not addr...
We use a state-transition approach to analyze and compare the core access control mechanisms that ar...
Delegation is a mechanism that allows one agent to act on another’s privilege. It is important that ...
AbstractIn open and distributed property-based access control systems, access rights are granted bec...
Abstract. The Role-Based Access Control (RBAC) model has been widely applied to a single domain in w...
The Role-Based Access Control (RBAC) model has been widely applied to a single domain in which users...
In traditional multi-level security systems, trust and risk values are pre-computed. Any change in t...
The topic of this paper is the role-based trust-management language RT_0, a formalism inspired by lo...
Access control is an important component in the security of communication systems. While cryptograph...
Abstract. Trust management is a concept of automatic verification of access rights against distribut...
This chapter explores the concept of trust management in access control. We introduce the concepts b...
This paper proposes a logic based framework that supports dynamic delegation for role based access c...
This paper is a natural continuation of previous research on the implementation of confidentiality i...
International audienceThe spread of high-speed networks changes the way in which organizations manag...
AbstractDifferent from traditional access control technologies, such as discretionary access control...
Dynamic self-organizing groups like wikipedia, and f/oss have special security requirements not addr...