Although several access control policies have been proposed for securing access to resources, they focused on security of distributed environments that were rather static. Nowadays distributed environment becomes open and dynamic. In this paper, we propose a formal language for access control policies in open and dynamic environment. The language is based on description logic program and generalized courteous logic program supporting classical negation, prioritized conflict handling and mutual exclusion constraints. The language allows the specification of positive and negative authorization, privilege delegation and revocation, prioritized conflict resolution and mutual authorization exclusions.Computer Science, Artificial IntelligenceComp...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
Access control is the process of mediating every request to data and services maintained by a system...
Although several access control policies have been proposed for securing access to resources, they f...
A major drawback of existing access control systems is that they have all been developed with a spec...
Authorization plays an essential role to ensure the security of a wide variety of computing and IT s...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
Abstract. In this paper we describe a metamodel for access control designed to take into account the...
Trust management is a promising approach for the authorization in distributed environment. There are...
Specifying and managing access control policies for large distributed systems is a non-trivial task....
Abstract—Recently, dynamic access control models are pro-posed to restrict access domain appropriate...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
This paper studies logic-based methods for representing and evaluating complex access control polici...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
Access control is the process of mediating every request to data and services maintained by a system...
Although several access control policies have been proposed for securing access to resources, they f...
A major drawback of existing access control systems is that they have all been developed with a spec...
Authorization plays an essential role to ensure the security of a wide variety of computing and IT s...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
Abstract. In this paper we describe a metamodel for access control designed to take into account the...
Trust management is a promising approach for the authorization in distributed environment. There are...
Specifying and managing access control policies for large distributed systems is a non-trivial task....
Abstract—Recently, dynamic access control models are pro-posed to restrict access domain appropriate...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
This paper studies logic-based methods for representing and evaluating complex access control polici...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
Access control is the process of mediating every request to data and services maintained by a system...