Although several access control policies have been proposed for securing access to resources, they focused on security of distributed environments that were rather static. Nowadays distributed environment becomes open and dynamic. In this paper, we propose a formal language for access control policies in open and dynamic environment. The language is based on description logic program and generalized courteous logic program supporting classical negation, prioritized conflict handling and mutual exclusion constraints. The language allows the specification of positive and negative authorization, privilege delegation and revocation, prioritized conflict resolution and mutual authorization exclusions. ? 2005 IEEE.EI
Access control is the process of mediating every request to data and services maintained by a system...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
Although several access control policies have been proposed for securing access to resources, they f...
A major drawback of existing access control systems is that they have all been developed with a spec...
Authorization plays an essential role to ensure the security of a wide variety of computing and IT s...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
Abstract. In this paper we describe a metamodel for access control designed to take into account the...
Trust management is a promising approach for the authorization in distributed environment. There are...
Specifying and managing access control policies for large distributed systems is a non-trivial task....
This paper studies logic-based methods for representing and evaluating complex access control polici...
Despite considerable advancements in the area of access control and authorization languages, current...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
Access control is the process of mediating every request to data and services maintained by a system...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
Although several access control policies have been proposed for securing access to resources, they f...
A major drawback of existing access control systems is that they have all been developed with a spec...
Authorization plays an essential role to ensure the security of a wide variety of computing and IT s...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
Abstract. In this paper we describe a metamodel for access control designed to take into account the...
Trust management is a promising approach for the authorization in distributed environment. There are...
Specifying and managing access control policies for large distributed systems is a non-trivial task....
This paper studies logic-based methods for representing and evaluating complex access control polici...
Despite considerable advancements in the area of access control and authorization languages, current...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
Access control is the process of mediating every request to data and services maintained by a system...
Managing security in distributed systems requires flexible and expressive authorisation models with ...
Managing security in distributed systems requires flexible and expressive authorisation models with ...