Access control is an important component in the security of communication systems. While cryptography has rightfully been a significant component in the design of large scale communication systems, its relation to access control, especially its complementarity, has not often been brought out in full. With the wide availability of SELinux, a comprehensive model of access control has all the more become important. In many large scale systems, access control and trust management have become important components in the design. In survivable systems, models of group communication systems may have to be integrated with access control models. In this paper, we discuss the problem of integrating various formalisms often encountered in large scale c...
Abstract. The functioning of modern IT-systems with autonomously acting components requires an elabo...
Access control is the process of mediating every request to resources and data maintained by a syste...
System administrators specify the access control policy they want and implement the relevant configu...
Access control is an important component in the security of communication systems. While cryptograph...
This chapter explores the concept of trust management in access control. We introduce the concepts b...
We study some of the concepts, protocols, and algorithms for access control in distributed systems, ...
We use a state-transition approach to analyze and compare the core access control mechanisms that ar...
Part 1: Extended Abstracts for Keynote SpeakersInternational audienceIn security too often services ...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
This paper is a natural continuation of previous research on the implementation of confidentiality i...
Access control must provide a secure environment for collaboration among independent organizations w...
Abstract. Existing authorization mechanisms fail to provide powerful and robust tools for handling s...
Ensuring secure and authorized access to remote services and information resources in a dynamic coll...
In recent decades, the number of researches on access control and user actions in computer systems h...
Distributed systems with decentralized control, such as peer-to-peer systems, computing grids acros...
Abstract. The functioning of modern IT-systems with autonomously acting components requires an elabo...
Access control is the process of mediating every request to resources and data maintained by a syste...
System administrators specify the access control policy they want and implement the relevant configu...
Access control is an important component in the security of communication systems. While cryptograph...
This chapter explores the concept of trust management in access control. We introduce the concepts b...
We study some of the concepts, protocols, and algorithms for access control in distributed systems, ...
We use a state-transition approach to analyze and compare the core access control mechanisms that ar...
Part 1: Extended Abstracts for Keynote SpeakersInternational audienceIn security too often services ...
One of the most challenging problems in managing large, distributed, and heterogeneous networked sys...
This paper is a natural continuation of previous research on the implementation of confidentiality i...
Access control must provide a secure environment for collaboration among independent organizations w...
Abstract. Existing authorization mechanisms fail to provide powerful and robust tools for handling s...
Ensuring secure and authorized access to remote services and information resources in a dynamic coll...
In recent decades, the number of researches on access control and user actions in computer systems h...
Distributed systems with decentralized control, such as peer-to-peer systems, computing grids acros...
Abstract. The functioning of modern IT-systems with autonomously acting components requires an elabo...
Access control is the process of mediating every request to resources and data maintained by a syste...
System administrators specify the access control policy they want and implement the relevant configu...