Simplifying the administration of location-based access-control policies requires a mechanism that supports both intuitive and scalable spatial constraint specifications and a flexible enforcement architecture. Policy Mapper is an administrative tool that helps define access control at conceptual and logical levels to carry out constraint specification and enforcement. The tool also provides an Interface Definition Language that couples the two levels. Policy Mapper bridges a critical gap between the expressiveness and enforcement of spatial constraints in location-based access-control policies
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the admin...
ABSTRACT As mobile computing devices are becoming increasingly dominant in enterprise and government...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...
In the last few years there has been an increasing interest for a novel category of access control m...
Constraint systems provide techniques for automatically analyzing the conformance of low-level acces...
Large networks service a significant number of endpoints, each of which access a sizable number of a...
Emerging models for context-aware role-based access control pose challenging requirements over polic...
Abstract—This paper presents a new policy language, known as functionality-based application confine...
Emerging models for context-aware role-based access control pose challenging requirements over polic...
Access control is an important component of any database management system. Several access control m...
Emerging models for context-aware role-based access control pose challenging requirements over polic...
AbstractGraph-based specification formalisms for access control (AC) policies combine the advantages...
We show how a range of role-based access control (RBAC) models may be usefully represented as constr...
Abstract—Security policy specification can be difficult to get right. Electronic systems often fail ...
Location-based Access Control (LBAC) techniques allow taking users' physical location into account w...
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the admin...
ABSTRACT As mobile computing devices are becoming increasingly dominant in enterprise and government...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...
In the last few years there has been an increasing interest for a novel category of access control m...
Constraint systems provide techniques for automatically analyzing the conformance of low-level acces...
Large networks service a significant number of endpoints, each of which access a sizable number of a...
Emerging models for context-aware role-based access control pose challenging requirements over polic...
Abstract—This paper presents a new policy language, known as functionality-based application confine...
Emerging models for context-aware role-based access control pose challenging requirements over polic...
Access control is an important component of any database management system. Several access control m...
Emerging models for context-aware role-based access control pose challenging requirements over polic...
AbstractGraph-based specification formalisms for access control (AC) policies combine the advantages...
We show how a range of role-based access control (RBAC) models may be usefully represented as constr...
Abstract—Security policy specification can be difficult to get right. Electronic systems often fail ...
Location-based Access Control (LBAC) techniques allow taking users' physical location into account w...
Proposed models for spatially-aware extensions of role-based access control (RBAC) combine the admin...
ABSTRACT As mobile computing devices are becoming increasingly dominant in enterprise and government...
In defining large, complex access control policies, one would like to compose sub-policies, perhaps ...