Access control is a fundamental concern in any system that manages resources, e.g., operating systems, file systems, databases and communications systems. The problem we address is how to specify, enforce, and implement access control in distributed environments. This problem occurs in many applications such as management of distributed project resources, e-newspaper and payTV subscription services. Starting from an access relation between users and resources, we derive a user hierarchy, a resource hierarchy, and a unified hierarchy. The unified hierarchy is then used to specify the access relation in a way that is compact and that allows efficient queries. It is also used in cryptographic schemes that enforce the access relation. We intro...
2014 - 2015Nowadays the current network-centric world has given rise to several security concerns r...
‘Secure group communications’ (SGC) refers to a scenario in which a group of participants can receiv...
Modern dynamic distributed information systems need access control policies to address controlling a...
Access control is a fundamental concern in any system that manages resources, e.g., operating system...
Access control is a fundamental concern in any system that manages resources, e.g., operating system...
All organizations share data in a carefully managed fashion by using access control mechanisms. We f...
Access control ensures that only the authorized users of a system are allowed to access certain reso...
Abstract. All organizations share data in a carefully managed fashion by using access control mechan...
We study some of the concepts, protocols, and algorithms for access control in distributed systems, ...
Access control mechanisms are needed in almost every system nowadays to control what kind of access ...
In many multi-user information systems, the users are organized as a hierarchy. Each user is a subo...
A hierarchical access control technique M-HABE and an altered three-layer structure is proposed. Con...
In a hierarchical access control system, users are partitioned into a number of classes—called secur...
AbstractOften a security system groups users into a hierarchy, with user classes on top having acces...
We refer to an access control system based on subjects and objects. Subjects are active entities, e....
2014 - 2015Nowadays the current network-centric world has given rise to several security concerns r...
‘Secure group communications’ (SGC) refers to a scenario in which a group of participants can receiv...
Modern dynamic distributed information systems need access control policies to address controlling a...
Access control is a fundamental concern in any system that manages resources, e.g., operating system...
Access control is a fundamental concern in any system that manages resources, e.g., operating system...
All organizations share data in a carefully managed fashion by using access control mechanisms. We f...
Access control ensures that only the authorized users of a system are allowed to access certain reso...
Abstract. All organizations share data in a carefully managed fashion by using access control mechan...
We study some of the concepts, protocols, and algorithms for access control in distributed systems, ...
Access control mechanisms are needed in almost every system nowadays to control what kind of access ...
In many multi-user information systems, the users are organized as a hierarchy. Each user is a subo...
A hierarchical access control technique M-HABE and an altered three-layer structure is proposed. Con...
In a hierarchical access control system, users are partitioned into a number of classes—called secur...
AbstractOften a security system groups users into a hierarchy, with user classes on top having acces...
We refer to an access control system based on subjects and objects. Subjects are active entities, e....
2014 - 2015Nowadays the current network-centric world has given rise to several security concerns r...
‘Secure group communications’ (SGC) refers to a scenario in which a group of participants can receiv...
Modern dynamic distributed information systems need access control policies to address controlling a...