AbstractIn open and distributed property-based access control systems, access rights are granted because of presented certified properties. However, controlling agents base their access decisions not only on presented certified properties. Crucial factors are the correlations between certified properties, experiences and expectations concerning other participating agents, and the resulting trust modalities. This work identifies the essential correlations and demonstrates how they can be explicitly integrated in access decisions
International audienceTrust based access control models have recently attracted significant interest...
Access control must provide a secure environment for collaboration among independent organizations w...
Abstract—Attribute-based access control (ABAC) has been regarded in recent years as an effective way...
AbstractIn open and distributed property-based access control systems, access rights are granted bec...
We use a state-transition approach to analyze and compare the core access control mechanisms that ar...
This chapter explores the concept of trust management in access control. We introduce the concepts b...
Abstract. The functioning of modern IT-systems with autonomously acting components requires an elabo...
Distributed systems with decentralized control, such as peer-to-peer systems, computing grids acros...
This paper is a natural continuation of previous research on the implementation of confidentiality i...
International audienceThe spread of high-speed networks changes the way in which organizations manag...
AbstractDifferent from traditional access control technologies, such as discretionary access control...
Delegation is a mechanism that allows one agent to act on another’s privilege. It is important that ...
In recent decades, the number of researches on access control and user actions in computer systems h...
International audienceWe propose in this paper a framework in which the security policies of service...
International audienceThe first challenge that we tackle in this paper is how to conduct access cont...
International audienceTrust based access control models have recently attracted significant interest...
Access control must provide a secure environment for collaboration among independent organizations w...
Abstract—Attribute-based access control (ABAC) has been regarded in recent years as an effective way...
AbstractIn open and distributed property-based access control systems, access rights are granted bec...
We use a state-transition approach to analyze and compare the core access control mechanisms that ar...
This chapter explores the concept of trust management in access control. We introduce the concepts b...
Abstract. The functioning of modern IT-systems with autonomously acting components requires an elabo...
Distributed systems with decentralized control, such as peer-to-peer systems, computing grids acros...
This paper is a natural continuation of previous research on the implementation of confidentiality i...
International audienceThe spread of high-speed networks changes the way in which organizations manag...
AbstractDifferent from traditional access control technologies, such as discretionary access control...
Delegation is a mechanism that allows one agent to act on another’s privilege. It is important that ...
In recent decades, the number of researches on access control and user actions in computer systems h...
International audienceWe propose in this paper a framework in which the security policies of service...
International audienceThe first challenge that we tackle in this paper is how to conduct access cont...
International audienceTrust based access control models have recently attracted significant interest...
Access control must provide a secure environment for collaboration among independent organizations w...
Abstract—Attribute-based access control (ABAC) has been regarded in recent years as an effective way...