The Transform access-control model is based on the concept of transformation of access rights. It has previously been shown that Transform unifies a number of diverse access control mechanisms such as amplification, copy flags, separation of duties and synergistic authorization. It has also been shown that Transform has an efficient algorithm for safety analysis of the propagation of access rights (i.e., the determination of whether or not a given subject can ever acquire access to a given object). In this paper we propose a distributed implementation of Transform. Our design is based on capabilities with identities of subjects buried in them. This ensures unforgeability of capabilities as well as enables enforcement of "mandatory"...
The way security mechanisms for large-scale distributed applications are engineered today has a numb...
Authorization plays an essential role to ensure the security of a wide variety of computing and IT s...
International audienceThe spread of high-speed networks changes the way in which organizations manag...
The concept of transformation of access rights was recently introduced in the literature by Sandhu. ...
Abstract. In this paper we describe a metamodel for access control designed to take into account the...
We use a state-transition approach to analyze and compare the core access control mechanisms that ar...
We describe an architecture for secure, indepen-dent, interworking services (Oasis). Each service is...
Increasing amounts of data are being collected and stored relating to every aspect of an individual'...
Abstract. Access control systems must be evaluated in part on how well they enable one to distribute...
We describe a system whose purpose is to explore the use of certificates for the distributed manage...
International audienceWe propose in this paper a framework in which the security policies of service...
Distributed systems with decentralized control, such as peer-to-peer systems, computing grids acros...
We study some of the concepts, protocols, and algorithms for access control in distributed systems, ...
International audienceThis paper presents a novel approach to update a Mandatory Access Control poli...
The copy of record is available at IET Digital Library. [Full text of this article is not available ...
The way security mechanisms for large-scale distributed applications are engineered today has a numb...
Authorization plays an essential role to ensure the security of a wide variety of computing and IT s...
International audienceThe spread of high-speed networks changes the way in which organizations manag...
The concept of transformation of access rights was recently introduced in the literature by Sandhu. ...
Abstract. In this paper we describe a metamodel for access control designed to take into account the...
We use a state-transition approach to analyze and compare the core access control mechanisms that ar...
We describe an architecture for secure, indepen-dent, interworking services (Oasis). Each service is...
Increasing amounts of data are being collected and stored relating to every aspect of an individual'...
Abstract. Access control systems must be evaluated in part on how well they enable one to distribute...
We describe a system whose purpose is to explore the use of certificates for the distributed manage...
International audienceWe propose in this paper a framework in which the security policies of service...
Distributed systems with decentralized control, such as peer-to-peer systems, computing grids acros...
We study some of the concepts, protocols, and algorithms for access control in distributed systems, ...
International audienceThis paper presents a novel approach to update a Mandatory Access Control poli...
The copy of record is available at IET Digital Library. [Full text of this article is not available ...
The way security mechanisms for large-scale distributed applications are engineered today has a numb...
Authorization plays an essential role to ensure the security of a wide variety of computing and IT s...
International audienceThe spread of high-speed networks changes the way in which organizations manag...