Abstract. We describe the motivation for moving policy enforcement for access control down to the digital object level. The reasons for this include handling of item-specific behaviors, adapting to evolution of digital objects, and permitting objects to move among repositories and portable devices. We then describe our experiments that integrate the Fedora architecture for digital objects and repositories and the PoET implementation of security automata to effect such objectcentric policy enforcement. 1 From Traditional Access Control to Flexible Policy Enforcement Access control in digital libraries must be scalable, flexible, and extensible – accommodating a wide range of objects and usage scenarios. This stands in contrast to traditional...
Abstract. Distributed systems usually contain objects with heterogeneous security requirements that ...
Access control systems are widely used means for the protection of computing systems. They are defin...
The evolution of technological progress continually presents new information security challenges for...
The foundation for security enforcement is access control. Re-sources must be protected against acce...
A precise characterization is given for the class of security policies that can be enforced using me...
Abstract—This paper presents a new policy language, known as functionality-based application confine...
Policy enforcement, or making sure that software behaves in line with a set of rules, is a problem o...
Abstract. Distributed systems usually contain objects with heterogeneous security requirements that ...
Policies are rules that govern the choices in behaviour of a system. Security policies define what a...
Usage control policies specify restrictions on the handling of data after access has been granted. W...
As non-expert users produce increasing amounts of personal digital data, usable access control becom...
Operating systems must be flexible in their support for security policies, providing sufficient mech...
Abstract. Security is a very relevant aspect in the implementation of most digital libraries. Two im...
Although several access control policies can be devised for controlling access to information, all e...
Access control systems are widely used means for the protection of computing systems. They are defin...
Abstract. Distributed systems usually contain objects with heterogeneous security requirements that ...
Access control systems are widely used means for the protection of computing systems. They are defin...
The evolution of technological progress continually presents new information security challenges for...
The foundation for security enforcement is access control. Re-sources must be protected against acce...
A precise characterization is given for the class of security policies that can be enforced using me...
Abstract—This paper presents a new policy language, known as functionality-based application confine...
Policy enforcement, or making sure that software behaves in line with a set of rules, is a problem o...
Abstract. Distributed systems usually contain objects with heterogeneous security requirements that ...
Policies are rules that govern the choices in behaviour of a system. Security policies define what a...
Usage control policies specify restrictions on the handling of data after access has been granted. W...
As non-expert users produce increasing amounts of personal digital data, usable access control becom...
Operating systems must be flexible in their support for security policies, providing sufficient mech...
Abstract. Security is a very relevant aspect in the implementation of most digital libraries. Two im...
Although several access control policies can be devised for controlling access to information, all e...
Access control systems are widely used means for the protection of computing systems. They are defin...
Abstract. Distributed systems usually contain objects with heterogeneous security requirements that ...
Access control systems are widely used means for the protection of computing systems. They are defin...
The evolution of technological progress continually presents new information security challenges for...