Delegation is a mechanism that allows one agent to act on another's privilege. It is important that the privileges should be delegated to a person who is trustworthy. In this paper, we propose a multi-level delegation model with trust management in access control systems. We organize the delegation tasks into three levels, Low, Medium, and High, according to the sensitivity of the information contained in the delegation tasks. It motivates us that the more sensitive the delegated task is, the more trustworthy the delegatee should be. In order to assess how trustworthy a delegatee is, we devise trust evaluation techniques to describe a delegatee's trust history and also predict the future trend of trust. In our proposed delegation model, ...
International audienceThe spread of high-speed networks changes the way in which organizations manag...
Abstract Delegation, from a technical point of view, is widely considered as a po-tential approach i...
This paper proposes a logic based framework that extends role based access control systems with dyna...
Delegation is a mechanism that allows one agent to act on another’s privilege. It is important that ...
Abstract. Delegation is a mechanism that allows a user A to act on another user B’s behalf by making...
The availability and adoption of open protocols allow applications to integrate Web services offered...
The availability and adoption of open protocols allow applications to integrate Web services offered...
This chapter explores the concept of trust management in access control. We introduce the concepts b...
This paper proposes a logic based framework that supports dynamic delegation for role based access c...
International audienceIn the field of access control, delegation is an important aspect that is cons...
We use a state-transition approach to analyze and compare the core access control mechanisms that ar...
Part 4: Access Control IIInternational audienceIn this paper we first introduce a logic for describi...
Abstract. Trust Management systems use security credentials to determine whether action requests are...
Abstract. The functioning of modern IT-systems with autonomously acting components requires an elabo...
The characteristics of delegation are analyzed and defined in this paper, including time, totality, ...
International audienceThe spread of high-speed networks changes the way in which organizations manag...
Abstract Delegation, from a technical point of view, is widely considered as a po-tential approach i...
This paper proposes a logic based framework that extends role based access control systems with dyna...
Delegation is a mechanism that allows one agent to act on another’s privilege. It is important that ...
Abstract. Delegation is a mechanism that allows a user A to act on another user B’s behalf by making...
The availability and adoption of open protocols allow applications to integrate Web services offered...
The availability and adoption of open protocols allow applications to integrate Web services offered...
This chapter explores the concept of trust management in access control. We introduce the concepts b...
This paper proposes a logic based framework that supports dynamic delegation for role based access c...
International audienceIn the field of access control, delegation is an important aspect that is cons...
We use a state-transition approach to analyze and compare the core access control mechanisms that ar...
Part 4: Access Control IIInternational audienceIn this paper we first introduce a logic for describi...
Abstract. Trust Management systems use security credentials to determine whether action requests are...
Abstract. The functioning of modern IT-systems with autonomously acting components requires an elabo...
The characteristics of delegation are analyzed and defined in this paper, including time, totality, ...
International audienceThe spread of high-speed networks changes the way in which organizations manag...
Abstract Delegation, from a technical point of view, is widely considered as a po-tential approach i...
This paper proposes a logic based framework that extends role based access control systems with dyna...