This paper proposes a logic based framework that supports dynamic delegation for role based access control systems in a decentralised environment. It allows delegation of administrative privileges for both roles and access rights between roles. We have introduced the notion of trust in delegation and have shown how extended logic programs can be used to express and reason about roles and their delegations with trust degrees, roles' privileges and their propagations, delegation depth as well as conflict resolution. Furthermore, our framework is able to enforce various role constraints such as separation of duties, role composition and cardinality constraints. The proposed framework is flexible and provides a sound basis for specifying and ev...
One of the most challenging problems in managing large networks is the complexity of security admini...
In current role-based systems, security officers handle assignments of users to roles. However, full...
In the information security arena, one of the most interesting and promising techniques proposed is ...
This paper proposes a logic based framework that supports dynamic delegation for role based access c...
This paper proposes a logic based framework that extends role based access control systems with dyna...
This paper proposes a logic based framework that extends role based access control systems with dyna...
Abstract: Delegation is a proIIlIsmg alternative to traditional role administration paradigms in rol...
Abstract. Making correct access-control decisions is central to security, which in turn requires acc...
International audienceSince its formalization RBAC has become the yardstick for the evaluation of ac...
International audienceSince its formalization RBAC has become the yardstick for the evaluation of ac...
Abstract- As information systems became widely used by organizations and enterprises, resource shari...
International audienceSince its formalization RBAC has become the yardstick for the evaluation of ac...
International audienceThe main aim of access control models is to provide means to simplify the mana...
International audienceThe main aim of access control models is to provide means to simplify the mana...
International audienceThe main aim of access control models is to provide means to simplify the mana...
One of the most challenging problems in managing large networks is the complexity of security admini...
In current role-based systems, security officers handle assignments of users to roles. However, full...
In the information security arena, one of the most interesting and promising techniques proposed is ...
This paper proposes a logic based framework that supports dynamic delegation for role based access c...
This paper proposes a logic based framework that extends role based access control systems with dyna...
This paper proposes a logic based framework that extends role based access control systems with dyna...
Abstract: Delegation is a proIIlIsmg alternative to traditional role administration paradigms in rol...
Abstract. Making correct access-control decisions is central to security, which in turn requires acc...
International audienceSince its formalization RBAC has become the yardstick for the evaluation of ac...
International audienceSince its formalization RBAC has become the yardstick for the evaluation of ac...
Abstract- As information systems became widely used by organizations and enterprises, resource shari...
International audienceSince its formalization RBAC has become the yardstick for the evaluation of ac...
International audienceThe main aim of access control models is to provide means to simplify the mana...
International audienceThe main aim of access control models is to provide means to simplify the mana...
International audienceThe main aim of access control models is to provide means to simplify the mana...
One of the most challenging problems in managing large networks is the complexity of security admini...
In current role-based systems, security officers handle assignments of users to roles. However, full...
In the information security arena, one of the most interesting and promising techniques proposed is ...