Distributed systems with decentralized control, such as peer-to-peer systems, computing grids across multiple organizations, and compositional web services require a rethinking of basic issues in their design and implementation. This dissertation establishes a model of these systems, examines the issues of programming models, access control, and trust, and proposes and evaluates new methods for implementing access control and trust management in these systems. We begin by abstracting these systems into the model of service-oriented systems that use associative interactions. It then examines the fundamental issues of access control in decentralized systems, and its greater requirements than in systems with central control. From this an...
Dynamic self-organizing groups like wikipedia, and f/oss have special security requirements not addr...
International audienceWe propose in this paper a framework in which the security policies of service...
Abstract. In this paper we describe a metamodel for access control designed to take into account the...
We study some of the concepts, protocols, and algorithms for access control in distributed systems, ...
International audienceThe spread of high-speed networks changes the way in which organizations manag...
We study some of the concepts, protocols, and algorithms for access control in distributed systems, ...
This chapter explores the concept of trust management in access control. We introduce the concepts b...
Ensuring secure and authorized access to remote services and information resources in a dynamic coll...
We describe an approach for distributed access control that is based on the idea of using a communit...
We describe an architecture for secure, indepen-dent, interworking services (Oasis). Each service is...
With development of grid technology, sensitive data protection becomes a difficult task for accesses...
Abstract—Service-oriented computing promotes collaboration by defining the standards layer that allo...
Multidomain environments where multiple organizations interoperate with each other are becoming a re...
With the development of grid technology, sensitive files and data protection become difficult tasks ...
To effectively participate in modern collaborations, member organizations should be able to share di...
Dynamic self-organizing groups like wikipedia, and f/oss have special security requirements not addr...
International audienceWe propose in this paper a framework in which the security policies of service...
Abstract. In this paper we describe a metamodel for access control designed to take into account the...
We study some of the concepts, protocols, and algorithms for access control in distributed systems, ...
International audienceThe spread of high-speed networks changes the way in which organizations manag...
We study some of the concepts, protocols, and algorithms for access control in distributed systems, ...
This chapter explores the concept of trust management in access control. We introduce the concepts b...
Ensuring secure and authorized access to remote services and information resources in a dynamic coll...
We describe an approach for distributed access control that is based on the idea of using a communit...
We describe an architecture for secure, indepen-dent, interworking services (Oasis). Each service is...
With development of grid technology, sensitive data protection becomes a difficult task for accesses...
Abstract—Service-oriented computing promotes collaboration by defining the standards layer that allo...
Multidomain environments where multiple organizations interoperate with each other are becoming a re...
With the development of grid technology, sensitive files and data protection become difficult tasks ...
To effectively participate in modern collaborations, member organizations should be able to share di...
Dynamic self-organizing groups like wikipedia, and f/oss have special security requirements not addr...
International audienceWe propose in this paper a framework in which the security policies of service...
Abstract. In this paper we describe a metamodel for access control designed to take into account the...