Discretionary Access Control (DAC) systems provide powerful mechanisms for resource management based on the selective distribution of capabilities to selected classes of principals. We study a type-based theory of DAC models for concurrent and distributed systems represented as terms of Cardelli, Ghelli and Gordon\u2019s pi calculus with groups [2]. In our theory, groups play the role of principals, and the structure of types allows fine-grained mechanisms to be specified to govern the transmission of names, to bound the (iterated) re-transmission of capabilities, to predicate their use on the inability to pass them to third parties, ... and more. The type system relies on subtyping to help achieve a selective distribution of capabilities, ...
Rôle-based access control (RBAC) is increasingly attracting attention because it reduces the comple...
Role-based access control (RBAC) is increasingly attracting attention because it reduces the complex...
An apparently prevailing myth is that safety is unde-cidable in Discretionary Access Control (DAC); ...
Discretionary Access Control (DAC) systems provide powerful resource management mechanisms based on ...
Discretionary Access Control (DAC) systems provide powerful resource management mechanisms based on ...
International audienceDiscretionary Access Control (DAC) systems provide powerful resource managemen...
We propose an extension of the asynchronous π-calculus in which a variety of security properties may...
Abstract. In this paper we describe a metamodel for access control designed to take into account the...
AbstractThis paper presents a type system for the calculus of Mobile Resources (MR) proposed by Gods...
Role-based access control (RBAC) is increasingly attracting attention because it reduces the comple...
Nobuko Yoshida Imperial College London ABSTRACT We introduce a new expressive theory of types for...
AbstractOur society is increasingly moving towards richer forms of information exchange where mobili...
Our society is increasingly moving towards richer forms of information exchange where mobility of pr...
We study some of the concepts, protocols, and algorithms for access control in distributed systems, ...
Rôle-based access control (RBAC) is increasingly attracting attention because it reduces the complex...
Rôle-based access control (RBAC) is increasingly attracting attention because it reduces the comple...
Role-based access control (RBAC) is increasingly attracting attention because it reduces the complex...
An apparently prevailing myth is that safety is unde-cidable in Discretionary Access Control (DAC); ...
Discretionary Access Control (DAC) systems provide powerful resource management mechanisms based on ...
Discretionary Access Control (DAC) systems provide powerful resource management mechanisms based on ...
International audienceDiscretionary Access Control (DAC) systems provide powerful resource managemen...
We propose an extension of the asynchronous π-calculus in which a variety of security properties may...
Abstract. In this paper we describe a metamodel for access control designed to take into account the...
AbstractThis paper presents a type system for the calculus of Mobile Resources (MR) proposed by Gods...
Role-based access control (RBAC) is increasingly attracting attention because it reduces the comple...
Nobuko Yoshida Imperial College London ABSTRACT We introduce a new expressive theory of types for...
AbstractOur society is increasingly moving towards richer forms of information exchange where mobili...
Our society is increasingly moving towards richer forms of information exchange where mobility of pr...
We study some of the concepts, protocols, and algorithms for access control in distributed systems, ...
Rôle-based access control (RBAC) is increasingly attracting attention because it reduces the complex...
Rôle-based access control (RBAC) is increasingly attracting attention because it reduces the comple...
Role-based access control (RBAC) is increasingly attracting attention because it reduces the complex...
An apparently prevailing myth is that safety is unde-cidable in Discretionary Access Control (DAC); ...