In access control frameworks with the possibility of delegating permissions and administrative rights, delegation chains can form. There are di erent ways to treat these delegation chains when revoking rights, which give rise to di erent revocation schemes. Hagstr om et al. [11] proposed a framework for classifying revocation schemes, in which the di erent revocation schemes are de ned graph-theoretically. At the outset, we identify multiple problems with Hagstr om et al.'s de nitions of the revocation schemes, which can pose security risks. This paper is centered around the question how one can systematically ensure that improved de nitions of the revocation schemes do not lead to similar problems. For this we propose to apply the axiomati...
We consider the problem of access privilege management in a classical protection environment featuri...
The XACML standard defines an XML based language for defining access control policies and a related ...
Correct certificate revocation practices are essential to each public-key infrastructure. While ther...
peer reviewedIn access control frameworks with the possibility of delegating permissions and admini...
In ownership-based access control frameworks with the possibility of delegating permissions and admi...
Part 4: Access Control IIInternational audienceIn this paper we first introduce a logic for describi...
We have an existing framework for updating privileges and creating management structures by means of...
peer reviewedIn ownership-based access control frameworks with the possibility of delegating permiss...
In ownership-based access control frameworks with the possibility of delegating permissions and admi...
We have previously presented a framework for updating privileges and creating management structures ...
One of the most widespread access control model that assigns permissions to a user is Role Based Acc...
Efficient collaboration allows organizations and individuals to improve the efficiency and quality o...
Abstract. Permission-role assignment is an important issue in role-based access control (RBAC). Ther...
Permission-role assignment is an important issue in role-based access control (RBAC). There are two ...
Part 5: Distributed SystemsInternational audienceDue to inherent delays and performance costs, the d...
We consider the problem of access privilege management in a classical protection environment featuri...
The XACML standard defines an XML based language for defining access control policies and a related ...
Correct certificate revocation practices are essential to each public-key infrastructure. While ther...
peer reviewedIn access control frameworks with the possibility of delegating permissions and admini...
In ownership-based access control frameworks with the possibility of delegating permissions and admi...
Part 4: Access Control IIInternational audienceIn this paper we first introduce a logic for describi...
We have an existing framework for updating privileges and creating management structures by means of...
peer reviewedIn ownership-based access control frameworks with the possibility of delegating permiss...
In ownership-based access control frameworks with the possibility of delegating permissions and admi...
We have previously presented a framework for updating privileges and creating management structures ...
One of the most widespread access control model that assigns permissions to a user is Role Based Acc...
Efficient collaboration allows organizations and individuals to improve the efficiency and quality o...
Abstract. Permission-role assignment is an important issue in role-based access control (RBAC). Ther...
Permission-role assignment is an important issue in role-based access control (RBAC). There are two ...
Part 5: Distributed SystemsInternational audienceDue to inherent delays and performance costs, the d...
We consider the problem of access privilege management in a classical protection environment featuri...
The XACML standard defines an XML based language for defining access control policies and a related ...
Correct certificate revocation practices are essential to each public-key infrastructure. While ther...