Access control: Policies, models, and mechanisms

P Samarati, SC De Vimercati - … school on foundations of security analysis …, 2000 - Springer
Access control is the process of mediating every request to resources and data maintained
by a system and determining whether the request should be granted or denied. The access …

A unified attribute-based access control model covering DAC, MAC and RBAC

X **, R Krishnan, R Sandhu - Data and Applications Security and Privacy …, 2012 - Springer
Recently, there has been considerable interest in attribute based access control (ABAC) to
overcome the limitations of the dominant access control models (ie, discretionary-DAC …

Authorization in trust management: Features and foundations

PC Chapin, C Skalka, XS Wang - ACM Computing Surveys (CSUR), 2008 - dl.acm.org
Trust management systems are frameworks for authorization in modern distributed systems,
allowing remotely accessible resources to be protected by providers. By allowing providers …

A logic-based framework for attribute based access control

L Wang, D Wijesekera, S Jajodia - … of the 2004 ACM workshop on …, 2004 - dl.acm.org
Attribute based access control (ABAC) grants accesses to services based on the attributes
possessed by the requester. Thus, ABAC differs from the traditional discretionary access …

Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation

T Yu, M Winslett, KE Seamons - ACM Transactions on Information and …, 2003 - dl.acm.org
Business and military partners, companies and their customers, and other closely
cooperating parties may have a compelling need to conduct sensitive interactions on line …

Towards practical automated trust negotiation

WH Winsborough, N Li - Proceedings Third International …, 2002 - ieeexplore.ieee.org
Exchange of attribute credentials is a means to establish mutual trust between strangers that
wish to share resources or conduct business transactions. Automated Trust Negotiation …

Secure management of personal health records by applying attribute-based encryption

L Ibraimi, M Asim, M Petković - Proceedings of the 6th …, 2009 - ieeexplore.ieee.org
The confidentiality of personal health records is a major problem when patients use
commercial Web-based systems to store their health data. Traditional access control …

A uniform framework for regulating service access and information release on the web

PA Bonatti, P Samarati - Journal of Computer Security, 2002 - content.iospress.com
The widespread use of Internet-based services is increasing the amount of information (such
as user profiles) that clients are required to disclose. This information demand is necessary …

[PDF][PDF] Regulating service access and information release on the web

P Bonatti, P Samarati - Proceedings of the 7th ACM conference on …, 2000 - dl.acm.org
The widespread use of Internet-based services is increasing the amount of information (such
as user profiles) that clients are required to disclose. This information demand is necessary …

Oblivious signature-based envelope

N Li, W Du, D Boneh - Proceedings of the twenty-second annual …, 2003 - dl.acm.org
Exchange of digitally signed certificates is often used to establish mutual trust between
strangers that wish to share resources or to conduct business transactions. Automated Trust …