Access control: Policies, models, and mechanisms
Access control is the process of mediating every request to resources and data maintained
by a system and determining whether the request should be granted or denied. The access …
by a system and determining whether the request should be granted or denied. The access …
A unified attribute-based access control model covering DAC, MAC and RBAC
Recently, there has been considerable interest in attribute based access control (ABAC) to
overcome the limitations of the dominant access control models (ie, discretionary-DAC …
overcome the limitations of the dominant access control models (ie, discretionary-DAC …
Authorization in trust management: Features and foundations
Trust management systems are frameworks for authorization in modern distributed systems,
allowing remotely accessible resources to be protected by providers. By allowing providers …
allowing remotely accessible resources to be protected by providers. By allowing providers …
A logic-based framework for attribute based access control
Attribute based access control (ABAC) grants accesses to services based on the attributes
possessed by the requester. Thus, ABAC differs from the traditional discretionary access …
possessed by the requester. Thus, ABAC differs from the traditional discretionary access …
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
Business and military partners, companies and their customers, and other closely
cooperating parties may have a compelling need to conduct sensitive interactions on line …
cooperating parties may have a compelling need to conduct sensitive interactions on line …
Towards practical automated trust negotiation
WH Winsborough, N Li - Proceedings Third International …, 2002 - ieeexplore.ieee.org
Exchange of attribute credentials is a means to establish mutual trust between strangers that
wish to share resources or conduct business transactions. Automated Trust Negotiation …
wish to share resources or conduct business transactions. Automated Trust Negotiation …
Secure management of personal health records by applying attribute-based encryption
L Ibraimi, M Asim, M Petković - Proceedings of the 6th …, 2009 - ieeexplore.ieee.org
The confidentiality of personal health records is a major problem when patients use
commercial Web-based systems to store their health data. Traditional access control …
commercial Web-based systems to store their health data. Traditional access control …
A uniform framework for regulating service access and information release on the web
PA Bonatti, P Samarati - Journal of Computer Security, 2002 - content.iospress.com
The widespread use of Internet-based services is increasing the amount of information (such
as user profiles) that clients are required to disclose. This information demand is necessary …
as user profiles) that clients are required to disclose. This information demand is necessary …
[PDF][PDF] Regulating service access and information release on the web
P Bonatti, P Samarati - Proceedings of the 7th ACM conference on …, 2000 - dl.acm.org
The widespread use of Internet-based services is increasing the amount of information (such
as user profiles) that clients are required to disclose. This information demand is necessary …
as user profiles) that clients are required to disclose. This information demand is necessary …
Oblivious signature-based envelope
Exchange of digitally signed certificates is often used to establish mutual trust between
strangers that wish to share resources or to conduct business transactions. Automated Trust …
strangers that wish to share resources or to conduct business transactions. Automated Trust …