Federated identity management

DW Chadwick - International School on Foundations of Security …, 2007 - Springer
This paper addresses the topic of federated identity management. It discusses in detail the
following topics: what is digital identity, what is identity management, what is federated …

A dynamic Bayesian network approach to figure tracking using learned dynamic models

V Pavlovic, JM Rehg, TJ Cham… - Proceedings of the …, 1999 - ieeexplore.ieee.org
The human figure exhibits complex and rich dynamic behavior that is both nonlinear and
time-varying. However most work on tracking and synthesizing figure motion has employed …

Autonomic communications in software-driven networks

Z Zhao, E Schiller, E Kalogeiton, T Braun… - IEEE journal on …, 2017 - ieeexplore.ieee.org
Autonomic communications aim to provide the quality-of-service in networks using self-
management mechanisms. It inherits many characteristics from autonomic computing, in …

A privacy preserving authorisation system for the cloud

DW Chadwick, K Fatema - Journal of Computer and System Sciences, 2012 - Elsevier
In this paper we describe a policy based authorisation infrastructure that a cloud provider
can run as an infrastructure service for its users. It will protect the privacy of usersʼ data by …

Semantic attribute-based access control: A review on current status and future perspectives

H Arshad, C Johansen, O Owe - Journal of Systems Architecture, 2022 - Elsevier
Attribute-based access control (ABAC) uses the attributes of the involved entities (ie, subject,
object, action, and environment) to provide access control. Despite various advantages …

Multi‐tenancy authorization models for collaborative cloud services

B Tang, R Sandhu, Q Li - Concurrency and Computation …, 2015 - Wiley Online Library
The cloud service model intrinsically caters to multiple tenants, most obviously not only in
public clouds but also in private clouds for large organizations. Currently, most cloud service …

Nonrigid structure from motion via sparse representation

K Li, J Yang, J Jiang - IEEE transactions on cybernetics, 2014 - ieeexplore.ieee.org
This paper proposes a new approach for nonrigid structure from motion with occlusion,
based on sparse representation. We address the occlusion problem based on the latest …

Log design for accountability

D Butin, M Chicote, D Le Métayer - 2013 IEEE Security and …, 2013 - ieeexplore.ieee.org
Accountability is a requirement to be included in the initial design phase of systems because
of its strong impact on log architecture implementation. As an illustration, the logs we …

Self-adaptive authorization framework for policy based RBAC/ABAC models

C Bailey, DW Chadwick… - 2011 IEEE Ninth …, 2011 - ieeexplore.ieee.org
Authorization systems are an integral part of any network where resources need to be
protected. They act as the gateway for providing (or denying) subjects (users) access to …

Expressions of expertness: the virtuous circle of natural language for access control policy specification

P Inglesant, MA Sasse, D Chadwick… - Proceedings of the 4th …, 2008 - dl.acm.org
The implementation of usable security is particularly challenging in the growing field of Grid
computing, where control is decentralised, systems are heterogeneous, and authorization …