Federated identity management
DW Chadwick - International School on Foundations of Security …, 2007 - Springer
This paper addresses the topic of federated identity management. It discusses in detail the
following topics: what is digital identity, what is identity management, what is federated …
following topics: what is digital identity, what is identity management, what is federated …
A dynamic Bayesian network approach to figure tracking using learned dynamic models
The human figure exhibits complex and rich dynamic behavior that is both nonlinear and
time-varying. However most work on tracking and synthesizing figure motion has employed …
time-varying. However most work on tracking and synthesizing figure motion has employed …
Autonomic communications in software-driven networks
Autonomic communications aim to provide the quality-of-service in networks using self-
management mechanisms. It inherits many characteristics from autonomic computing, in …
management mechanisms. It inherits many characteristics from autonomic computing, in …
A privacy preserving authorisation system for the cloud
In this paper we describe a policy based authorisation infrastructure that a cloud provider
can run as an infrastructure service for its users. It will protect the privacy of usersʼ data by …
can run as an infrastructure service for its users. It will protect the privacy of usersʼ data by …
Semantic attribute-based access control: A review on current status and future perspectives
Attribute-based access control (ABAC) uses the attributes of the involved entities (ie, subject,
object, action, and environment) to provide access control. Despite various advantages …
object, action, and environment) to provide access control. Despite various advantages …
Multi‐tenancy authorization models for collaborative cloud services
B Tang, R Sandhu, Q Li - Concurrency and Computation …, 2015 - Wiley Online Library
The cloud service model intrinsically caters to multiple tenants, most obviously not only in
public clouds but also in private clouds for large organizations. Currently, most cloud service …
public clouds but also in private clouds for large organizations. Currently, most cloud service …
Nonrigid structure from motion via sparse representation
This paper proposes a new approach for nonrigid structure from motion with occlusion,
based on sparse representation. We address the occlusion problem based on the latest …
based on sparse representation. We address the occlusion problem based on the latest …
Log design for accountability
D Butin, M Chicote, D Le Métayer - 2013 IEEE Security and …, 2013 - ieeexplore.ieee.org
Accountability is a requirement to be included in the initial design phase of systems because
of its strong impact on log architecture implementation. As an illustration, the logs we …
of its strong impact on log architecture implementation. As an illustration, the logs we …
Self-adaptive authorization framework for policy based RBAC/ABAC models
C Bailey, DW Chadwick… - 2011 IEEE Ninth …, 2011 - ieeexplore.ieee.org
Authorization systems are an integral part of any network where resources need to be
protected. They act as the gateway for providing (or denying) subjects (users) access to …
protected. They act as the gateway for providing (or denying) subjects (users) access to …
Expressions of expertness: the virtuous circle of natural language for access control policy specification
The implementation of usable security is particularly challenging in the growing field of Grid
computing, where control is decentralised, systems are heterogeneous, and authorization …
computing, where control is decentralised, systems are heterogeneous, and authorization …