A Method for Assessing the Trustworthiness of an Entity by Cooperating...
In this thesis a Model of Trust based on Bayesian Networks is introduced. The model determines the trustworthiness of a new or hitherto unknown entity by utilizing information exchanged with...
View ArticleA Framework for Implementing Role-based Access Control Using CORBA Security...
The paper shows how role-based access control (RBAC) models could be implemented using CORBA Security service. A configuration of CORBA protection system is defined. We provide definitions of RBAC0 and...
View ArticleA Framework for Implementing Role-based Access Control Using CORBA Security...
The presentation shows how role-based access control (RBAC) models could be implemented using CORBA Security service. A configuration of CORBA protection system is defined. We provide definitions of...
View ArticleFuture Direction of Access Control Models, Architectures, and Technologies
The goal of this panel is to explore future directions in the research and practice of Access Control Models, Architectures, and Technologies (ACMAT). The panelists will offer their (speculative)...
View ArticleRecycling Authorizations: Toward Secondary and Approximate Authorizations...
In large and complex enterprises, obtaining authorizations could be communicationally and/or computationally expensive, and, due to infrastructure failures, some times even impossible. This paper...
View ArticleRequirements for Access Control: US Healthcare Domain
Roles are important factors in authorization rules. However, other information is essential in order to make authorization decisions at healthcare enterprises. An effective authorization language that...
View ArticleRequirements for Access Control: US Healthcare Domain
Roles are important factors in authorization rules. However, other information is essential in order to make authorization decisions at healthcare enterprises. An effective authorization language that...
View ArticleSupporting Relationships in Access Control Using Role Based Access Control
The Role Based Access Control (RBAC) model and mechanism have proven to be useful and effective. This is clear from the many RBAC implementations in commercial products. However, there are many common...
View ArticleThe Secondary and Approximate Authorization Model and its Application to...
The request-response paradigm used for access control solutions commonly leads to point-to-point (PTP) architectures, with security enforcement logic obtaining decisions from authorization servers...
View ArticleEmploying Secondary and Approximate Authorizations to Improve Access Control...
The request-response paradigm used for developing access control solutions commonly leads to point-to-point (PTP) architectures, with security enforcement logic obtaining decisions from authorization...
View ArticleSupport for ANSI RBAC in CORBA
We describe access control mechanisms of the Common Ob ject Request Broker Architecture (CORBA) and define a configuration of the CORBA protection system in more precise and less ambiguous language...
View Article
More Pages to Explore .....