[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Reflects downloads up to 25 Dec 2024Bibliometrics
Skip Table Of Content Section
article
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation

Business and military partners, companies and their customers, and other closely cooperating parties may have a compelling need to conduct sensitive interactions on line, such as accessing each other's local services and other local resources. Automated ...

article
On the relationship between strand spaces and multi-agent systems

Strand spaces are a popular framework for the analysis of security protocols. Strand spaces have some similarities to a formalism used successfully to model protocols for distributed systems, namely multi-agent systems. We explore the exact relationship ...

article
A logical framework for reasoning about access control models

The increased awareness of the importance of data protection has made access control a relevant component of current data management systems. Moreover, emerging applications and data models call for flexible and expressive access control models. This ...

article
Delegation logic: A logic-based approach to distributed authorization

We address the problem of authorization in large-scale, open, distributed systems. Authorization decisions are needed in electronic commerce, mobile-code execution, remote resource sharing, privacy protection, and many other applications. We adopt the ...

Subjects

Comments

Please enable JavaScript to view thecomments powered by Disqus.