Sciweavers

64 search results - page 1 / 13
» A Representation Model of Trust Relationships with Delegatio...
Sort
View
ITRUST
2005
Springer
13 years 10 months ago
A Representation Model of Trust Relationships with Delegation Extensions
Abstract. Logic languages establish a formal framework to solve authorization and delegation conflicts. However, we consider that a visual representation is necessary since graphs...
Isaac Agudo, Javier Lopez, José A. Monteneg...
ACSAC
2004
IEEE
13 years 8 months ago
Role-Based Delegation Model/ Hierarchical Roles (RBDM1)
The basic idea behind delegation is that some active entity in a system delegates authority to another active entity in order to carry out some functions on behalf of the former. ...
Ezedin Barka, Ravi S. Sandhu
ACSAC
2009
IEEE
13 years 11 months ago
Enabling Secure Secret Sharing in Distributed Online Social Networks
—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...
EUROSEC
2009
ACM
13 years 11 months ago
QuanTM: a quantitative trust management system
Quantitative Trust Management (QTM) provides a dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities inv...
Andrew G. West, Adam J. Aviv, Jian Chang, Vinayak ...
CISC
2008
Springer
118views Cryptology» more  CISC 2008»
13 years 7 months ago
Inter-domain Identity-Based Proxy Re-encryption
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts hav...
Qiang Tang, Pieter H. Hartel, Willem Jonker