Information privacy is usually concerned with the confidentiality of personal identifiable information (PII), such as electronic medical records. Nowadays XML services are used to...
—In an ad-hoc collaborative sharing environment, attribute-based access control provides a promising approach in defining authorization over shared resources based on users’ p...
This paper presents an architectural model for contextual-based delegation access control for pervasive computing, particularly access control mechanisms for ad hoc coalition scen...
One of the most challenging problems in managing large networks is the complexity of security administration. Role based access control (RBAC) has become the predominant model for...
Tuan-Anh Nguyen, Linying Su, George Inman, David W...
Since its formalization RBAC has become the yardstick for the evaluation of access control formalisms. In order to meet organizational needs, it has been extended along several di...
Philippe Balbiani, Yannick Chevalier, Marwa El Hou...
Access control is an important aspect of shared virtual environments. Resource access may not only depend on prior authorization, but also on context of usage such as distance or ...
Martin Scheffler, Jan P. Springer, Bernd Froehlich
—We propose an access control model that extends RBAC (Role-Based Access Control) to take time and location into account, and use term rewriting systems to specify access control...
In this paper, a Role-based Access Control (RBAC) model is applied and extended to a multimedia version called Multi-Role Based Access Control (MRBAC), which can fully support the...
—Trusted Collaborative Computing (TCC) is a new research and application paradigm. Two important challenges in such a context are represented by secure information transmission a...
Emerging models for context-aware role-based access control pose challenging requirements over policy administration. In this paper we address the issues raised by the decentraliz...
Maria Luisa Damiani, Claudio Silvestri, Elisa Bert...