CSFW   2010 IEEE Computer Security Foundations Workshop
Wall of Fame | Most Viewed CSFW-2010 Paper
13 years 3 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source235
2Download preprint from source233
3Download preprint from source232
4Download preprint from source227
5Download preprint from source213
6Download preprint from source208
7Download preprint from source204
8Download preprint from source200
9Download preprint from source195
10Download preprint from source187
11Download preprint from source183
12Download preprint from source182
13Download preprint from source178
14Download preprint from source177
15Download preprint from source177
16Download preprint from source176
17Download preprint from source174
18Download preprint from source170
19Download preprint from source167
20Download preprint from source154
21Download preprint from source152
22Download preprint from source130