Provenance access control has been recognized as one of the most important components in an enterprise-level provenance system. However, it has only received little attention in th...
Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu...
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Role-based access control has been a focal area for many security researchers over the last decade. There have been a large number of models, and many rich specification language...