Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
We study the specification of access control policy in large-scale distributed systems. We present Cassandra, a language and system for expressing policy, and the results of a sub...
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
-- To date, not enough attention has been paid to issues surrounding the description and enforcement of policies for controlling Grid resources. These policies define the permitted...
Role-based access control (RBAC) is recognized as an efficient access control model for large organizations. Most organizations have some business rules related to access control...