Proceedings of ... ACM Symposium on Access Control Models and Technologies: SACMAT ...Association for Computing Machinery, 2004 - Computers |
Contents
Implementing Access Control to People Location Information | 11 |
RoleBased Access Control in Ambient and Remote Space | 21 |
Towards a CredentialBased Implementation of Compound Access | 31 |
Copyright | |
13 other sections not shown
Other editions - View all
Common terms and phrases
Access Control Models access control policy access decision access request access rights activation Admin Role algorithm Alice allow application security authorisation certificate authorization sphere Bertino can_assign certificate chain Certificate-based Encryption Computer Computer Security configuration conflict resolution constraint conflict defined delegation chain delegation credential denoted distributed domain edge enforce enterprise entity example expression Ferraiolo Figure framework given grants access graph rule GTRBAC IEEE impact implementation language location information location policy Locator service node object diagram operation organizational role p₁ permissions predicates privilege public key query RBAC requires role graph role hierarchy Role-Based Access Control role-based cascaded delegation SACMAT Sandhu SARBAC Section security analysis security context security policy SELinux semantics separation of duty server signature specified SPKI/SDSI subject types sysadm system roles System Security tion trust level tuple UCON update User Assignment X-GTRBAC XML documents XML Schema XPath Yorktown Heights