enter search term and/or author name
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
Ting Yu, Marianne Winslett, Kent E. Seamons
Business and military partners, companies and their customers, and other closely cooperating parties may have a compelling need to conduct sensitive interactions on line, such as accessing each other's local services and other local resources....
On the relationship between strand spaces and multi-agent systems
Joseph Y. Halpern, Riccardo Pucella
Strand spaces are a popular framework for the analysis of security protocols. Strand spaces have some similarities to a formalism used successfully to model protocols for distributed systems, namely multi-agent systems. We explore the...
A logical framework for reasoning about access control models
Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca
The increased awareness of the importance of data protection has made access control a relevant component of current data management systems. Moreover, emerging applications and data models call for flexible and expressive access control models. This...
Delegation logic: A logic-based approach to distributed authorization
Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum
We address the problem of authorization in large-scale, open, distributed systems. Authorization decisions are needed in electronic commerce, mobile-code execution, remote resource sharing, privacy protection, and many other applications. We adopt...