Samarati, 2002 - Google Patents
Enriching access control to support credential-based specificationsSamarati, 2002
View PDF- Document ID
- 4129844810399267458
- Author
- Samarati P
- Publication year
External Links
Snippet
Accessing information over the Internet has become an essential requirement in modern economy, and unknown parties can come together on the Net and interact for the purpose of acquiring or offering services. The open and dynamic nature of such scenario requires the …
- 238000011161 development 0 abstract description 6
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8659997B2 (en) | Policy-based service management system | |
| US20130014211A1 (en) | Application identity design | |
| Li et al. | Access control for the services oriented architecture | |
| Nagaratnam et al. | Practical delegation for secure distributed object environments | |
| Kerschbaum et al. | Security architecture for virtual organizations of business web services | |
| Park et al. | Trusted P2P computing environments with role-based access control | |
| Karp et al. | Solving the transitive access problem for the services oriented architecture | |
| Koshutanski et al. | A negotiation scheme for access rights establishment in autonomic communication | |
| Ni et al. | A trust aware access control in service oriented grid environment | |
| Ardagna et al. | Trust management | |
| Samarati | Enriching access control to support credential-based specifications | |
| Demchenko et al. | Vo-based dynamic security associations in collaborative grid environment | |
| Ahn et al. | Towards secure information sharing using role-based delegation | |
| Forné et al. | Pervasive authentication and authorization infrastructures for mobile users | |
| Pham et al. | On a taxonomy of delegation | |
| Adamski et al. | Security and performance enhancements to OGSA‐DAI for Grid data virtualization | |
| Phoomvuthisarn | Trust and role based access control for secure interoperation (“TracSI”) | |
| Wang et al. | Edge-enabled IAM for IoTs with edge-based access management and context-driven syncservice | |
| Shakarami et al. | Safety and Consistency of Mutable Attributes Using Quotas: A Formal Analysis | |
| Laborde et al. | A secure collaborative web-based environment for virtual organisations | |
| Bonatti et al. | Towards flexible credential negotiation protocols | |
| Ma et al. | Authentication delegation for subscription-based remote network services | |
| Cotroneo et al. | Securing services in nomadic computing environments | |
| Lutz | Secure aaa by means of identity tokens in next generation mobile environments | |
| Hatala et al. | Unlocking repositories: Federated security solution for attribute and policy based access to repositories via web services |