[go: up one dir, main page]

Samarati, 2002 - Google Patents

Enriching access control to support credential-based specifications

Samarati, 2002

View PDF
Document ID
4129844810399267458
Author
Samarati P
Publication year

External Links

Snippet

Accessing information over the Internet has become an essential requirement in modern economy, and unknown parties can come together on the Net and interact for the purpose of acquiring or offering services. The open and dynamic nature of such scenario requires the …
Continue reading at dl.gi.de (PDF) (other versions)

Similar Documents

Publication Publication Date Title
US8659997B2 (en) Policy-based service management system
US20130014211A1 (en) Application identity design
Li et al. Access control for the services oriented architecture
Nagaratnam et al. Practical delegation for secure distributed object environments
Kerschbaum et al. Security architecture for virtual organizations of business web services
Park et al. Trusted P2P computing environments with role-based access control
Karp et al. Solving the transitive access problem for the services oriented architecture
Koshutanski et al. A negotiation scheme for access rights establishment in autonomic communication
Ni et al. A trust aware access control in service oriented grid environment
Ardagna et al. Trust management
Samarati Enriching access control to support credential-based specifications
Demchenko et al. Vo-based dynamic security associations in collaborative grid environment
Ahn et al. Towards secure information sharing using role-based delegation
Forné et al. Pervasive authentication and authorization infrastructures for mobile users
Pham et al. On a taxonomy of delegation
Adamski et al. Security and performance enhancements to OGSA‐DAI for Grid data virtualization
Phoomvuthisarn Trust and role based access control for secure interoperation (“TracSI”)
Wang et al. Edge-enabled IAM for IoTs with edge-based access management and context-driven syncservice
Shakarami et al. Safety and Consistency of Mutable Attributes Using Quotas: A Formal Analysis
Laborde et al. A secure collaborative web-based environment for virtual organisations
Bonatti et al. Towards flexible credential negotiation protocols
Ma et al. Authentication delegation for subscription-based remote network services
Cotroneo et al. Securing services in nomadic computing environments
Lutz Secure aaa by means of identity tokens in next generation mobile environments
Hatala et al. Unlocking repositories: Federated security solution for attribute and policy based access to repositories via web services