Cited By
View all- Ma JOrgun MSattar A(2009)Theories of Trust for Communication ProtocolsProceedings of the 6th International Conference on Autonomic and Trusted Computing10.1007/978-3-642-02704-8_18(236-248)Online publication date: 30-Jun-2009
Obligations are generally actions that users are required to take and are essential for the expression of a large number of requirements. For instance, obligation actions may represent prerequisites to gain some privilege (pre obligations), to satisfy ...
It is difficult to develop and manage large, multi-author access control policies without a means to compose larger policies from smaller ones. Ideally, an access-control policy language will have a small set of simple policy combinators that allow for ...
A security policy of an information system is a set of security requirements that correspond to permissions, prohibitions and obligations to execute some actions when some contextual conditions are satisfied. Traditional approaches consider that the ...
Australian Computer Society, Inc.
Australia
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in