A pragmatic approach towards secure sharing of digital objects
Abstract
References
- A pragmatic approach towards secure sharing of digital objects
Recommendations
Revocation Schemes for Delegation Licences
Information and Communications SecurityAbstractThe paper presents revocation schemes in role-based access control models. We are particularly interested in two key issues: how to perform revocation and how to manage the revocation policy. We show how to deal with these two aspects in the ...
Taxonomy of Delegation Model
ITNG '15: Proceedings of the 2015 12th International Conference on Information Technology - New GenerationsProtection of shared data from unauthorized users is the most challenging problem of cyber security for which different access control models have been introduced. However, to provide flexibility in access control models, access rights are delegated ...
Towards Effective Verification of Multi-Model Access Control Properties
SACMAT '19: Proceedings of the 24th ACM Symposium on Access Control Models and TechnologiesMany existing software systems like logistics systems or enterprise applications employ data security in a more or less ad hoc fashion. Our approach focuses on access control such as permission-based discretionary access control (DAC), variants of role-...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
John Wiley & Sons, Inc.
United States
Publication History
Author Tags
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0