Building access control policy model for privacy preserving and testing policy conflicting problems
This chapter proposes a purpose-based access control model in distributed computing
environment for privacy preserving policies and mechanisms, and describes algorithms for …
environment for privacy preserving policies and mechanisms, and describes algorithms for …
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within
computing infrastructures that is blended into a background and no longer be reminded …
computing infrastructures that is blended into a background and no longer be reminded …
Ubiquitous computing environments and its usage access control
Ubiquitous computing aims to enhance computer use by utilizing many computer resources
available through physical environments, but also making them invisible to users. The …
available through physical environments, but also making them invisible to users. The …
ABDM: An extended flexible delegation model in RBAC
M Li, H Wang - 2008 8th IEEE International Conference on …, 2008 - ieeexplore.ieee.org
Role-based access control (RBAC) is recognized as an efficient access control model and
its delegation authority has been proved to be flexible and useful for information sharing on …
its delegation authority has been proved to be flexible and useful for information sharing on …
Delegating revocations and authorizations in collaborative business environments
Efficient collaboration allows organizations and individuals to improve the efficiency and
quality of their business activities. Delegations, as a signif icant approach, may occur as …
quality of their business activities. Delegations, as a signif icant approach, may occur as …
Commitment issues in delegation process
Q Pham, J Reid, A McCullagh… - Proceedings of the Sixth …, 2008 - eprints.qut.edu.au
Delegation is a powerful mechanism to provide flexible and dynamic access control
decisions. Delegation is particularly useful in federated environments where multiple …
decisions. Delegation is particularly useful in federated environments where multiple …
Untraceable Electronic Cash System in the Internet of Things
Untraceable Electronic Cash System in the Internet of Things | SpringerLink Skip to main
content Advertisement SpringerLink Account Menu Find a journal Publish with us Track your …
content Advertisement SpringerLink Account Menu Find a journal Publish with us Track your …
A Self-Scalable Anonymity Payment Approach in Cloud Environment
An efficient electronic cash scheme has been developed in the last chapter. This chapter
proposes a secure, anonymity scalable and practical payment protocol for Internet …
proposes a secure, anonymity scalable and practical payment protocol for Internet …
Trust-based access control management in collaborative open social networks
This chapter proposes a trust involved access management framework for supporting
privacy preserving access control policies and mechanisms. The mechanism enforces …
privacy preserving access control policies and mechanisms. The mechanism enforces …