Kudo et al., 2001 - Google Patents
Access control model with provisional actionsKudo et al., 2001
- Document ID
- 4614675126839254309
- Author
- Kudo M
- Hada S
- Publication year
- Publication venue
- IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
External Links
Snippet
In most access control systems, authorization is specified using binary decisions," yes" or" no," to the access requests resulting in access being permitted or denied respectively. We argue that emerging Internet applications require that this binary decision be extended to" …
- 102100003973 CDK2AP1 0 description 6
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Maesa et al. | Blockchain based access control services | |
| Hu et al. | Assessment of access control systems | |
| US9213843B2 (en) | Analyzing access control configurations | |
| US7669238B2 (en) | Evidence-based application security | |
| EP1309906B1 (en) | Evidence-based security policy manager | |
| US6125447A (en) | Protection domains to provide security in a computer system | |
| US7185192B1 (en) | Methods and apparatus for controlling access to a resource | |
| US6934758B2 (en) | Stack-based access control using code and executor identifiers | |
| US7120635B2 (en) | Event-based database access execution | |
| CN101512505B (en) | Security language translations with logic resolution | |
| Zhang et al. | Synthesising verified access control systems in XACML | |
| Srivatsa et al. | An access control system for web service compositions | |
| Kudo et al. | Access control model with provisional actions | |
| Muthukumaran et al. | Producing hook placements to enforce expected access control policies | |
| Karjoth | An operational semantics of Java 2 access control | |
| Kudo | Pbac: Provision-based access control model | |
| Tolba et al. | Handling capabilities in security policies | |
| Dang et al. | XACs-DyPol: Towards an XACML-based Access Control Model for Dynamic Security Policy | |
| Scaglioso et al. | Modern standard-based access control in network services: XACML in action | |
| Chaturvedi et al. | A Study of Attribute-Based Access Control (ABAC) Languages: A Real-World Perspective | |
| Morimoto et al. | Patterning protection profiles by UML for security specifications | |
| Calero et al. | Towards an authorisation model for distributed systems based on the Semantic Web | |
| Benferhat et al. | Integrating non elementary actions in access control models | |
| Ghazinour et al. | A dynamic trust model enforcing security policies | |
| Louis | Secure the Border and Build the Wall |