[go: up one dir, main page]

Kudo et al., 2001 - Google Patents

Access control model with provisional actions

Kudo et al., 2001

Document ID
4614675126839254309
Author
Kudo M
Hada S
Publication year
Publication venue
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

External Links

Snippet

In most access control systems, authorization is specified using binary decisions," yes" or" no," to the access requests resulting in access being permitted or denied respectively. We argue that emerging Internet applications require that this binary decision be extended to" …
Continue reading at search.ieice.org (other versions)

Similar Documents

Publication Publication Date Title
Maesa et al. Blockchain based access control services
Hu et al. Assessment of access control systems
US9213843B2 (en) Analyzing access control configurations
US7669238B2 (en) Evidence-based application security
EP1309906B1 (en) Evidence-based security policy manager
US6125447A (en) Protection domains to provide security in a computer system
US7185192B1 (en) Methods and apparatus for controlling access to a resource
US6934758B2 (en) Stack-based access control using code and executor identifiers
US7120635B2 (en) Event-based database access execution
CN101512505B (en) Security language translations with logic resolution
Zhang et al. Synthesising verified access control systems in XACML
Srivatsa et al. An access control system for web service compositions
Kudo et al. Access control model with provisional actions
Muthukumaran et al. Producing hook placements to enforce expected access control policies
Karjoth An operational semantics of Java 2 access control
Kudo Pbac: Provision-based access control model
Tolba et al. Handling capabilities in security policies
Dang et al. XACs-DyPol: Towards an XACML-based Access Control Model for Dynamic Security Policy
Scaglioso et al. Modern standard-based access control in network services: XACML in action
Chaturvedi et al. A Study of Attribute-Based Access Control (ABAC) Languages: A Real-World Perspective
Morimoto et al. Patterning protection profiles by UML for security specifications
Calero et al. Towards an authorisation model for distributed systems based on the Semantic Web
Benferhat et al. Integrating non elementary actions in access control models
Ghazinour et al. A dynamic trust model enforcing security policies
Louis Secure the Border and Build the Wall