Access control: Policies, models, and mechanisms

P Samarati, SC De Vimercati - … school on foundations of security analysis …, 2000 - Springer
Access control is the process of mediating every request to resources and data maintained
by a system and determining whether the request should be granted or denied. The access …

Authorization in trust management: Features and foundations

PC Chapin, C Skalka, XS Wang - ACM Computing Surveys (CSUR), 2008 - dl.acm.org
Trust management systems are frameworks for authorization in modern distributed systems,
allowing remotely accessible resources to be protected by providers. By allowing providers …

Understanding and improving computational science storage access through continuous characterization

P Carns, K Harms, W Allcock, C Bacon, S Lang… - ACM Transactions on …, 2011 - dl.acm.org
Computational science applications are driving a demand for increasingly powerful storage
systems. While many techniques are available for capturing the I/O behavior of individual …

A policy language for a pervasive computing environment

L Kagal, T Finin, A Joshi - Proceedings POLICY 2003. IEEE 4th …, 2003 - ieeexplore.ieee.org
We describe a policy language designed for pervasive computing applications that is based
on deontic concepts and grounded in a semantic language. The pervasive computing …

Flexible support for multiple access control policies

S Jajodia, P Samarati, ML Sapino… - ACM Transactions on …, 2001 - dl.acm.org
Although several access control policies can be devised for controlling access to
information, all existing authorization models, and the corresponding enforcement …

A fine-grained access control system for XML documents

E Damiani, S De Capitani di Vimercati… - ACM Transactions on …, 2002 - dl.acm.org
Web-based applications greatly increase information availability and ease of access, which
is optimal for public information. The distribution and sharing of information via the Web that …

Delegation logic: A logic-based approach to distributed authorization

N Li, BN Grosof, J Feigenbaum - ACM Transactions on Information and …, 2003 - dl.acm.org
We address the problem of authorization in large-scale, open, distributed systems.
Authorization decisions are needed in electronic commerce, mobile-code execution, remote …

An algebra for composing access control policies

P Bonatti, S De Capitani di Vimercati… - ACM Transactions on …, 2002 - dl.acm.org
Despite considerable advancements in the area of access control and authorization
languages, current approaches to enforcing access control are all based on monolithic and …

A logical language for expressing authorizations

S Jajodia, P Samarati… - Proceedings. 1997 IEEE …, 1997 - ieeexplore.ieee.org
A major drawback of existing access control systems is that they have all been developed
with a specific access control policy in mind. This means that all protection requirements (ie …

Compliance checking in the policymaker trust management system

M Blaze, J Feigenbaum, M Strauss - … , FC'98 Anguilla, British West Indies …, 1998 - Springer
Emerging electronic commerce services that use public-key cryptography on a mass-market
scale require sophisticated mechanisms for managing trust. For example, any service that …