R Sion, M Atallah, S Prabhakar - Proceedings of the 2003 ACM SIGMOD …, 2003 - dl.acm.org
Protecting rights over relational data is of ever increasing interest, especially considering areas where sensitive, valuable content is to be outsourced. A good example is a data …
WH Winsborough, KE Seamons… - … and Exposition. DISCEX …, 2000 - ieeexplore.ieee.org
Distributed software subjects face the problem of determining one another's trustworthiness. The problem considered is managing the exchange of credentials between strangers for the …
We address the problem of authorization in large-scale, open, distributed systems. Authorization decisions are needed in electronic commerce, mobile-code execution, remote …
Despite considerable advancements in the area of access control and authorization languages, current approaches to enforcing access control are all based on monolithic and …
A Herzberg, Y Mass, J Mihaeli, D Naor… - Proceeding 2000 IEEE …, 2000 - ieeexplore.ieee.org
The Internet enables connectivity between many strangers: entities that don't know each other. We present the Trust Policy Language (TPL), used to define the mapping of strangers …
L Zhang, GJ Ahn, BT Chu - … on Information and System Security (TISSEC …, 2003 - dl.acm.org
Delegation is the process whereby an active entity in a distributed environment authorizes another entity to access resources. In today's distributed systems, a user often needs to act …
PA Bonatti, P Samarati - Journal of Computer Security, 2002 - content.iospress.com
The widespread use of Internet-based services is increasing the amount of information (such as user profiles) that clients are required to disclose. This information demand is necessary …
CJ Liau - Artificial Intelligence, 2003 - Elsevier
In this paper, we consider the influence of trust on the assimilation of acquired information into an agent's belief. By use of modal logic, we semantically and axiomatically characterize …
BN Grosof, Y Labrou, HY Chan - … of the 1st ACM Conference on …, 1999 - dl.acm.org
We address why, and especially how, to represent business rules in e-commerce contracts. By contracts, we mean descriptions of goods and services offered or sought, including …