Attribute-Based Access Control

Results: 39



#Item
1

Attribute-Based Access Control - insider threats, security, privacy and trust

Add to Reading List

Source URL: comsec.spb.ru

- Date: 2015-12-03 06:47:14
    2Computer security / Security / Computer access control / Access control / Identity management / Role-based access control / Access control list / Access Control Matrix / Group / PERMIS / Attribute-Based Access Control

    UNIVERSITY OF TRENTO DIPARTIMENTO DI INGEGNERIA E SCIENZA DELL’INFORMAZIONEPovo – Trento (Italy), Via Sommarive 14 http://www.disi.unitn.it

    Add to Reading List

    Source URL: disi.unitn.it

    Language: English - Date: 2014-09-10 09:40:14
    3Cryptography / Computer security / Computer access control / Identity management / Public-key cryptography / Federated identity / Cryptographic protocols / Digital credential / Authentication / Credential / Multi-factor authentication / Access control

    Concepts and Languages for Privacy-Preserving Attribute-Based AuthenticationI,II Jan Camenischa,∗, Maria Dubovitskayaa,b , Robert R. Enderleina,b,∗∗, Anja Lehmanna , Gregory Nevena , Christian Paquinc , Franz-Stefa

    Add to Reading List

    Source URL: www.e7n.ch

    Language: English
    4Security / Access control / Computer security / Computer access control / Social information processing / Role-based access control / PERMIS / Web 2.0 / Social software / Attribute-Based Access Control

    Journal of Information Assurance and Security. ISSNVolumeppc MIR Labs, www.mirlabs.net/jias/index.html Enhanced Sharing and Privacy in Collaborative

    Add to Reading List

    Source URL: www.infosys.tuwien.ac.at

    Language: English - Date: 2012-06-04 07:35:14
    5Computer access control / Access control / XACML / Role-based access control / PERMIS / Authorization / Role hierarchy / Data integration / Spring Framework / Attribute-Based Access Control / OAuth

    Role-Based Access Control for e-Service Integration Peter Lamb, Robert Power, Gavin Walker and Michael Compton CSIRO ICT Centre GPO Box 664 Canberra ACT 2601 Australia +

    Add to Reading List

    Source URL: cups.cs.cmu.edu

    Language: English - Date: 2006-06-02 01:58:17
    6

    Access Sentinel Authorization Policy Server for Attribute Based Access Control ViewDS Access Sentinel

    Add to Reading List

    Source URL: viewds.com

    Language: English - Date: 2015-05-25 00:11:26
      7

      Attribute-Based Messaging: Access Control and Confidentiality Rakesh Bobba, Omid Fatemieh, Fariba Khan, Arindam Khan1 , Carl A. Gunter, Himanshu Khurana and Manoj Prabhakaran University of Illinois Urbana-Champaign

      Add to Reading List

      Source URL: seclab.illinois.edu

      Language: English - Date: 2011-03-23 14:47:43
        8

        c 2006 by Fariba Mahboobe Khan. All rights reserved. USING ATTRIBUTE-BASED ACCESS CONTROL TO ENABLE ATTRIBUTE-BASED MESSAGING

        Add to Reading List

        Source URL: seclab.illinois.edu

        Language: English - Date: 2011-04-23 09:18:25
          9

          MyABDAC: Compiling XACML Policies for Attribute-Based Database Access Control Sonia Jahid Carl A. Gunter

          Add to Reading List

          Source URL: seclab.illinois.edu

          Language: English - Date: 2011-03-31 11:07:25
            10

            PolicyMorph: Interactive Policy Transformations for a Logical Attribute-Based Access Control Framework Michael LeMay, Omid Fatemieh, and Carl A. Gunter University of Illinois at Urbana-Champaign ABSTRACT

            Add to Reading List

            Source URL: seclab.illinois.edu

            Language: English - Date: 2011-03-29 12:02:58
              UPDATE