Representation and evaluation of security policies for distributed system services
- 7 November 2002
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 2, 172-183
- https://doi.org/10.1109/discex.2000.821518
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- The performance of a reliable, request-response transport protocolPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Proxy-based authorization and accounting for distributed systemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Decentralized trust managementPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Role-based access control: a multi-dimensional viewPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Designing a distributed authorization servicePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A logical language for expressing authorizationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Separation of duty in role-based environmentsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Kerberos: an authentication service for computer networksIEEE Communications Magazine, 1994
- A calculus for access control in distributed systemsACM Transactions on Programming Languages and Systems, 1993
- Access control for collaborative environmentsPublished by Association for Computing Machinery (ACM) ,1992