Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleJune 2004
Towards a credential-based implementation of compound access control policies
SACMAT '04: Proceedings of the ninth ACM symposium on Access control models and technologiesPages 31–40https://doi.org/10.1145/990036.990042We describe a layered approach to access control for distributed and interoperable computing systems. Firstly, compound access control policies are conceptually specified, using the policy algebra proposed by Bonatti, Capitani di Vimercati and Samarati. ...
- ArticleJune 2004
Implementing access control to people location information
SACMAT '04: Proceedings of the ninth ACM symposium on Access control models and technologiesPages 11–20https://doi.org/10.1145/990036.990039Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person's current location is asensitive piece of information, which only authorized entities should be able to learn. Several challenges arise in ...