نشرت في: July 2010
Although access control is currently a key component of any computational system, it is only recently that mechanisms to guard against unauthorized a...
نشرت في: December 2010
Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine the latency to arbitrary hosts wi...
Several credential systems have been proposed in which users can authenticate to service providers anonymously. Since anonymity can give users the li...
We propose the role-and-relation-based access control (R2BAC) model for workflow authorization systems. In R2BAC, in addition to a user’s role member...
Anonymity with identity escrow attempts to allow users of an online service to remain anonymous, while providing the possibility that the service own...