Amanote Research

Amanote Research

    RegisterSign In

On the Security of Delegation in Access Control Systems

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-540-88313-5_21
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2008

Authors
Qihua WangNinghui LiHong Chen
Publisher

Springer Berlin Heidelberg


Related search

Modularity and Dynamic Adaptation of Flexibly Secure Systems: Model-Driven Adaptive Delegation in Access Control Management

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2014English

Access Documents of Integrated Security Systems

Engineering Journal: Science and Innovation
2012English

Access Control List Provides Security in Network

International Journal of Computer Applications
2015English

MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems

2008English

Security Analysis for Temporal Role Based Access Control

Journal of Computer Security
RiskComputer NetworksHardwareCommunicationsReliabilitySafetyArchitectureQualitySoftware
2014English

Synthesising Verified Access Control Systems in XACML

2004English

A Meta-Model of Access Control in a Fibred Security Language

Studia Logica
Philosophy of ScienceLogicHistory
2009English

Improving the Efficiency of Control Signaling in Wireless Multiple Access Systems

2013English

Use of Role Based Access Control for Security-Purpose Hypervisors

2013English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy