Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Access control models and technologies
ACM Press
 
   
 
Options:
 
  1-2 of 2 reviews Date Reviewed 
  Peer-to-peer access control architecture using trusted computing technology
Sandhu R., Zhang X.  Access control models and technologies (Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, Jun 1-3, 2005) 147-158, 2005.  Type: Proceedings

Trusted computing (TC) architectures are a new and interesting subject. Instead of authenticating users or subjects, we now authenticate a platform where an application will execute. This can prevent impostor hardware or operating syst...

Dec 1 2005
  Context sensitive access control
Hulsebosch R., Salden A., Bargh M., Ebben P., Reitsma J.  Access control models and technologies (Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, Jun 1-3, 2005) 111-119, 2005.  Type: Proceedings

Context-sensitive access control allows users to access services based on environmental attributes rather than solely on identity attributes. For example, train passengers could be granted access to a train’s mobile netwo...

Aug 19 2005
 
 
   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy