w/in this Title
Access control models and technologies
1-2 of 2 reviews
Peer-to-peer access control architecture using trusted computing technology
Sandhu R., Zhang X. Access control models and technologies (Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, Jun 1-3, 2005) 147-158, 2005. Type: Proceedings
Trusted computing (TC) architectures are a new and interesting subject. Instead of authenticating users or subjects, we now authenticate a platform where an application will execute. This can prevent impostor hardware or operating systems, but req...
Dec 1 2005
Context sensitive access control
Hulsebosch R., Salden A., Bargh M., Ebben P., Reitsma J. Access control models and technologies (Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, Jun 1-3, 2005) 111-119, 2005. Type: Proceedings
Context-sensitive access control allows users to access services based on environmental attributes rather than solely on identity attributes. For example, train passengers could be granted access to a train’s mobile network while riding ...
Aug 19 2005
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2022 ThinkLoud, Inc.