Role-Based Access Control Models
Computer
Leveraging social networks for information sharing
CSCW '04 Proceedings of the 2004 ACM conference on Computer supported cooperative work
Software Abstractions: Logic, Language, and Analysis
Software Abstractions: Logic, Language, and Analysis
Role-Based Access Control, Second Edition
Role-Based Access Control, Second Edition
Role-Based Access Control in Peer-to-Peer (P2P) Societies
AINAW '08 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - Workshops
Hi-index | 0.00 |
When we write access-control description of the Web Applications using the group and the role, there is a problem that it is difficult for a user to decide the joint ownership partner of data. Therefore, there are the trials for describing access-control using social networks. However, unexpected defects might sneak in this description if it is marked in a careless manner. In this paper, we propose the formal definition of the access-control description consist of the first-order predicate logic for the automatic checking.