Understanding computers and cognition
Understanding computers and cognition
Distributed processing of logic programs
SIGMOD '88 Proceedings of the 1988 ACM SIGMOD international conference on Management of data
Operating system concepts (3rd ed.)
Operating system concepts (3rd ed.)
Content-dependent access control
ACM SIGOPS Operating Systems Review
Janus: a step towards distributed constraint programming
Proceedings of the 1990 North American conference on Logic programming
Does licensing require new access control techniques?
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Ensuring integrity by adding obligations to privileges
ICSE '85 Proceedings of the 8th international conference on Software engineering
Law of Electronic Commerce: EDI, E-Mail and Internet: Technology, Proof and Liability
Law of Electronic Commerce: EDI, E-Mail and Internet: Technology, Proof and Liability
ACM SIGOPS Operating Systems Review
SP '92 Proceedings of the 1992 IEEE Symposium on Security and Privacy
Interactive credential negotiation for stateful business processes
iTrust'05 Proceedings of the Third international conference on Trust Management
Hi-index | 0.00 |
We introduce a framework for access/action control which shifts the emphasis from the participants to their relationships. The framework is based on a communication model in which participants negotiate the mutually agreed-upon boundary conditions of their relationships, and create social reference points by encapsulating them in compact "communication pacts," called "commpacts." Commpacts are designed to provide a language enabling a social mechanism of coordinated expectation. We argue that in networked environments characterized by multiple authorities and "trusted proxies," this model can deal with the complexities of general (user- and content-dependent) distributed access/action control and provides a clear user-conceptual metaphor The framework embeds naturally into the existing legal and institutional infrastructure; it generalizes work in electronic contracting. Commpacts can be seen as a third fundamental type next to access-control lists (ACLs) and capabilities.