A temporal authorization model
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
A discretionary access control model with temporal authorizations
NSPW '94 Proceedings of the 1994 workshop on New security paradigms
An authorization model for temporal data
Proceedings of the 7th ACM conference on Computer and communications security
Maintaining knowledge about temporal intervals
Communications of the ACM
An authorization model for temporal and derived data: securing information portals
ACM Transactions on Information and System Security (TISSEC)
ACM SIGOPS Operating Systems Review
Security controls in the ADEPT-50 time-sharing system
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
Protection: principles and practice
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
Hi-index | 0.00 |
A new model for representing temporal access control policies is introduced. In this model, temporal authorizations are represented by time attributes associated with both subjects and objects, and a “time interval access graph.” The time interval access graph is used to define constraints on the temporal relations between subjects and objects. Interval algebra is used to define and analyze the time interval access graph.