Role-Based Access Control Models
Computer
A logical framework for reasoning about access control models
ACM Transactions on Information and System Security (TISSEC)
Reasoning About Security: A Logic and a Decision Method for Role-Based Access Control
ECSQARU/FAPR '97 Proceedings of the First International Joint Conference on Qualitative and Quantitative Practical Reasoning
Access Control: The Neglected Frontier
ACISP '96 Proceedings of the First Australasian Conference on Information Security and Privacy
Framework for role-based delegation models
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
The Description Logic Handbook
The Description Logic Handbook
ROWLBAC: representing role based access control in OWL
Proceedings of the 13th ACM symposium on Access control models and technologies
A Ring-Based Decentralized Collaborative Non-blocking Atomic Commit Protocol
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 02
Distributed Algorithm for Computing Formal Concepts Using Map-Reduce Framework
IDA '09 Proceedings of the 8th International Symposium on Intelligent Data Analysis: Advances in Intelligent Data Analysis VIII
Formalization of RBAC policy with object class hierarchy
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
ISPA '10 Proceedings of the International Symposium on Parallel and Distributed Processing with Applications
Annotation-based access control for collaborative information spaces
Computers in Human Behavior
Representation and reasoning on RBAC: a description logic approach
ICTAC'05 Proceedings of the Second international conference on Theoretical Aspects of Computing
Hi-index | 0.00 |
We propose a trust framework model for an educational cloud which is designed to overcome inequalities of M-shaped incomes by simplifying contract-based sharing of resources among multiple schools. We use class algebra, which is similar to SROIQ(D) description logic, as the access control policy language. Benefiting from the high expressivity of class algebra, our model can use implicit relations and reasoning to enforce access control that corresponds to the contracts. The security mechanism allows one-time user login to obtain all of this userâ聙聶s credentials for accessing services. In addition, our model can select appropriate material to adapt to the level of the student by adding the classification information to the attributes of the educational material and the student, and integrating this information into the access control policy to build an exclusive learning graph for each student.