Application-Oriented Security Policies and Their Composition (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
Review and Revocation of Access Privileges Distributed with PKI Certificates
Revised Papers from the 8th International Workshop on Security Protocols
Reasoning about Joint Administration of Access Policies for Coalition Resources
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Administering access control in dynamic coalitions
LISA '05 Proceedings of the 19th conference on Large Installation System Administration Conference - Volume 19
Dynamic adaptation of access control policies
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Security of emergent properties in ad-hoc networks (transcript of discussion)
SP'04 Proceedings of the 12th international conference on Security Protocols
Hi-index | 0.00 |
Although the notion of negotiation has been used extensively in secure communication protocols to establish common keying states, protocol modes and services, this notion is only now emerging in the area of access control policies. In this paper, we review the motivation for access policy negotiation and we provide some examples of use in practice. In particular, we illustrate the meaning, the types, and the process of negotiation for establishing common access states and common interpretations of policy models for dynamic coalitions and large-scale access control in the Internet.