Modeling and detecting the cascade vulnerability problem using soft constraints
Proceedings of the 2004 ACM symposium on Applied computing
An integrated approach to engineer and enforce context constraints in RBAC environments
ACM Transactions on Information and System Security (TISSEC)
A soft constraint-based approach to the cascade vulnerability problem
Journal of Computer Security - Special issue on security track at ACM symposium on applied computing 2004
Administering access control in dynamic coalitions
LISA '05 Proceedings of the 19th conference on Large Installation System Administration Conference - Volume 19
Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation
Electronic Notes in Theoretical Computer Science (ENTCS)
Dynamic trust negotiation for flexible e-health collaborations
Proceedings of the 15th ACM Mardi Gras conference: From lightweight mash-ups to lambda grids: Understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilities
IAAI'04 Proceedings of the 16th conference on Innovative applications of artifical intelligence
Dynamic adaptation of access control policies
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Hi-index | 0.00 |
We examine the problem of negotiating access controlpolicies between autonomous domains. Our objective isto develop software agents that can automatically negotiateaccess control policies between autonomous domains withminimal human guidance. In this paper we show a mathematicalframework that is capable of expressing many suchnegotiation problems, and illustrate its application to somepractical scenarios.