Continuous authorization over HTTP using Verifiable Credentials and OAuth 2.0.
Nikos FotiouEvgenia FaltakaVasilis KalosAnna S. KefalaIakovos PittarasVasilios A. SirisGeorge C. PolyzosPublished in: Open Identity Summit (2022)
Keyphrases
- access control
- trust negotiation
- access control policies
- website
- fine grained
- security policies
- open source
- conflict resolution
- data security
- trust management
- dynamic access control
- sufficient conditions
- privacy preserving
- machine learning
- security mechanisms
- reinforcement learning
- discrete space
- decision trees
- usage control