Using trust and risk in role-based access control policies.
Nathan DimmockAndrás BelokosztolszkiDavid M. EyersJean BaconKen MoodyPublished in: SACMAT (2004)
Keyphrases
- access control policies
- trust negotiation
- access control
- access control models
- conflict resolution
- access rights
- access control systems
- automated trust negotiation
- trust relationships
- distributed environment
- trust management
- security policies
- fine grained
- role based access control
- extended logic programs
- security mechanisms
- trust evaluation
- loosely coupled
- data management
- multi agent systems
- data migration
- access control mechanism
- digital rights management
- virtual communities
- original data
- intrusion detection