An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies.
Janice WarnerVijayalakshmi AtluriRavi MukkamalaPublished in: ICISS (2005)
Keyphrases
- access control policies
- access control
- trust negotiation
- conflict resolution
- security policies
- distributed environment
- fine grained
- access control systems
- extended logic programs
- automated trust negotiation
- role based access control
- security mechanisms
- access control models
- trust management
- identity management
- artificial intelligence
- security requirements
- intelligent agents
- distributed systems