A Self-Sovereign Identity Approach to Decentralized Access Control with Transitive Delegations.
Pieter-Jan VrielynckTim Van hammeRawad GhostinBert LagaisseDavy PreuveneersWouter JoosenPublished in: SACMAT (2024)
Keyphrases
- access control
- access control models
- identity management
- access control policies
- access control systems
- role based access control
- role based access control model
- access rights
- fine grained
- security policies
- data security
- dynamic access control
- database security
- multi agent
- distributed systems
- security requirements
- distributed environment
- privacy aware
- rbac model
- peer to peer
- security mechanisms
- security issues
- usage control
- databases
- security model
- computer networks
- intelligent agents
- role assignment