Avoiding Delegation Subterfuge Using Linked Local Permission Names.
Simon N. FoleySamane AbdiPublished in: Formal Aspects in Security and Trust (2011)
Keyphrases
- role based access control
- access control
- security policies
- access control systems
- access control policies
- multi domain
- named entities
- fine grained
- keywords
- third party
- conflict resolution
- computer vision
- expert systems
- data security
- network security
- person names
- adjustable autonomy
- multiagent systems
- natural language
- case study