Search
w/in this Title
for Titles
All Reviews
Access control models and technologies
ACM Press
Options:
Date Reviewed
Title
Author
Publisher
Published Date
Descending Order
Ascending Order
1-2 of 2 reviews
Date Reviewed
Peer-to-peer access control architecture using trusted computing technology
Sandhu R., Zhang X. Access control models and technologies (Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, Jun 1-3, 2005) 147-158, 2005. Type: Proceedings
Trusted computing (TC) architectures are a new and interesting subject. Instead of authenticating users or subjects, we now authenticate a platform where an application will execute. This can prevent impostor hardware or operating syst...
Dec 1 2005
Context sensitive access control
Hulsebosch R., Salden A., Bargh M., Ebben P., Reitsma J. Access control models and technologies (Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, Jun 1-3, 2005) 111-119, 2005. Type: Proceedings
Context-sensitive access control allows users to access services based on environmental attributes rather than solely on identity attributes. For example, train passengers could be granted access to a train’s mobile netwo...
Aug 19 2005
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy