Publication | Closed Access
Timed constraint programming
25
Citations
37
References
2005
Year
Unknown Venue
Mathematical ProgrammingEngineeringInformation SecurityTrust Management ArchitectureLawPolicy LanguagesFormal VerificationOperations ResearchConstraint ProgrammingConstraint SolvingLogical Access ControlAccess ControlUsage ControlSystems EngineeringCombinatorial OptimizationData PrivacyTrustComputer ScienceData SecurityCryptographyTrusted SystemConstraint SatisfactionFormal MethodsSecurityAuthentication Access Control
This paper focuses on policy languages for (role-based) access control [14, 32], especially in their modern incarnations in the form of trust-management systems [9] and usage control [30, 31]. Any (declarative) approach to access control and trust management has to address the following issues:
| Year | Citations | |
|---|---|---|
Page 1
Page 1