Model for attribute based access control
Constrained database was used to abstractly describe access request,attribute authority,policies and decision procedure. An attribute based access control model was proposed. The relationships among access request,attribute au-thority,policies and decision procedure were discussed. A special conditi...
Saved in:
Main Authors: | LI Xiao-feng1~4, FENG Deng-guo1, CHEN Zhao-wu3, FANG Zi-he4 |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2008-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74655340/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Attribute-based revocable collaborative access control scheme
by: Changgen PENG, et al.
Published: (2021-05-01) -
Ciphertext policy attribute-based encryption scheme supporting direct revocation
by: Xi-xi YAN, et al.
Published: (2016-05-01) -
Attribute-based encryption scheme with efficient revocation in data outsourcing systems
by: Xi-xi YAN, et al.
Published: (2015-10-01) -
Attribute based sanitizable signature scheme
by: Xi-meng LIU, et al.
Published: (2013-08-01) -
Enhanced cloud storage access control scheme based on attribute
by: De-hua NIU, et al.
Published: (2013-08-01)