Access Authorization - Explore the Science & Experts | ideXlab


Scan Science and Technology

Contact Leading Edge Experts & Companies

Access Authorization

The Experts below are selected from a list of 1014 Experts worldwide ranked by ideXlab platform

Access Authorization – Free Register to Access Experts & Abstracts

Francesco Santini – One of the best experts on this subject based on the ideXlab platform.

  • Negotiation of Weighted RTML Credentials on Mobile Devices
    Information Systems: Crossroads for Organization Management Accounting and Engineering, 2012
    Co-Authors: Stefano Bistarelli, Fabio Martinelli, Francesco Roperti, Francesco Santini

    Abstract:

    In this paper we describe an implementation for mobile phones of two important services in logical reasoning, that is deduction and abduction, defined over a set of weighted credentials. The main benefit comes during the process of automated Access Authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not sufficient, abduction can be used to compute the missing credentials and the levels that grant the Access. We implement a negotiation of credentials between two mobile devices in order to grant the Access to the requestor peer, with the use of deduction/abduction services.

    Free Register to Access Article

  • ATC – A formal framework for trust policy negotiation in autonomic systems: abduction with soft constraints
    Lecture Notes in Computer Science, 2010
    Co-Authors: Stefano Bistarelli, Fabio Martinelli, Francesco Santini

    Abstract:

    We show that soft constraints can be used to model logical reasoning, that is deduction and abduction (and induction). In particular, we focus on the abduction process and we show how it can be implemented with a (soft) constraint removal operator. As a running application example throughout the paper, we reason with Access control policies and credentials. In this way, we can associate the level of preference defined by the “softness” of the constraint with a “level” of trust. The main benefit comes during the process of automated Access Authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not sufficient, abduction can be used to compute the missing credentials and the levels that grant the Access, making the request a (weighted) logical consequence. The proposed framework can be used to automate the deduction-abduction negotiation processes.

    Free Register to Access Article

  • A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction
    , 2010
    Co-Authors: Stefano Bistarelli, Fabio Martinelli, Francesco Santini

    Abstract:

    We show that soft constraints can be used to model logical reasoning, that is deduction and abduction (and induction). In partic- ular, we focus on the abduction process and we show how it can be implemented with a (soft) constraint removal operator. As a running application example throughout the paper, we reason with Access control policies and credentials. In this way, we can associate the level of preference de¯ned by the \softness” of the constraint with a \level” of trust. The main bene¯t comes during the process of automated Access Authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not su±cient, abduction can be used to compute the missing credentials and the levels that grant the Access, making the request a (weighted) logical consequence. The proposed framework can be used to automate the deduction-abduction negotiation processes.

    Free Register to Access Article

J.r. Burruss – One of the best experts on this subject based on the ideXlab platform.

  • ROAM: An Authorization Manager for Grids
    Journal of Grid Computing, 2006
    Co-Authors: J.r. Burruss, T. W. Fredian, M. R. Thompson

    Abstract:

    The Resource Oriented Authorization Manager (ROAM) was created to provide a simple but flexible Authorization system for the FusionGrid computational Grid. ROAM builds on and extends previous community efforts by both responding to Access Authorization requests and by providing a Web interface for resource management. ROAM works with the Globus Resource Allocation Manager (GRAM), and is general enough to be used by other virtual organizations that use Globus middleware or X.509/TLS authentication schemes to secure a Grid of distributed resources. In addition to describing ROAM, this paper discusses the basic design parameters of a Grid Authorization system and the reasons for the choices made in the ROAM design.

    Free Register to Access Article

  • HPDC – The resource oriented Authorization manager (ROAM)
    HPDC-14. Proceedings. 14th IEEE International Symposium on High Performance Distributed Computing 2005., 1
    Co-Authors: J.r. Burruss

    Abstract:

    The resource oriented Authorization manager (ROAM) was created to provide a simple but flexible Authorization system for the National Fusion Grid (FusionGrid). This system builds on and extends previous community efforts by both responding to Access Authorization requests and by providing a Web interface/or resource management. ROAM works with the globus resource allocation manager (GRAM), and is general enough to be used by other virtual organizations that use Globus middleware or X.509/TLS authentication schemes to secure a grid of distributed resources.

    Free Register to Access Article

Stefano Bistarelli – One of the best experts on this subject based on the ideXlab platform.

  • Negotiation of Weighted RTML Credentials on Mobile Devices
    Information Systems: Crossroads for Organization Management Accounting and Engineering, 2012
    Co-Authors: Stefano Bistarelli, Fabio Martinelli, Francesco Roperti, Francesco Santini

    Abstract:

    In this paper we describe an implementation for mobile phones of two important services in logical reasoning, that is deduction and abduction, defined over a set of weighted credentials. The main benefit comes during the process of automated Access Authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not sufficient, abduction can be used to compute the missing credentials and the levels that grant the Access. We implement a negotiation of credentials between two mobile devices in order to grant the Access to the requestor peer, with the use of deduction/abduction services.

    Free Register to Access Article

  • ATC – A formal framework for trust policy negotiation in autonomic systems: abduction with soft constraints
    Lecture Notes in Computer Science, 2010
    Co-Authors: Stefano Bistarelli, Fabio Martinelli, Francesco Santini

    Abstract:

    We show that soft constraints can be used to model logical reasoning, that is deduction and abduction (and induction). In particular, we focus on the abduction process and we show how it can be implemented with a (soft) constraint removal operator. As a running application example throughout the paper, we reason with Access control policies and credentials. In this way, we can associate the level of preference defined by the “softness” of the constraint with a “level” of trust. The main benefit comes during the process of automated Access Authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not sufficient, abduction can be used to compute the missing credentials and the levels that grant the Access, making the request a (weighted) logical consequence. The proposed framework can be used to automate the deduction-abduction negotiation processes.

    Free Register to Access Article

  • A Formal Framework for Trust Policy Negotiation in Autonomic Systems: Abduction
    , 2010
    Co-Authors: Stefano Bistarelli, Fabio Martinelli, Francesco Santini

    Abstract:

    We show that soft constraints can be used to model logical reasoning, that is deduction and abduction (and induction). In partic- ular, we focus on the abduction process and we show how it can be implemented with a (soft) constraint removal operator. As a running application example throughout the paper, we reason with Access control policies and credentials. In this way, we can associate the level of preference de¯ned by the \softness” of the constraint with a \level” of trust. The main bene¯t comes during the process of automated Access Authorization based on trust: soft constraint operations can be easily adopted to measure the level of trust required for each operation. Moreover, when the level is not su±cient, abduction can be used to compute the missing credentials and the levels that grant the Access, making the request a (weighted) logical consequence. The proposed framework can be used to automate the deduction-abduction negotiation processes.

    Free Register to Access Article