Systeme et procede destines a determiner la securite, la confidentialite, et le controle d'acces a des informations utilisees par d'autres

作者: Etienne Coulon , François-Frederic Ozog

DOI:

关键词:

摘要: L'invention concerne un concedant delivrant document electronique pouvant etre mis en trust au benefice d'un demandeur. Ce demandeur peut obtenir les benefices specifies par le grâce controle d'acces situe a l'origine du service ou des informations. Une demande numerique signee est recue. Cette contient signe numeriquement concedant. egalement une reference certifiee de concedant, demandeur, et regles destinees La validee moyen la

参考文章(6)
Abdelilah Essiari, William Johnston, Gary Hoo, Keith Jackson, Mary Thompson, Srilekha Mudumbai, Certificate-based access control for widely distributed resources usenix security symposium. pp. 17- 17 ,(1999)
Paul Ashley, Mark Vandenwauver, Joris Claessens, Using SESAME to Secure Web Based Applications on an Intranet communications and multimedia security. pp. 303- 318 ,(1999) , 10.1007/978-0-387-35568-9_21
Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Design and implementation of an access control processor for XML documents the web conference. ,vol. 33, pp. 59- 75 ,(2000) , 10.1016/S1389-1286(00)00053-0
B Zhan, Z Li, Y Yang, Z Hu, Research note: On the security of HY-key authentication scheme Computer Communications. ,vol. 22, pp. 739- 741 ,(1999) , 10.1016/S0140-3664(99)00032-8
John Linn, Magnus Nyström, Attribute certification: an enabling technology for delegation and role-based controls in distributed environments Proceedings of the fourth ACM workshop on Role-based access control. pp. 121- 130 ,(1999) , 10.1145/319171.319183
A. Herzberg, Y. Mass, J. Mihaeli, D. Naor, Y. Ravid, Access control meets public key infrastructure, or: assigning roles to strangers ieee symposium on security and privacy. pp. 2- 14 ,(2000) , 10.1109/SECPRI.2000.848442