Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01
DOI: 10.1109/discex.2001.932159
|View full text |Cite
|
Sign up to set email alerts
|

Flexibly constructing secure groups in Antigone 2.0

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…Traditional conditions used in authorization policy simply poll local state variables (e.g., values recorded in the KeyNote action environment [7]). Recently, policy systems have begun to embrace more semantically rich conditions [18]. Such conditions can test the state of the environment, presence of qualified or authorized entities, or perform complex algorithms (e.g., query and interpret print queue length).…”
Section: Token Typementioning
confidence: 99%
“…Traditional conditions used in authorization policy simply poll local state variables (e.g., values recorded in the KeyNote action environment [7]). Recently, policy systems have begun to embrace more semantically rich conditions [18]. Such conditions can test the state of the environment, presence of qualified or authorized entities, or perform complex algorithms (e.g., query and interpret print queue length).…”
Section: Token Typementioning
confidence: 99%