2010 14th Panhellenic Conference on Informatics 2010
DOI: 10.1109/pci.2010.52
|View full text |Cite
|
Sign up to set email alerts
|

Visualising Access Control: The PRISM Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2010
2010
2019
2019

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…A snapshot of an instantiated ontology from the perspective of the Resources class is illustrated in Figure . The graphical user interface employed both for the instantiation of the semantic model as well as for the demonstration of the specified concepts constitutes an extension of the tool presented in . The configuration phase finalizes with actors issuing and obtaining all necessary credentials for the seamless operation of the framework.…”
Section: From Semantics To Authorizationmentioning
confidence: 99%
“…A snapshot of an instantiated ontology from the perspective of the Resources class is illustrated in Figure . The graphical user interface employed both for the instantiation of the semantic model as well as for the demonstration of the specified concepts constitutes an extension of the tool presented in . The configuration phase finalizes with actors issuing and obtaining all necessary credentials for the seamless operation of the framework.…”
Section: From Semantics To Authorizationmentioning
confidence: 99%