RTT+ – Time Validity Constraints in RTT Language
Most of the traditional access control models, like mandatory, discretionary and role based access control make authorization decisions based on the identity, or the role of the requester, who must be known to the resource owner. Thus, they may be suitable for centralized systems but not for decentr...
Saved in:
| Published in: | Journal of Telecommunications and Information Technology no. 2 |
|---|---|
| Main Authors: | , |
| Format: | Journal Article |
| Language: | English |
| Published: |
National Institute of Telecommunications
30.06.2012
|
| Subjects: | |
| ISSN: | 1509-4553, 1899-8852 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!