RTT+ – Time Validity Constraints in RTT Language

Most of the traditional access control models, like mandatory, discretionary and role based access control make authorization decisions based on the identity, or the role of the requester, who must be known to the resource owner. Thus, they may be suitable for centralized systems but not for decentr...

Full description

Saved in:
Bibliographic Details
Published in:Journal of Telecommunications and Information Technology no. 2
Main Authors: Anna Felkner, Adam Kozakiewicz
Format: Journal Article
Language:English
Published: National Institute of Telecommunications 30.06.2012
Subjects:
ISSN:1509-4553, 1899-8852
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first