Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Bonatti P, Damiani E, De Capitani di Vimercati S, Samarati P (2001) A component-based architecture for secure data publication. In: Proceedings of the 17th Annual Computer Security Applications Conference. New Orleans, December 2001
Bonatti P, Samarati P (2003) Logics for authorizations and security. In: Chomicki J, van der Meyden R, Saake G (eds) Logics for emerging applications of databases. Springer, Berlin/Hedielberg
Jajodia S, Samarati P, Sapino ML, Subrahmanian VS (2001) Flexible support for multiple access control policies. ACM Trans Database Syst 26(2):214–260
Lunt T (1989) Access control policies: some unanswered questions. Comput Secur 8(1):43–54
Samarati P, De Capitani di Vimercati S (2001) Access control: policies, models, and mechanisms. In: Focardi R, Gorrieri R (eds) Foundations of Security Analysis and Design. Lecture notes in computer science, vol 2171. Springer, Berlin
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
De Capitani di Vimercati, S. (2011). Authorizations. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_810
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_810
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering