Access control mechanisms have until now protected relatively static resources in static environments. However with the increased development in large-scale applications, new forms of access control are starting to emerge. At this turning point, we face the problem that prior research does not address the current evolution in the industry and that there is an increasing gap between well-investigated areas in research and common practices in access control products. This paper identifies three major goals of ongoing trends, and surveys existing industrial access control technology to reveal the status quo.
By: Thomas Gross and Anthony Moran
Published in: RZ3529 in 2004
LIMITED DISTRIBUTION NOTICE:
This Research Report is available. This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). I have read and understand this notice and am a member of the scientific community outside or inside of IBM seeking a single copy only.
Questions about this service can be mailed to firstname.lastname@example.org .