Part of the Advances in Information Security book series (ADIS, volume 35)

Section 2.1 motivates to examine trust and safeguards for authorizations by using examples from the real, i.e. physical, world in order to develop an analogous model for authorizations in the digital world, starting with an example of realworld authorizations in Sect. 2.2. Necessary conditions for trust and control are considered in Sect. 2.3. The constructions used in Sect. 2.2 are mapped to constructions in the digital world in Sect. 2.4 and elaborated as a model for secure authorizations in Chap. 3.


Audit Data Digital World Banana Peel Present Person Ticket Number 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Science+Business Media, LLC 2007

Personalised recommendations