-
3
-
-
0029423138
-
Implementing role based access control using object technology
-
J. Barkley, Implementing role based access control using object technology, First ACM/NIST Workshop on Role-Based Access Control, 1995 (http://hissa.ncsl.nist.gov/rbac/rbacot/titlewkshp.html).
-
(1995)
First ACM/NIST Workshop on Role-Based Access Control
-
-
Barkley, J.1
-
4
-
-
84982899264
-
The role of trust management in distributed system security
-
Vitek, & Jensen. Berlin: Springer. (ftp://ftp.research.att.com/dist/mab/trustmgt.ps)
-
Blaze M., Feigenbaum J., Ioannidis J., Keromytis A. The role of trust management in distributed system security. Vitek, Jensen. Secure Internet Programming: Security Issues for Mobile and Distributed Objects. 1999;185-210 Springer, Berlin. (ftp://ftp.research.att.com/dist/mab/trustmgt.ps).
-
(1999)
Secure Internet Programming: Security Issues for Mobile and Distributed Objects
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
5
-
-
84957800809
-
KeyNote: Trust management for public key infrastructures
-
M. Blaze, J. Feigenbaum, A. Keromytis, KeyNote: trust management for public key infrastructures, in: Proceedings of the 6th International Workshop on Security Protocols, 1998, pp. 59-63.
-
(1998)
In: Proceedings of the 6th International Workshop on Security Protocols
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.3
-
6
-
-
0029700344
-
Decentralized trust management
-
M. Blaze, J. Feigenbaum, J. Lacy, Decentralized trust management, in: Proceedings of the 17th IEEE Symposium on Security and Privacy, 1996, pp. 164-173 (ftp://ftp.research.att.com/dist/mab/policymaker.ps).
-
(1996)
In: Proceedings of the 17th IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
7
-
-
0001843009
-
REFEREE: Trust management for web applications
-
(http://www.w3.org/PICS/TrustMgt/doc/referee-WWW6.html)
-
Chu Y., Feigenbaum J., LaMacchia B., Resnick P., Strauss M. REFEREE: trust management for web applications. Journal of World Wide Web. 2:1997;127-139. (http://www.w3.org/PICS/TrustMgt/doc/referee-WWW6.html).
-
(1997)
Journal of World Wide Web
, vol.2
, pp. 127-139
-
-
Chu, Y.1
Feigenbaum, J.2
LaMacchia, B.3
Resnick, P.4
Strauss, M.5
-
9
-
-
0002262722
-
Role-based access control (RBAC): Features and motivations
-
D.F. Ferraiolo, J.A. Cugini, D.R. Kuhn, Role-based access control (RBAC): features and motivations, in: Proceedings of 11th Annual Computer Security Applications Conference, 1995, pp. 241-248 (http://hissa.ncsl.nist.gov/rbac/newspaper/rbac.html).
-
(1995)
In: Proceedings of 11th Annual Computer Security Applications Conference
, pp. 241-248
-
-
Ferraiolo, D.F.1
Cugini, J.A.2
Kuhn, D.R.3
-
12
-
-
0343639684
-
-
A. Herzberg, Y. Mass, J. Mihaeli, D. Naor, Y. Ravid, Access control meets public key infrastructure, or: assigning roles to strangers (http://www.hrl.il.ibm.com/TrustEstablishment/paper.htm).
-
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
Naor, D.4
Ravid, Y.5
-
13
-
-
0031639452
-
Authorization and attribute certificates for widely distributed access control
-
W. Johnston, S. Mudumbai, M. Thompson, Authorization and attribute certificates for widely distributed access control, in: Proceedings of the IEEE 7th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE-98), 1998, pp. 340-345.
-
(1998)
In: Proceedings of the IEEE 7th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE-98)
, pp. 340-345
-
-
Johnston, W.1
Mudumbai, S.2
Thompson, M.3
-
14
-
-
0032671779
-
A logic-based knowledge representation for authorization with delegation
-
N. Li, J. Feigenbaum, B. Grosof, A logic-based knowledge representation for authorization with delegation, in: Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999, pp. 162-174.
-
(1999)
In: Proceedings of the 12th IEEE Computer Security Foundations Workshop
, pp. 162-174
-
-
Li, N.1
Feigenbaum, J.2
Grosof, B.3
-
15
-
-
84947756793
-
Reasoning about security: A logic and a decision method for role based access control
-
in: Proceedings of the International Joint Conference on Qualitative and Quantitative Practical Reasoning (ECSQARU/FAPR-97)
-
F. Massacci, Reasoning about security: a logic and a decision method for role based access control, in: Proceedings of the International Joint Conference on Qualitative and Quantitative Practical Reasoning (ECSQARU/FAPR-97), Lecture Notes in Artificial Intelligence, vol 1244, 1997, pp. 421-435.
-
(1997)
Lecture Notes in Artificial Intelligence
, vol.1244
, pp. 421-435
-
-
Massacci, F.1
-
16
-
-
0030086382
-
Role-based access control models
-
Sandhu R., Coyne E., Feinstein H., Youman C. Role-based access control models. IEEE Computer. 29:(2):1996;38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
18
-
-
0028726831
-
Policy driven management for distributed systems
-
Sloman M. Policy driven management for distributed systems. Journal of Network and Systems Management. 2:(4):1994;333-360.
-
(1994)
Journal of Network and Systems Management
, vol.2
, Issue.4
, pp. 333-360
-
-
Sloman, M.1
-
19
-
-
0031338080
-
Using digital credentials on the world-wide web
-
(http://drl.cs.uiuc.edu/pubs/jcs97.ps)
-
Winslett M., Ching N., Jones V., Slepchin I. Using digital credentials on the world-wide web. Journal of Computer Security. 5:(3):1997;255-267. (http://drl.cs.uiuc.edu/pubs/jcs97.ps).
-
(1997)
Journal of Computer Security
, vol.5
, Issue.3
, pp. 255-267
-
-
Winslett, M.1
Ching, N.2
Jones, V.3
Slepchin, I.4
|