-
2
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
E. Bertino, E. Ferrari, and V. Atluri, "The Specification and Enforcement of Authorization Constraints in Workflow Management Systems," ACM Trans. Information and System Security, vol. 2, no. 1, 1999, pp. 65-104.
-
(1999)
ACM Trans. Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
4
-
-
50249183308
-
Role hierarchies and constraints for Lattice-based access control
-
Springer Verlag, Berlin
-
R.S. Sandhu, "Role Hierarchies and Constraints for Lattice-Based Access Control," Computer Security ESORICS 96, LNCS 1146, Springer Verlag, Berlin, 1996, pp. 65-79.
-
(1996)
Computer Security ESORICS 96, LNCS
, vol.1146
, pp. 65-79
-
-
Sandhu, R.S.1
-
5
-
-
0033652039
-
The NIST model for role-based access control: Towards a unified standard
-
ACM Press, New York
-
R.S. Sandhu, D. Ferraiolo, and R. Kuhn, "The NIST Model for Role-Based Access Control: Towards A Unified Standard," 5th ACM Workshop on Role-Based Access Control, ACM Press, New York, 2000, pp. 47-60.
-
(2000)
5th ACM Workshop on Role-based Access Control
, pp. 47-60
-
-
Sandhu, R.S.1
Ferraiolo, D.2
Kuhn, R.3
-
6
-
-
84988789822
-
Conceptual foundations for a model of task-based authorizations
-
IEEE CS Press, Los Alamitos, Calif., June
-
R.K. Thomas and R.S. Sandhu, "Conceptual Foundations for a Model of Task-Based Authorizations," The Proc. 7th Computer Security Foundation Workshop (CSFW94), IEEE CS Press, Los Alamitos, Calif., June 1994, pp. 66-79.
-
(1994)
The Proc. 7th Computer Security Foundation Workshop (CSFW94)
, pp. 66-79
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
7
-
-
0037548369
-
Security enforcement in the DOK federated database system
-
Chapman and Hall, London
-
Z. Tari and G. Fernandez, "Security Enforcement in the DOK Federated Database System," Database Security X: Status and Prospects, Chapman and Hall, London, 1997, pp. 23-42.
-
(1997)
Database Security X: Status and Prospects
, pp. 23-42
-
-
Tari, Z.1
Fernandez, G.2
-
8
-
-
0342571877
-
A formal framework to support multiple security policies
-
Ottawa, Communication Security Establishment Press
-
W.E. Kuhnhauser and M.K. Ostrowski, "A Formal Framework to Support Multiple Security Policies," Proc. 7th Canadian Computer Security Symp., Ottawa, Communication Security Establishment Press, 1995, pp. 1-19.
-
(1995)
Proc. 7th Canadian Computer Security Symp.
, pp. 1-19
-
-
Kuhnhauser, W.E.1
Ostrowski, M.K.2
-
9
-
-
0010032891
-
Computational issues in secure interoperation
-
Jan
-
L. Gong and X. Qian, "Computational Issues in Secure Interoperation," IEEE Trans. Software Eng., Jan. 1996, pp. 43-52.
-
(1996)
IEEE Trans. Software Eng.
, pp. 43-52
-
-
Gong, L.1
Qian, X.2
-
11
-
-
22044454357
-
A solution to open standard of PKI
-
ACISP 98, C. Boyd and E. Dawson, eds., Springer, Berlin, July
-
Q. He, K. Sycara, and Z. Su, "A Solution to Open Standard of PKI," Proc. 3rd Australian Conf. Information Security and Privacy, ACISP 98, C. Boyd and E. Dawson, eds., Springer, Berlin, July 1998, pp. 99-110.
-
(1998)
Proc. 3rd Australian Conf. Information Security and Privacy
, pp. 99-110
-
-
He, Q.1
Sycara, K.2
Su, Z.3
-
12
-
-
84904256987
-
Programmable security for object-oriented systems
-
Kluwer Academic, Boston
-
J. Hale, M. Papa, and S. Shenoi, "Programmable Security for Object-Oriented Systems," Proc. Database Security XII: Status and Prospects, Kluwer Academic, Boston, 1998, pp. 109-123.
-
(1998)
Proc. Database Security XII: Status and Prospects
, pp. 109-123
-
-
Hale, J.1
Papa, M.2
Shenoi, S.3
-
13
-
-
0013194038
-
Argos - A configurable access control system for interoperable environments
-
Chapman and Hall, London
-
D. Jonscher and K.R. Dittrich, "Argos - A Configurable Access Control System for Interoperable Environments," Proc. 9th Ann. Working Conf. Database Security, Chapman and Hall, London, 1995, pp. 43-60.
-
(1995)
Proc. 9th Ann. Working Conf. Database Security
, pp. 43-60
-
-
Jonscher, D.1
Dittrich, K.R.2
|