-
2
-
-
84937116327
-
Translating role-based access control policy within context
-
Bristol, UK, Jaunary
-
J. Bacon, M. Lloyd, and K. Moody. Translating role-based access control policy within context. In Policy 2001, Workshop on Policies for Distributed Systems and Networks, Bristol, UK, Jaunary 2001.
-
(2001)
Policy 2001, Workshop on Policies for Distributed Systems and Networks
-
-
Bacon, J.1
Lloyd, M.2
Moody, K.3
-
3
-
-
0033897228
-
Generic support for distributed applications
-
March
-
J. Bacon, K. Moody, J. Bates, R. Hayton, C. Ma, A. McNeil, O. Seidel, and M. Spiteri. Generic support for distributed applications. IEEE Computer, pages 68-76, March 2000.
-
(2000)
IEEE Computer
, pp. 68-76
-
-
Bacon, J.1
Moody, K.2
Bates, J.3
Hayton, R.4
Ma, C.5
McNeil, A.6
Seidel, O.7
Spiteri, M.8
-
6
-
-
0031382313
-
A flexible model for the specification and enforcement of authorization constraints in workflow management system
-
Fairfax, Virginia, November
-
E. Bertino, E. Ferrari, and V. Alturi. A flexible model for the specification and enforcement of authorization constraints in workflow management system. In Second ACM Workshop on Role-Based Access Control, pages 1-12, Fairfax, Virginia, November 1997.
-
(1997)
Second ACM Workshop on Role-Based Access Control
, pp. 1-12
-
-
Bertino, E.1
Ferrari, E.2
Alturi, V.3
-
7
-
-
0013305179
-
Generalized role-based access control for securing future applications
-
Baltimore, MD, October
-
M. J. Covington, M. J. Moyer, and M. Ahamad. Generalized role-based access control for securing future applications. In 23rd National Information Systems Security Conference, Baltimore, MD, October 2000.
-
(2000)
23rd National Information Systems Security Conference
-
-
Covington, M.J.1
Moyer, M.J.2
Ahamad, M.3
-
8
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate intranet
-
Feb
-
D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn. A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security, 2(1):34-64, Feb 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 34-64
-
-
Ferraiolo, D.F.1
Barkley, J.F.2
Kuhn, D.R.3
-
9
-
-
0031365182
-
Role templates for content-based access control
-
Fairfax, Virginia, November
-
L. Giuri and P. Iglio. Role templates for content-based access control. In Second ACM Workshop on Role-Based Access Control, pages 153-159, Fairfax, Virginia, November 1997.
-
(1997)
Second ACM Workshop on Role-Based Access Control
, pp. 153-159
-
-
Giuri, L.1
Iglio, P.2
-
11
-
-
0031650454
-
OASIS: Access control in an open, distributed environment
-
Oakland, CA, May. IEEE
-
R. Hayton, J. Bacon, and K. Moody. OASIS: Access Control in an Open, Distributed Environment. In Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, May 1998. IEEE.
-
(1998)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Hayton, R.1
Bacon, J.2
Moody, K.3
-
12
-
-
84944075856
-
An architecture for distributed OASIS services
-
New York, NY, April
-
J. Hine, W. Yao, J. Bacon, and K. Moody. An architecture for distributed OASIS services. In Middleware 2000, pages 104-120, New York, NY, April 2000.
-
(2000)
Middleware 2000
, pp. 104-120
-
-
Hine, J.1
Yao, W.2
Bacon, J.3
Moody, K.4
-
13
-
-
0031346670
-
Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems
-
Fairfax, Virginia, November. ACM
-
D. R. Kuhn. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. In Second ACM Workshop on Role-Based Access Control, pages 23-30, Fairfax, Virginia, November 1997. ACM.
-
(1997)
Second ACM Workshop on Role-Based Access Control
, pp. 23-30
-
-
Kuhn, D.R.1
-
14
-
-
0013241517
-
Control principles and access right inheritance through role hierarchies
-
Fairfax, Virginia, October
-
J. D. Moffett. Control principles and access right inheritance through role hierarchies. In Third ACM Workshop on Role-Based Access Control, pages 63-69, Fairfax, Virginia, October 1998.
-
(1998)
Third ACM Workshop on Role-Based Access Control
, pp. 63-69
-
-
Moffett, J.D.1
-
16
-
-
0010573970
-
Access rights administration in rote-based security systems
-
J. Biskup, M. Morgernstern, and C. Landwehr, editors
-
M. Nyanchama and S. Osborn. Access rights administration in rote-based security systems. In J. Biskup, M. Morgernstern, and C. Landwehr, editors, Database Security VIII: Status and Prospects, 1995.
-
(1995)
Database Security VIII: Status and Prospects
-
-
Nyanchama, M.1
Osborn, S.2
-
18
-
-
0016555241
-
The protection of information in computer systems
-
September
-
J. Saltzer and M. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, September 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
20
-
-
0030086382
-
Role-based access control models
-
Feb.
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-Based Access Control Models. Computer, 29(2):38-47, Feb. 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
21
-
-
0030644642
-
Separation of duty in role-based environments
-
Rockport, Massachusetts, June
-
R. T. Simon and M. E. Zurko. Separation of duty in role-based environments. In 10th IEEE Computer Security Foundations Workshop, pages 183-194, Rockport, Massachusetts, June 1997.
-
(1997)
10th IEEE Computer Security Foundations Workshop
, pp. 183-194
-
-
Simon, R.T.1
Zurko, M.E.2
-
22
-
-
0031387996
-
Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments
-
Fairfax, Virginia, November
-
R. K. Thomas. Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments. In Second ACM Workshop on Role-Based Access Control, pages 13-19, Fairfax, Virginia, November 1997.
-
(1997)
Second ACM Workshop on Role-Based Access Control
, pp. 13-19
-
-
Thomas, R.K.1
-
23
-
-
0002841051
-
Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management
-
Lake Tahoe, California, August
-
R. K. Thomas and R. S. Sandhu. Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. In IFIP WG 11.3 Workshop on Database Security, Lake Tahoe, California, August 1997.
-
(1997)
IFIP WG 11.3 Workshop on Database Security
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
24
-
-
0032620331
-
Team-and-role-based organizational context and access control for cooperative hypermedia environments
-
February
-
W. Wang. Team-and-role-based organizational context and access control for cooperative hypermedia environments. In ACM Hypertext'99, February 1999.
-
(1999)
ACM Hypertext'99
-
-
Wang, W.1
|