-
1
-
-
84958777954
-
An authorization model and its formal semantics
-
J.-H. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors, ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, Sept. 16 - 18. Springer Verlag
-
E. Bertino, F. Buccafurri, E. Ferrari, and P. Ruilo. An authorization model and its formal semantics. In J.-H. Quisquater, Y. Deswarte, C. Meadows, and D. Gollmann, editors, ESORICS 98, 5th European Symposium on Research in Computer Security, volume 1485 of Lecture Notes in Computer Science, pages 127-142, Louvain-la-Neuve, Belgium, Sept. 16 - 18 1998. Springer Verlag.
-
(1998)
Lecture Notes in Computer Science
, vol.1485
, pp. 127-142
-
-
Bertino, E.1
Buccafurri, F.2
Ferrari, E.3
Ruilo, P.4
-
2
-
-
0040884892
-
A flexible authorization mechanism for relational data management systems
-
Apr.
-
E. Bertino, S. Jajodia, and P. Samarati. A flexible authorization mechanism for relational data management systems. ACM Transactions on Information Systems, 17(2):101-140, Apr 1999.
-
(1999)
ACM Transactions on Information Systems
, vol.17
, Issue.2
, pp. 101-140
-
-
Bertino, E.1
Jajodia, S.2
Samarati, P.3
-
3
-
-
0034446895
-
A modular approach to composing access control policies
-
Athens Greece, nov. ACM Press
-
P. Bonatti, S. de Capitani di, and P. Samarati. A modular approach to composing access control policies. In Proceedings of the 7th ACM conference on Computer and communications security, pages 164 - 173, Athens Greece, nov 2000. ACM Press.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security
, pp. 164-173
-
-
Bonatti, P.1
De Capitani di, S.2
Samarati, P.3
-
4
-
-
0030677524
-
A logical language for expressing authorizations
-
Oakland, CA, May. IEEE Computer Society Press
-
S. Jajodia, P. Samarati, and V. S. Subrahmanian. A logical language for expressing authorizations. In Proceedings of the IEEE Symp. on Research in Security and Privacy, pages 31-42, Oakland, CA, May 1997. IEEE Computer Society Press.
-
(1997)
Proceedings of the IEEE Symp. on Research in Security and Privacy
, pp. 31-42
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
-
5
-
-
0031162048
-
A unified framework for enforcing multiple access control policies security
-
Proceedings of the ACM SIGMOD International Conference on Management of Data, New York, May 13-15. ACM Press
-
S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino. A Unified Framework for Enforcing Multiple Access Control Policies Security. In Proceedings of the ACM SIGMOD International Conference on Management of Data, volume 26,2 of SIGMOD Record, pages 474-485, New York, May 13-15 1997. ACM Press.
-
(1997)
SIGMOD Record
, vol.26
, Issue.2
, pp. 474-485
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
Bertino, E.4
-
6
-
-
0013194038
-
Argos A configurable access control system for interoperable environments
-
D. L. Spooner, S. A. Demurjian, and J. E. Dobson, editors, Chapman & Hall
-
D. Jonscher and K. R. Dittrich. Argos A configurable access control system for interoperable environments. In D. L. Spooner, S. A. Demurjian, and J. E. Dobson, editors, Database Security, IX: Status and Prospects, pages 43-60. Chapman & Hall, 1996.
-
(1996)
Database Security, IX: Status and Prospects
, pp. 43-60
-
-
Jonscher, D.1
Dittrich, K.R.2
-
8
-
-
0033652039
-
The NIST model for role-based access control: Towards a unified standard
-
Berlin, Ger., July 26-27. ACM Press
-
R. Sandhu, D. Ferraiolo, and R. Kuhn. The NIST model for role-based access control: Towards a unified standard. In Proceedings of the 5th ACM Workshop on Role-Based Access Control (RBAC-00), pages 47-64, Berlin, Ger., July 26-27 2000. ACM Press.
-
(2000)
Proceedings of the 5th ACM Workshop on Role-Based Access Control (RBAC-00)
, pp. 47-64
-
-
Sandhu, R.1
Ferraiolo, D.2
Kuhn, R.3
-
9
-
-
0013191021
-
Transparent access to large files that are stored across sites
-
IEEE Computer Society Press
-
H. F. Wedde, B. Korel, S. Chen, D. C. Daniels, S. Nagaraj, and B. Santhanam. Transparent Access to Large Files That Are Stored across Sites. In Readings in Distributed Computing Systems Theory. IEEE Computer Society Press, 1994.
-
(1994)
Readings in Distributed Computing Systems Theory
-
-
Wedde, H.F.1
Korel, B.2
Chen, S.3
Daniels, D.C.4
Nagaraj, S.5
Santhanam, B.6
-
10
-
-
85117730332
-
New dimensions in distributed journalism through dragon slayer III
-
Madeira, Portugal, Feb. Euromicro, IEEE Computer Society Press
-
H. F. Wedde and M. Lischka. New Dimensions in Distributed Journalism Through Dragon Slayer III. In Proc. of the 7th Euromicro Workshop on Parallel and Distributed Processing, Madeira, Portugal, Feb 1999. Euromicro, IEEE Computer Society Press.
-
(1999)
Proc. of the 7th Euromicro Workshop on Parallel and Distributed Processing
-
-
Wedde, H.F.1
Lischka, M.2
-
11
-
-
79958284386
-
A universal framework for managing metadata in the distributed dragon slayer system
-
Euromicro, IEEE Computer Society Press, Sept.
-
H. F. Wedde and J.-O. Siepmann. A Universal Framework for Managing Metadata in the Distributed Dragon Slayer System. In Euromicro Workshop on Multimedia and Telecommunications. Euromicro, IEEE Computer Society Press, Sept. 2000.
-
(2000)
Euromicro Workshop on Multimedia and Telecommunications
-
-
Wedde, H.F.1
Siepmann, J.-O.2
|