-
1
-
-
0028515494
-
Policy resolution in workflow management systems
-
(Fall)
-
C. Bussler, "Policy Resolution in Workflow Management Systems," Digital Technical Journal 6, No. 4 (Fall 1994).
-
(1994)
Digital Technical Journal
, vol.6
, Issue.4
-
-
Bussler, C.1
-
3
-
-
0002179618
-
Protection
-
Princeton, NJ (March 25-26)
-
B. W. Lampson, "Protection," Proceedings, 5th Annual Princeton Conference on Information Sciences and Systems, Princeton, NJ (March 25-26, 1971), pp. 437-443. Reprinted in Operating Systems Review 8, No. 1, 18-24 (January 1974).
-
(1971)
Proceedings, 5th Annual Princeton Conference on Information Sciences and Systems
, pp. 437-443
-
-
Lampson, B.W.1
-
4
-
-
84887248704
-
-
Reprinted in, (January)
-
B. W. Lampson, "Protection," Proceedings, 5th Annual Princeton Conference on Information Sciences and Systems, Princeton, NJ (March 25-26, 1971), pp. 437-443. Reprinted in Operating Systems Review 8, No. 1, 18-24 (January 1974).
-
(1974)
Operating Systems Review
, vol.8
, Issue.1
, pp. 18-24
-
-
-
5
-
-
0030086382
-
Role-based access control models
-
(February)
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-Based Access Control Models," IEEE Computer 29, No. 2, 38-47 (February 1996).
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
6
-
-
0031611520
-
Managing role/permission relationships using object access types
-
Fairfax, VA (October 22-23)
-
J. Barkley and A. Cincotta, "Managing Role/Permission Relationships Using Object Access Types," Proceedings, 3rd ACM Workshop on Role-Based Access Control, Fairfax, VA (October 22-23, 1998), available at http://hissa.ncsl.nist.gov/rbac/rgperms/rgperms.htm.
-
(1998)
Proceedings, 3rd ACM Workshop on Role-Based Access Control
-
-
Barkley, J.1
Cincotta, A.2
-
7
-
-
85088712026
-
Role templates for content-based access control
-
Fairfax, VA (October 28-29)
-
L. Giuri and P. Iglio, "Role Templates for Content-Based Access Control," Proceedings, 2nd ACM Workshop on Role-Based Access Control, Fairfax, VA (October 28-29, 1999).
-
(1999)
Proceedings, 2nd ACM Workshop on Role-Based Access Control
-
-
Giuri, L.1
Iglio, P.2
-
8
-
-
0034517038
-
An object-oriented organizational model to support dynamic role-based access control in electronic commerce
-
E. C. Cheng, "An Object-Oriented Organizational Model to Support Dynamic Role-Based Access Control in Electronic Commerce," Decision Support Systems 29, 357-369 (2000).
-
(2000)
Decision Support Systems
, vol.29
, pp. 357-369
-
-
Cheng, E.C.1
-
9
-
-
0141902726
-
Role-based access control for the World Wide Web
-
Baltimore, MD (October); can be downloaded from
-
J. F. Barkley, A. V. Cincotta, D. F. Ferraiolo, S. Favrilla, and D. R. Kuhn, "Role-Based Access Control for the World Wide Web," Proceedings, 20th National Information Systems Security Conference, Baltimore, MD (October 1997); can be downloaded from http://hissa.ncsl.nist.gov/rbac/rbacweb/paper.ps.
-
(1997)
Proceedings, 20th National Information Systems Security Conference
-
-
Barkley, J.F.1
Cincotta, A.V.2
Ferraiolo, D.F.3
Favrilla, S.4
Kuhn, D.R.5
-
10
-
-
0033661308
-
Role delegation in role-based access control
-
Berlin, Germany (July 26-28)
-
S. Na and S. Cheon, "Role Delegation in Role-Based Access Control," Proceedings, 5th ACM Workshop on Role-Based Access Control, Berlin, Germany (July 26-28, 2000), pp. 39-44.
-
(2000)
Proceedings, 5th ACM Workshop on Role-Based Access Control
, pp. 39-44
-
-
Na, S.1
Cheon, S.2
-
11
-
-
0034318674
-
The application of security policy to role-based access control and the common data security architecture
-
A. Lin and R. Brown, "The Application of Security Policy to Role-Based Access Control and the Common Data Security Architecture," Computer Communications 23, 1584-1593 (2000).
-
(2000)
Computer Communications
, vol.23
, pp. 1584-1593
-
-
Lin, A.1
Brown, R.2
-
12
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
(February)
-
R. S. Sandhu, V. Bhamidipati, and Q. Munawer, "The ARBAC97 Model for Role-Based Administration of Roles," ACM Transactions on Information System Security 2, No. 1, 105-135 (February 1999).
-
(1999)
ACM Transactions on Information System Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.S.1
Bhamidipati, V.2
Munawer, Q.3
-
13
-
-
85038506809
-
-
note
-
This approach also does not require special treatment of administrative roles and the associated implementation machinery. See Reference 11 for an RBAC model that includes separate administrative roles.
-
-
-
-
14
-
-
0031632637
-
Java and the IBM San Francisco project
-
B. S. Rubin, A. R. Christ, and K. A. Bohrer, "Java and the IBM San Francisco Project," IBM Systems Journal 37, No. 3, 365-371 (1998).
-
(1998)
IBM Systems Journal
, vol.37
, Issue.3
, pp. 365-371
-
-
Rubin, B.S.1
Christ, A.R.2
Bohrer, K.A.3
-
15
-
-
0004345194
-
-
can be downloaded from
-
S. Bodoff, D. Green, E. Jendrock, M. Pawlan, and B. Stearns, The J2EE Tutorial, can be downloaded from http://java.sun.com/j2ee/tutorial/download.html/.
-
The J2EE Tutorial
-
-
Bodoff, S.1
Green, D.2
Jendrock, E.3
Pawlan, M.4
Stearns, B.5
-
16
-
-
0037607192
-
-
Proposed Final Draft 3 (March 30)
-
B. Shannon, Java 2 Platform, Enterprise Edition, Specification, v1.3, Proposed Final Draft 3 (March 30, 2001); available at http://java.sun.com/j2ee/j2ee-1_3-pfd3-spec.pdf.
-
(2001)
Java 2 Platform, Enterprise Edition, Specification, v1.3
-
-
Shannon, B.1
|