-
1
-
-
0036510173
-
A content-based authorization model for digital libraries
-
March/April
-
N.R. Adam, V. Atluri, E. Bertino, and E. Ferrari. A Content-Based Authorization Model for Digital Libraries. IEEE Transactions on Knowledge and Data Engineering, 14(2), March/April 2002.
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, Issue.2
-
-
Adam, N.R.1
Atluri, V.2
Bertino, E.3
Ferrari, E.4
-
5
-
-
84944039217
-
Translating role-based access control policy within context
-
J. Bacon, M. Lloyd, and K. Moody. Translating Role-Based Access Control Policy within Context. In Proc. of the International Workshop on Policies for Distributed Systems and Networks, LNCS 1995, Springer Verlag, January 2001.
-
Proc. of the International Workshop on Policies for Distributed Systems and Networks, LNCS 1995, Springer Verlag, January 2001
-
-
Bacon, J.1
Lloyd, M.2
Moody, K.3
-
9
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
February
-
E. Bertino, E. Ferrari, and V. Atluri. The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information and System Security, 2(1), February 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
10
-
-
0003587596
-
XML path language (XPath)
-
November; W3 Consortium Recommendation
-
J. Clark and S. DeRose. XML Path Language (XPath). http://www.w3.org/TR/xpath, November 1999. W3 Consortium Recommendation.
-
(1999)
-
-
Clark, J.1
DeRose, S.2
-
12
-
-
0035791053
-
Securing context-aware applications using environment roles
-
M.J. Covington, W. Long, S. Srinivasan, A.K. Dey, M. Ahamad, and G.D. Abowd. Securing Context-Aware Applications Using Environment Roles. In Proc. of the ACM Symposium on Access Control Models and Technologies (SACMAT), May 2001.
-
Proc. of the ACM Symposium on Access Control Models and Technologies (SACMAT), May 2001
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dey, A.K.4
Ahamad, M.5
Abowd, G.D.6
-
13
-
-
84900830868
-
Understanding and using context
-
Springer Verlag
-
A.K. Dey. Understanding and Using Context. Personal and Ubiquitous Computing, Springer Verlag, 5(1), 2001.
-
(2001)
Personal and Ubiquitous Computing
, vol.5
, Issue.1
-
-
Dey, A.K.1
-
15
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
August
-
D.F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn, and R. Chandramouli. Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security, 4(3), August 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
20
-
-
85013593271
-
Flexible control of downloaded executable content
-
May
-
T. Jaeger, A. Prakash, J. Liedtke, and N. Islam. Flexible Control of Downloaded Executable Content. ACM Transactions on Information and System Security, 2(2), May 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.2
-
-
Jaeger, T.1
Prakash, A.2
Liedtke, J.3
Islam, N.4
-
21
-
-
0001619596
-
Flexible support for multiple access control policies
-
June
-
S. Jajodia, P. Samarati, M.L. Sapino, and V.S. Subrahmanian. Flexible Support for Multiple Access Control Policies. ACM Transactions on Database Systems, 26(2), June 2001.
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.2
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
24
-
-
0036187194
-
Web E-speak: Facilitating web-based E-services
-
W. Kim, S. Graupner, A. Sahai, D. Lenkov, C. Chudasama, S. Whedbee, Y. Luo, B. Desai, H. Mullings, and P. Wonng. Web E-Speak: Facilitating Web-Based E-Services. IEEE Multimedia, 9(1), 2002.
-
(2002)
IEEE Multimedia
, vol.9
, Issue.1
-
-
Kim, W.1
Graupner, S.2
Sahai, A.3
Lenkov, D.4
Chudasama, C.5
Whedbee, S.6
Luo, Y.7
Desai, B.8
Mullings, H.9
Wonng, P.10
-
32
-
-
0030086382
-
Role-based access control models
-
February
-
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-based access control models. IEEE Computer, 29(2), February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
33
-
-
0033337366
-
There is more to context than location
-
December
-
A. Schmidt, M. Beigl, and H.W. Gellersen. There is more to context than location. Computers & Graphics, Elsevier, 23(6), December 1999.
-
(1999)
Computers & Graphics, Elsevier
, vol.23
, Issue.6
-
-
Schmidt, A.1
Beigl, M.2
Gellersen, H.W.3
-
34
-
-
0031387996
-
Team-based Access Control (TMAC): A primitive for applying role-based access controls in collaborative environments
-
R.K. Thomas. Team-based Access Control (TMAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments. In Proc. of the ACM Workshop on Role Based Access Control, 1997.
-
Proc. of the ACM Workshop on Role Based Access Control, 1997
-
-
Thomas, R.K.1
-
38
-
-
0032620331
-
Team-and-role-based organizational context and access control for cooperative hypermedia environments
-
W. Wang. Team-and-Role-Based Organizational Context and Access Control for Cooperative Hypermedia Environments. In Proc. of the ACM Conference on Hypertext and Hypermedia, 1999.
-
Proc. of the ACM Conference on Hypertext and Hypermedia, 1999
-
-
Wang, W.1
-
39
-
-
0001853125
-
The computer for the 21st century
-
September
-
M. Weiser. The Computer for the 21st Century. Scientific American, 265(3), September 1991.
-
(1991)
Scientific American
, vol.265
, Issue.3
-
-
Weiser, M.1
-
40
-
-
84976653144
-
Some computer science issues in ubiquitous computing
-
July
-
M. Weiser. Some Computer Science Issues in Ubiquitous Computing. Communications of the ACM, 36(7), July 1993.
-
(1993)
Communications of the ACM
, vol.36
, Issue.7
-
-
Weiser, M.1
|