-
2
-
-
84944792110
-
TRBAC: A temporal role-based access control model
-
Bertino, E., Bonatti, P., Ferrari, E. "TRBAC: A Temporal Role-based Access Control Model". ACM Transactions on Information and System Security, 4(3), 2001
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
-
-
Bertino, E.1
Bonatti, P.2
Ferrari, E.3
-
3
-
-
0035480037
-
Identity management and its support of multilateral security
-
Elsevier Science B. V.
-
Clauss, S., Kohntopp, M. "Identity management and its support of multilateral security". In Computer Networks 37 (2001) 205-219, Elsevier Science B.V.
-
(2001)
Computer Networks
, vol.37
, pp. 205-219
-
-
Clauss, S.1
Kohntopp, M.2
-
4
-
-
0242697660
-
-
Common Criteria for Information Technology Security Evaluation. CC version 2.1, August; (aligned with ISO 15408:1999). Common Criteria project Sponsoring Organisations
-
Common Criteria for Information Technology Security Evaluation. CC version 2.1, August 1999. (aligned with ISO 15408:1999). Common Criteria project Sponsoring Organisations.
-
(1999)
-
-
-
6
-
-
35048843594
-
A proposed standard for role-based access control
-
December 18
-
Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R., Chandramouli, R.: "A proposed standard for Role-Based Access Control" December 18, 2000.
-
(2000)
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
7
-
-
0242528812
-
Health informatics: Public key infrastructure: Part 1: Framework and overview
-
ISO/TC 215 N188, Draft Technical Specification ISO/DTS 17090-1
-
Health Informatics: Public Key Infrastructure: Part 1: Framework and overview. ISO/TC 215 N188, Draft Technical Specification ISO/DTS 17090-1.
-
-
-
-
8
-
-
0242697661
-
Healthcare informatics - Trusted end-to-end information flows
-
ISO TC 215/wg2; Technical report, 1 November
-
ISO TC 215/wg2: Healthcare Informatics - Trusted End-to-End Information flows. Technical report, 1 November 2000.
-
(2000)
-
-
-
9
-
-
0039101844
-
Trust requirements in e-Business
-
December
-
Jones, S., Wilikens, M., Morris, P., Masera, M. "Trust requirements in e-Business", Communications of the ACM (Association for Computing), Vol. 43, No 12, December 2000.
-
(2000)
Communications of the ACM (Association for Computing)
, vol.43
, Issue.12
-
-
Jones, S.1
Wilikens, M.2
Morris, P.3
Masera, M.4
-
10
-
-
3242684510
-
Access control based on attribute certificates for medical intranet applications
-
Mavridis, I., Georgiadis, C., Pangalis, G., Khair, M.: "Access Control based on Attribute Certificates for Medical Intranet Applications". Journal of Medical Internet Research (JMIR) 2001:3(1):e9.
-
(2001)
Journal of Medical Internet Research (JMIR)
, vol.3
, Issue.1
-
-
Mavridis, I.1
Georgiadis, C.2
Pangalis, G.3
Khair, M.4
-
11
-
-
84884390908
-
OASIS: Organization for the advancement of structured information standards
-
eXtensible Access Control Markup Language (XACML)
-
OASIS: Organization for the Advancement of Structured Information Standards. eXtensible Access Control Markup Language (XACML). See http://www.oasis-open.org/committees/xacml/
-
-
-
-
12
-
-
0030086382
-
Role-based access control models
-
February
-
Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E., Role-based access control models. IEEE Computer, 29 (2), February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
|