-
2
-
-
84956993736
-
Role-based authorization constraints specification
-
ACM, November
-
G-J. Ahn and R. Sandhu, "Role-based Authorization Constraints Specification", ACM Transactions on Information and System Security, pages 207-226, Vol. 3, No. 4, ACM, November 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 207-226
-
-
Ahn, G.-J.1
Sandhu, R.2
-
5
-
-
10444260896
-
On the negotiation of access control policies
-
Cambridge, UK, Springer-Verlag
-
V. Gligor, H. Khurana, R. Koleva, V. Bharadwaj, and J. Baras, "On the Negotiation of Access Control Policies", in Proceedings of the 9th Security Protocols Workshop, Cambridge, UK, Springer-Verlag, 2001.
-
(2001)
Proceedings of the 9th Security Protocols Workshop
-
-
Gligor, V.1
Khurana, H.2
Koleva, R.3
Bharadwaj, V.4
Baras, J.5
-
6
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
Oakland, California, May
-
A. Herzberg, Y. Mass, J. Michaeli, D. Naor and Y. Ravid, "Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers", Proceeding of the IEEE Symposium on Security and Privacy, Oakland, California, May 2000.
-
(2000)
Proceeding of the IEEE Symposium on Security and Privacy
-
-
Herzberg, A.1
Mass, Y.2
Michaeli, J.3
Naor, D.4
Ravid, Y.5
-
7
-
-
84883599808
-
A model for access negotiations in dynamic coalitions
-
University of Maryland, TR 2003-29, August
-
H. Khurana and V. Gligor, "A Model for Access Negotiations in Dynamic Coalitions", Technical Report, University of Maryland, TR 2003-29, August 2003.
-
(2003)
Technical Report
-
-
Khurana, H.1
Gligor, V.2
-
8
-
-
0036375159
-
Reasoning about joint administration of access policies for coalition resources
-
Vienna, July
-
H. Khurana, V. Gligor, and J. Linn, "Reasoning about Joint Administration of Access Policies for Coalition Resources", IEEE International Conference on Distributed Computing Systems, Vienna, July 2002.
-
(2002)
IEEE International Conference on Distributed Computing Systems
-
-
Khurana, H.1
Gligor, V.2
Linn, J.3
-
10
-
-
0023218630
-
Reasoning about security models
-
Oakland, CA, April
-
J. McLean, "Reasoning about Security Models", Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, pp. 123-131, April 1987.
-
(1987)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 123-131
-
-
McLean, J.1
-
11
-
-
0242709333
-
Information sharing and security in dynamic coalitions
-
Monterey, CA June
-
C. E. Phillips, T. C. Ting, S. A. Demurjian, "Information sharing and security in dynamic coalitions", in proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT), Monterey, CA June 2002.
-
(2002)
Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
Phillips, C.E.1
Ting, T.C.2
Demurjian, S.A.3
-
12
-
-
85056545124
-
Limiting the disclosure of access control policies during automated trust negotiation
-
San Diego, CA, February
-
K. E. Seamons, M. Winslett, and T. Yu, "Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation", in proceedings of the Symposium on Network and Distributed System Security, San Diego, CA, February 2001.
-
(2001)
Proceedings of the Symposium on Network and Distributed System Security
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
|