-
5
-
-
84941159002
-
-
UDDI Version 3.0, http://uddi.org/pubs/uddi-v3.00-published-20020719.htm.
-
UDDI Version 3.0
-
-
-
6
-
-
0036432811
-
-
P. Ratnasingam, The Importance of Technology Trust in Web Services Security, Information Management & Computer Security, vol. 10, no. 5, 2002, pp. 255-260.
-
(2002)
The Importance of Technology Trust in Web Services Security, Information Management & Computer Security
, vol.10
, Issue.5
, pp. 255-260
-
-
Ratnasingam, P.1
-
7
-
-
0031704255
-
Designing a distributed authorization service
-
IEEE Press
-
Woo, T. Y. C., and Lam, S. Designing a distributed authorization service. Proc. of Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2,IEEE Press, 1998, pp. 419-429.
-
(1998)
Proc. of Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies
, vol.2
, pp. 419-429
-
-
Woo, T.Y.C.1
Lam, S.2
-
8
-
-
0031639452
-
Authorization and attribute certificates for widely distributed access control
-
IEEE Press
-
Johnston, W., Mudumbai, S., and Thompson, M. Authorization and attribute certificates for widely distributed access control. Proc. of Seventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, IEEE Press, 1998, pp. 340-345.
-
(1998)
Proc. of Seventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
, pp. 340-345
-
-
Johnston, W.1
Mudumbai, S.2
Thompson, M.3
-
9
-
-
85053861123
-
A resource access decision service for CORBA-based distributed systems
-
IEEE Press
-
Beznosov, K., Deng, Y., Blakley, B., Burt, C., and Barkley, J. A resource access decision service for CORBA-based distributed systems. Proc. of 15th IEEE Annual Computer Security Applications Conference. IEEE Press, 1999, pp. 310-319.
-
(1999)
Proc. of 15th IEEE Annual Computer Security Applications Conference
, pp. 310-319
-
-
Beznosov, K.1
Deng, Y.2
Blakley, B.3
Burt, C.4
Barkley, J.5
-
10
-
-
0032629460
-
A user-centered, modular authorization service built on an RBAC foundation
-
IEEE Press
-
Zurko, M., Simon, R., and Sanfilippo, T. A user-centered, modular authorization service built on an RBAC foundation. Proc. of the IEEE Symposium on Security and Privacy. IEEE Press, 1999, pp. 57-71.
-
(1999)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 57-71
-
-
Zurko, M.1
Simon, R.2
Sanfilippo, T.3
-
11
-
-
84944075856
-
An architecture for distributed OASIS services
-
Springer-Verlag New York, Inc.
-
Hine, J. A., Yao, W., Bacon, J., and Moody, K. An architecture for distributed OASIS services. IFIP/ACM International Conference on Distributed systems platforms. Springer-Verlag New York, Inc., 2000, pp. 104-120.
-
(2000)
IFIP/ACM International Conference on Distributed Systems Platforms
, pp. 104-120
-
-
Hine, J.A.1
Yao, W.2
Bacon, J.3
Moody, K.4
-
12
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
August
-
David F. Ferraiolo, Ravi Sandhu, Serban Gavrila, D. Richard Kuhn, and Ramaswamy Chandramoult. Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security, Vol. 4, No. 3, August 2001, pp. 224-274.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramoult, R.5
-
15
-
-
0038315923
-
-
Microsoft, IBM etc, Version 1.0
-
F. Curbera, Y. Goland, J. Klein, et al. Business Process Execution Language for Web Services (BPEL4WS). Microsoft, IBM etc, Version 1.0, 2002.
-
(2002)
Business Process Execution Language for Web Services (BPEL4WS)
-
-
Curbera, F.1
Goland, Y.2
Klein, J.3
-
19
-
-
14244258941
-
-
OASIS. SAML 1.1. http://www.oasis-open.org/committees/download.php/3406/ oasis-sstc-saml-core-1.1.pdf. 2003.
-
(2003)
SAML 1.1
-
-
-
20
-
-
14244250399
-
-
OASIS. XACML 1.0. http://www.oasis-open.org/committees/download.php/2406/ oasis-xacml-1.0.pdf. 2003.
-
(2003)
XACML 1.0
-
-
-
21
-
-
0002841051
-
Task-based Authorization Controls (TBAC): A family of models for active and enterprise-oriented authorization management
-
Chapman & Hall
-
R. Thomas and R. Sandhu. Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management. Database Security XI: Status and Prospects, Chapman & Hall 1998.
-
(1998)
Database Security XI: Status and Prospects
-
-
Thomas, R.1
Sandhu, R.2
-
22
-
-
84944792110
-
TRBAC: A temporal role-based access control model
-
August
-
E. Bernito, P. Andrea Bonatti, and E. Ferrari. TRBAC: A Temporal Role-Based Access Control Model. ACM Transactions on Information and System Security, Vol. 4, No. 3, August 2001, pp. 191-223.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 191-223
-
-
Bernito, E.1
Bonatti, P.A.2
Ferrari, E.3
-
23
-
-
0242456748
-
Models for Coalition-based Access Control (CBAC)
-
Monterey, California, USA
-
E. Cohen, R. K. Thomas, W. Winsborough and D. Shands. Models for Coalition-based Access Control (CBAC). Seventh ACM Symposium on Access Control Models and Technologies. 2002, Monterey, California, USA.
-
(2002)
Seventh ACM Symposium on Access Control Models and Technologies
-
-
Cohen, E.1
Thomas, R.K.2
Winsborough, W.3
Shands, D.4
-
25
-
-
84956993736
-
Role-based authorization constraints specification
-
November
-
G.-J. Ahn and R. Sandhu. Role-Based Authorization Constraints Specification. ACM Transactions on information and System Security, Vol. 3, No. 4, November, 2000, pp. 207-226.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 207-226
-
-
Ahn, G.-J.1
Sandhu, R.2
|