-
3
-
-
84941159002
-
-
UDDI Version 3.0. http://uddi.org/pubs/uddi-v3.00-published-20020719.htm.
-
UDDI Version 3.0
-
-
-
4
-
-
0036432811
-
The importance of technology trust in web services security
-
P. Ratnasingam. The Importance of Technology Trust in Web Services Security. Information Management & Computer Security, vol. 10, no. 5, 2002, pp. 255-260.
-
(2002)
Information Management & Computer Security
, vol.10
, Issue.5
, pp. 255-260
-
-
Ratnasingam, P.1
-
5
-
-
0031704255
-
Designing a distributed authorization service
-
IEEE Press
-
Woo, T. Y. C., and Lam, S. Designing a distributed authorization service. Proc. of Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 2,IEEE Press, 1998, pp. 419-429.
-
(1998)
Proc. of Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies
, vol.2
, pp. 419-429
-
-
Woo, T.Y.C.1
Lam, S.2
-
6
-
-
0032629460
-
A user-centered, modular authorization service built on an RBAC foundation
-
IEEE Press
-
Zurko, M., Simon, R., and Sanfilippo, T. A user-centered, modular authorization service built on an RBAC foundation. Proc. of the IEEE Symposium on Security and Privacy. IEEE Press, 1999, pp. 57-71.
-
(1999)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 57-71
-
-
Zurko, M.1
Simon, R.2
Sanfilippo, T.3
-
7
-
-
84944075856
-
An architecture for distributed OASIS services
-
Springer-Verlag New York, Inc.
-
Hine, J. A., Yao, W., Bacon, J., and Moody, K. An architecture for distributed OASIS services. IFIP/ACM International Conference on Distributed systems platforms. Springer-Verlag New York, Inc., 2000, pp. 104-120.
-
(2000)
IFIP/ACM International Conference on Distributed Systems Platforms
, pp. 104-120
-
-
Hine, J.A.1
Yao, W.2
Bacon, J.3
Moody, K.4
-
8
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
August
-
David F. Ferraiolo, Ravi Sandhu, Serban Gavrila, D. Richard Kuhn, and Ramaswamy Chandramoult. Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security, Vol. 4, No. 3, August 2001, pp. 224-274.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramoult, R.5
-
11
-
-
0038315923
-
-
Microsoft, IBM etc, Version 1.0
-
F. Curbera, Y. Goland, J. Klein, et al. Business Process Execution Language for Web Services (BPEL4WS). Microsoft, IBM etc, Version 1.0, 2002.
-
(2002)
Business Process Execution Language for Web Services (BPEL4WS)
-
-
Curbera, F.1
Goland, Y.2
Klein, J.3
-
15
-
-
14244258941
-
-
OASIS. SAML 1.1. http://www.oasis-open.org/committees/download.php/3406/ oasis-sstc-saml-core-1.1.pdf.2003.
-
(2003)
SAML 1.1
-
-
-
16
-
-
14244250399
-
-
OASIS. XACML 1.0. http://www.oasis-open.org/committees/download.php/2406/ oasis-xacml-1.0.pdf.2003.
-
(2003)
XACML 1.0
-
-
-
17
-
-
0002841051
-
Task-based Authorization Controls (TBAC): A family of models for active and enterprise-oriented authorization management
-
Chapman & Hall
-
R. Thomas and R. Sandhu. Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management. Database Security XI: Status and Prospects, Chapman & Hall 1998.
-
(1998)
Database Security XI: Status and Prospects
-
-
Thomas, R.1
Sandhu, R.2
-
18
-
-
84944792110
-
TRBAC: A Temporal role-based access control model
-
August
-
E. Bernito, P. Andrea Bonatti, and E. Ferrari. TRBAC: A Temporal Role-Based Access Control Model. ACM Transactions on Information and System Security, Vol. 4, No. 3, August 2001, pp. 191-223.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 191-223
-
-
Bernito, E.1
Bonatti, P.A.2
Ferrari, E.3
-
19
-
-
0242456748
-
Models for Coalition-based Access Control (CBAC)
-
Monterey, California, USA
-
E. Cohen, R. K. Thomas, W. Winsborough and D. Shands. Models for Coalition-based Access Control (CBAC). Seventh ACM Symposium on Access Control Models and Technologies. 2002, Monterey, California, USA.
-
(2002)
Seventh ACM Symposium on Access Control Models and Technologies
-
-
Cohen, E.1
Thomas, R.K.2
Winsborough, W.3
Shands, D.4
|