-
1
-
-
84862438462
-
-
Accenture Web Services Case Study. http://www.accenture.com/xd/xd.asp?it= enweb&xd=services\ microsoft\case\micr_ergo.xml
-
Accenture Web Services Case Study
-
-
-
3
-
-
4143081530
-
X-GTRBAC: An XML-based policy specification framework and architecture for enterprise-wide access control
-
Masters Thesis, Purdue University, May
-
R. Bhatti, "X-GTRBAC: An XML-based policy specification framework and architecture for enterprise-wide access control," Masters Thesis, Purdue University, May 2003. Available as CERIAS technical report 2003-27.
-
(2003)
CERIAS Technical Report
, vol.2003
, Issue.27
-
-
Bhatti, R.1
-
4
-
-
1642341365
-
Access control in dynamic XML-based Web-services with X-RBAC
-
Las Vegas, June 23-26
-
R. Bhatti, J.B.D. Joshi, E. Bertino, and A. Ghafoor, "Access control in dynamic XML-based Web-services with X-RBAC," in Proceedings of The First International Conference on Web Services, Las Vegas, June 23-26, 2003.
-
(2003)
Proceedings of the First International Conference on Web Services
-
-
Bhatti, R.1
Joshi, J.B.D.2
Bertino, E.3
Ghafoor, A.4
-
5
-
-
4143146358
-
X GTRBAC admin: A decentralized administration model for enterprise wide access control
-
New York, June 2-4
-
R. Bhatti, J.B.D. Joshi, E. Bertino, and A. Ghafoor, "X GTRBAC admin: A decentralized administration model for enterprise wide access control," in Proceedings of 9th ACM Symposium on Access Control Models and Technologies, New York, June 2-4, 2004.
-
(2004)
Proceedings of 9th ACM Symposium on Access Control Models and Technologies
-
-
Bhatti, R.1
Joshi, J.B.D.2
Bertino, E.3
Ghafoor, A.4
-
6
-
-
0003226048
-
"The KeyNote Trust Management System," version 2
-
September
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A.D. Keromytis, "The KeyNote Trust Management System," version 2. IETF RFC 2704, September 1999.
-
(1999)
IETF RFC
, vol.2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
7
-
-
85001697848
-
A fine grained access control system for XML documents
-
May
-
E. Damiani, S.D.C. di Vimercati, S. Paraboschi, and P. Samarati, "A fine grained access control system for XML documents," ACM Transactions on Information and System Security, vol. 5, Issue 2, May 2002.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.2
-
-
Damiani, E.1
Di Vimercati, S.D.C.2
Paraboschi, S.3
Samarati, P.4
-
8
-
-
4143058053
-
Using trust and risk in role-based access control policies
-
New York, June 2-4
-
N. Dimmock, A. Belokosztolszki, D. Eyers, J. Bacon, and K. Moody, "Using trust and risk in role-based access control policies," in Proceedings of 9th ACM Symposium on Access Control Models and Technologies, New York, June 2-4, 2004.
-
(2004)
Proceedings of 9th ACM Symposium on Access Control Models and Technologies
-
-
Dimmock, N.1
Belokosztolszki, A.2
Eyers, D.3
Bacon, J.4
Moody, K.5
-
9
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
August
-
D.F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn, and R. Chandramouli, "Proposed NIST standard for role-based access control," ACM Transactions on Information and System Security (TISSEC), vol. 4, Issue 3, August 2001.
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.3
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
11
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
IEEE Press
-
A. Herzberg, Y. Mass, J. Mihaeli, D. Naor, and Y. Ravid, "Access control meets public key infrastructure, or: Assigning roles to strangers," in Proceedings of the 2000 IEEE Symposium on Security and Privacy, IEEE Press, 2000, pp. 2-14.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
Naor, D.4
Ravid, Y.5
-
12
-
-
17444406680
-
A generalized temporal role based access control model
-
January
-
J.B.D. Joshi, E. Bertino, U. Latif, and A. Ghafoor, "A Generalized Temporal Role Based Access Control Model," IEEE Transaction on Knowledge and Data Engineering, vol. 17, no. 1, January 2005.
-
(2005)
IEEE Transaction on Knowledge and Data Engineering
, vol.17
, Issue.1
-
-
Joshi, J.B.D.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
14
-
-
0004255908
-
-
ISBN 0070428077, McGraw Hill
-
T. Mitchell, "Machine Learning," ISBN 0070428077, McGraw Hill, 1997.
-
(1997)
Machine Learning
-
-
Mitchell, T.1
-
15
-
-
84860940436
-
-
OASIS, Security Services TC. http://www.oasis-open.org/committees/ tc_home.php?wg_abbrev = security
-
-
-
-
16
-
-
0030086382
-
Role based access control models
-
February
-
R. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, "Role based access control models," IEEE Computer, vol. 29, no. 2, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
18
-
-
77954476833
-
Managing security policies in a distributed environment using extensible markup language (XML)
-
March
-
N.N. Vuong, G.S. Smith, and Y. Deng, "Managing security policies in a distributed environment using extensible markup language (XML)," Symposium on Applied Computing, March 2001.
-
(2001)
Symposium on Applied Computing
-
-
Vuong, N.N.1
Smith, G.S.2
Deng, Y.3
|