-
1
-
-
84865788031
-
A model of OASIS role-based access control and its support for active security
-
Nov.
-
BACON, J., MOODY, K., AND YAO, W. 2002. A model of OASIS role-based access control and its support for active security. ACM Transactions on Information and System Security, 5, 4 (Nov.).
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, pp. 4
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
2
-
-
0032153903
-
An access control model supporting periodicity constraints and temporal reasoning
-
Sept
-
BERTINO, E., BETTINI, C., FERRARI, E., AND SAMARATI, P. 1998. An access control model supporting periodicity constraints and temporal reasoning. ACM Transactions on Database Systems 23, 3 (Sept).
-
(1998)
ACM Transactions on Database Systems
, vol.23
, pp. 3
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
3
-
-
84944792110
-
TRBAC: A temporal role-based access control model
-
Aug.
-
BERTINO, E., BONATTI, P., AND FERRARI, E. 2001. TRBAC: A temporal role-based access control model. ACM Transactions on Information and System Security 4, 3 (Aug.).
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, pp. 3
-
-
Bertino, E.1
Bonatti, P.2
Ferrari, E.3
-
4
-
-
0035330891
-
Securing XML documents with author X
-
May-June
-
BERTINO, E., CASTANO, S., AND FERRARI, E. 2001. Securing XML documents with author X. IEEE Internet Computing 5, 3 (May-June).
-
(2001)
IEEE Internet Computing
, vol.5
, pp. 3
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
-
5
-
-
84989880098
-
Controlled access and dissemination of XML documents
-
Kansas City, MI, Nov. 2-6
-
BERTINO, E., CASTANO, S., FERRARI, E., AND MESITI, M. 1999a. Controlled access and dissemination of XML documents. In Workshop on Web Information and Data Management, Kansas City, MI, Nov. 2-6.
-
(1999)
Workshop on Web Information and Data Management
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
Mesiti, M.4
-
6
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Feb.
-
BERTINO, E., FERRARI, E., AND ATLURI, V. 1999b. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security 2, 1 (Feb.).
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, pp. 1
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
7
-
-
4143081530
-
X-GTRBAC: An XML-based policy specification framework and architecture for enterprise-wide access control
-
Masters Thesis, Purdue University
-
BHATTI, R. 2003. X-GTRBAC: An XML-based policy specification framework and architecture for enterprise-wide access control. Masters Thesis, Purdue University. Available as CERIAS Technical Report 2003-27.
-
(2003)
CERIAS Technical Report
, vol.2003
, Issue.27
-
-
Bhatti, R.1
-
8
-
-
23244460554
-
Towards improved federated identity and privilege management in open systems
-
BHATTI, R., BERTINO, E., AND GHAFOOR, A. 2004a. Towards Improved Federated Identity and Privilege Management in Open Systems. CERIAS Technical Report 2004-32.
-
(2004)
CERIAS Technical Report
, vol.2004
, Issue.32
-
-
Bhatti, R.1
Bertino, E.2
Ghafoor, A.3
-
9
-
-
23244463177
-
XML-based RBAC policy specification for secure Web-services
-
Apr.
-
BHATTI, R., JOSHI, J. B. D., BERTINO, E., AND GHAFOOR, A. 2004b. XML-based RBAC policy specification for secure Web-services. IEEE Computer 37, 4 (Apr.).
-
(2004)
IEEE Computer
, vol.37
, pp. 4
-
-
Bhatti, R.1
Joshi, J.B.D.2
Bertino, E.3
Ghafoor, A.4
-
10
-
-
4143146358
-
X-GTRBAC admin: A decentralized adminstration model for enterprise wide access control
-
Yorktown, Heights, NY, June 2-4
-
BHATTI, R., JOSHI, J. B. D., BERTINO, E., AND GHAFOOR, A. 2004c. X-GTRBAC admin: A decentralized adminstration model for enterprise wide access control. In Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, Yorktown, Heights, NY, June 2-4.
-
(2004)
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies
-
-
Bhatti, R.1
Joshi, J.B.D.2
Bertino, E.3
Ghafoor, A.4
-
11
-
-
0002422823
-
A role based access control model and reference implementation within a corporate Intranet
-
Feb.
-
FERRAIOLO, D. F., BARKLEY, J. F., AND KUHN, D. R. 1999. A role based access control model and reference implementation within a corporate Intranet. ACM Transactions on Information and System Security 2, 1 (Feb.).
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, pp. 1
-
-
Ferraiolo, D.F.1
Barkley, J.F.2
Kuhn, D.R.3
-
12
-
-
0000985630
-
An examination of federal and commercial access control policy needs
-
Baltimore, MD, Sept. 20-23
-
FERRAIOLO, D. F., GILBERT, D. M., AND LYNCH, N. 1993. An examination of federal and commercial access control policy needs. In Proceedings of NISTNCSC National Computer Security Conference, Baltimore, MD, Sept. 20-23.
-
(1993)
Proceedings of NISTNCSC National Computer Security Conference
-
-
Ferraiolo, D.F.1
Gilbert, D.M.2
Lynch, N.3
-
13
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Aug.
-
FERRAIOLO, D. F., SANDHU, R., GAVRILA, S., RICHARD KUHN, D., AND CHANDRAMOULI R. 2001. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security 4, 3 (Aug.).
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, pp. 3
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Richard Kuhn, D.4
Chandramouli, R.5
-
14
-
-
0033652039
-
The NIST model for role-based access control: Towards a unified standard
-
Berlin, Germany, July 26-28
-
FERRAIOLO, D., SANDHU, R., GAVRILA, S., KUHN, R., AND CHANDRAMOULI, R. 2000. The NIST model for role-based access control: Towards a unified standard. In Proceedings of the 5th ACM Workshop on Role-Based Control, Berlin, Germany, July 26-28.
-
(2000)
Proceedings of the 5th ACM Workshop on Role-based Control
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, R.4
Chandramouli, R.5
-
15
-
-
0031611731
-
Formal specification for role based access control user/role and role/role relationship management
-
Fairfax, VA, Oct. 22-23
-
GAVRILA, S. I. AND BARKLEY, J. F. 1998. Formal specification for role based access control user/role and role/role relationship management. In Proceedings of the 3rd ACM Workshop on Role-Based Access Control, Fairfax, VA, Oct. 22-23.
-
(1998)
Proceedings of the 3rd ACM Workshop on Role-based Access Control
-
-
Gavrila, S.I.1
Barkley, J.F.2
-
18
-
-
0003665242
-
-
ISO 8879. Information Processing - Text and Office Systems - Standard Generalized Markup Language (SGML)
-
ISO. 1986. Standard Generalized Markup Language (SGML). ISO 8879. Information Processing - Text and Office Systems - Standard Generalized Markup Language (SGML).
-
(1986)
Standard Generalized Markup Language (SGML)
-
-
-
19
-
-
84871545589
-
-
JAVA COMMERCE. XML tutorial. http://www.javacommerce.com/tutorial/xmlj/ intro.htm.
-
XML Tutorial
-
-
-
20
-
-
84860986539
-
-
JTENENBG. Overview of enterprise computing, http://faculty.washington. edu/jtenenbg/courses/455/s02/sessions/ec_overview.ppt.
-
Overview of Enterprise Computing
-
-
-
21
-
-
17444406680
-
A generalized temporal role based access control model (GTRBAC)
-
Jan.
-
JOSHI, J. B. D., BERTINO, E., LATIF, U., AND GHAFOOR, A. 2005. A generalized temporal role based access control model (GTRBAC). IEEE Transaction on Knowledge and Data Engineering 17, 1 (Jan.).
-
(2005)
IEEE Transaction on Knowledge and Data Engineering
, vol.17
, pp. 1
-
-
Joshi, J.B.D.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
23
-
-
0035251598
-
Digital government security infrastructure design challenges
-
Feb.
-
JOSHI, J. B. D., GHAFOOR, A., AREF, W., AND SPAFFORD, E. H. 2001. Digital government security infrastructure design challenges. IEEE Computer 34, 2 (Feb.).
-
(2001)
IEEE Computer
, vol.34
, pp. 2
-
-
Joshi, J.B.D.1
Ghafoor, A.2
Aref, W.3
Spafford, E.H.4
-
24
-
-
84948985429
-
Advanced features for enterprise-wide role-based access control
-
Las Vegas, NV, Dec. 9-13
-
KERN, A. 2002. Advanced features for enterprise-wide role-based access control. In Annual Computer Security Applications Conference, Las Vegas, NV, Dec. 9-13.
-
(2002)
Annual Computer Security Applications Conference
-
-
Kern, A.1
-
26
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
Feb.
-
OSBORN, S. L., SANDHU, R., AND MUNAWER, Q. 2000. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security 3, 2 (Feb.).
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, pp. 2
-
-
Osborn, S.L.1
Sandhu, R.2
Munawer, Q.3
-
27
-
-
0030086382
-
Role based access control models
-
Feb.
-
SANDHU, R., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role based access control models. IEEE Computer 29, 2 (Feb.).
-
(1996)
IEEE Computer
, vol.29
, pp. 2
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
28
-
-
77954476833
-
Managing security policies in a distributed environment using eXtensible markup language (XML)
-
Las Vegas, NV, Mar. 11-14
-
VUONG, N. N., SMITH, G. S., AND DENG, Y. 2001. Managing security policies in a distributed environment using eXtensible markup language (XML). In Symposium on Applied Computing, Las Vegas, NV, Mar. 11-14.
-
(2001)
Symposium on Applied Computing
-
-
Vuong, N.N.1
Smith, G.S.2
Deng, Y.3
-
30
-
-
84872506135
-
-
W3
-
W3. W3C XML schema. www.w3.org/XML/Schema.
-
W3C XML Schema
-
-
-
31
-
-
84860974304
-
-
WEB REFERENCE. Web services XML's role, http://www.webreference.com/js/ tips/011028.html.
-
Web Services XML's Role
-
-
-
33
-
-
23244437762
-
-
XML COVERPAGES. 2003a. XACML 1.0 specification, http://xml.coverpages. org/ni2003-02-11-a.html.
-
(2003)
XACML 1.0 Specification
-
-
-
34
-
-
23244451611
-
-
XML COVERPAGES. 2003b. SAML 1.0 specification, http://xml.coverpages.org/ ni2003-05-27-b.html.
-
(2003)
SAML 1.0 Specification
-
-
-
35
-
-
84860983851
-
-
XML COVERPAGES. 2004. OASIS RBAC announcement, http://xml.coverpages.org/ ni2004-04-05-a.html.
-
(2004)
OASIS RBAC Announcement
-
-
-
36
-
-
84860982813
-
XML path language (XPath) 2.0
-
16 August 2002
-
XPATH. 2002. XML Path Language (XPath) 2.0. Working Draft 16 August 2002. http://www.w3.org/TR/xpath20/.
-
(2002)
Working Draft
-
-
|