-
1
-
-
84956993736
-
Role-based authorization constraints specification
-
AHN, G.-J. AND SANDHU, R. 2000. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3, 4 (Nov.).
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.4 NOV
-
-
Ahn, G.-J.1
Sandhu, R.2
-
2
-
-
0033650839
-
Injecting RBAC to secure a Web-based workflow system
-
Berlin, Germany
-
AHN, G.-J., SANDHU, R., KANG, M., AND PARK, J. 2000. Injecting RBAC to secure a Web-based workflow system. In Proceedings of 5th ACM Workshop on Role-Based Access Control. Berlin, Germany.
-
(2000)
Proceedings of 5th ACM Workshop on Role-based Access Control
-
-
Ahn, G.-J.1
Sandhu, R.2
Kang, M.3
Park, J.4
-
3
-
-
35048898774
-
Role-based privilege management using attribute certificates and delegation
-
Lecture Notes in Computer Science. Springer-Verlag
-
AHN, G.-J., SHIN, D., AND ZHANG, L. 2004. Role-based privilege management using attribute certificates and delegation. In International Conference on Trust and Privacy in Digital Business. Lecture Notes in Computer Science. Springer-Verlag.
-
(2004)
International Conference on Trust and Privacy in Digital Business
-
-
Ahn, G.-J.1
Shin, D.2
Zhang, L.3
-
4
-
-
0242552308
-
Authorization management for role-based collaboration
-
Washington, DC
-
AHN, G.-J., ZHANG, L., SHIN, D., AND CHU, B. 2003. Authorization management for role-based collaboration. In IEEE International Conference on System, Man and Cybernetic. Washington, DC. 4128-4214.
-
(2003)
IEEE International Conference on System, Man and Cybernetic
, pp. 4128-4214
-
-
Ahn, G.-J.1
Zhang, L.2
Shin, D.3
Chu, B.4
-
5
-
-
0002848811
-
Specification and enforcement of authorization constraints in workflow management systems
-
BERTINO, E., FERRARI, E., AND ATLURI, V. 1999. Specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2, 1 (Feb.).
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1 FEB
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
6
-
-
0033645572
-
TRBAC: A temporal role-based access control model
-
Berlin, Germany
-
BERTINO, E., FERRARI, E., AND BONATTI, P. A. 2000. TRBAC: A temporal role-based access control model. In Proceedings of 5th ACM Workshop on Role-Based Access Control. Berlin, Germany.
-
(2000)
Proceedings of 5th ACM Workshop on Role-based Access Control
-
-
Bertino, E.1
Ferrari, E.2
Bonatti, P.A.3
-
7
-
-
84987252497
-
Icicle: Groupware for code inspection
-
Los Angeles, CA
-
BROTHERS, L., SEMBUGAMOORTHY, V., AND MULLER, M. 1990. Icicle: Groupware for code inspection. In ACM Conference on Computer-Supported Cooperative Work. Los Angeles, CA. 169-181.
-
(1990)
ACM Conference on Computer-Supported Cooperative Work
, pp. 169-181
-
-
Brothers, L.1
Sembugamoorthy, V.2
Muller, M.3
-
9
-
-
33645623929
-
An access control framework for multi-user collaborative environments
-
Phoenix, AZ
-
BULLOCK, A. AND BENFORD, S. 1999. An access control framework for multi-user collaborative environments. In ACM GROUP. Phoenix, AZ.
-
(1999)
ACM GROUP
-
-
Bullock, A.1
Benford, S.2
-
10
-
-
0031599869
-
Role and task-based access control in the perdis groupware platform
-
Fairfax, VA
-
COULOURIS, G., DOLLIMORE, J., AND B., R. 1998. Role and task-based access control in the perdis groupware platform. In Proceedings of 3rd ACM Workshop on Role-Based Access Control. Fairfax, VA. 115-121.
-
(1998)
Proceedings of 3rd ACM Workshop on Role-Based Access Control
, pp. 115-121
-
-
Coulouris, G.1
Dollimore, J.2
R., B.3
-
11
-
-
0035791053
-
Securing context-aware applications using environment roles
-
Chantilly, VA
-
COVINGTON, M., LONG, W., SRINIVASAN, S., DEY, A., AHAMAD, M., AND ABOWD, G. D. 2001. Securing context-aware applications using environment roles. In ACM Symposium on Access Control Model and Technology. Chantilly, VA.
-
(2001)
ACM Symposium on Access Control Model and Technology
-
-
Covington, M.1
Long, W.2
Srinivasan, S.3
Dey, A.4
Ahamad, M.5
Abowd, G.D.6
-
14
-
-
0002154667
-
Design and use of a group editor
-
ELLIS, C. A., GIBBS, S. J., AND REIN, G. L. 1989. Design and use of a group editor. In International Federation for Information Processing Working Group 2.7, Working Conference on Engineering for Human-Computer Interaction. 13-28.
-
(1989)
International Federation for Information Processing Working Group 2.7, Working Conference on Engineering for Human-computer Interaction
, pp. 13-28
-
-
Ellis, C.A.1
Gibbs, S.J.2
Rein, G.L.3
-
16
-
-
0002422823
-
A role based access control model and reference implementation within a corporate intranet
-
FERRAIOLO, D. F., BARKLEY, J. F., AND KUHN, D. R. 1999. A role based access control model and reference implementation within a corporate intranet. ACM Trans. Inf. Syst. Secur. 2, 1 (Feb.).
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1 FEB
-
-
Ferraiolo, D.F.1
Barkley, J.F.2
Kuhn, D.R.3
-
17
-
-
0035790754
-
Flexible team-based access control using contexts
-
Chantilly, VA
-
GEORGIADIS, C. K., MAVRIDIS, I., PANGALOS, G., AND THOMAS, R. 2001. Flexible team-based access control using contexts. In ACM Symposium on Access Control Model and Technology. Chantilly, VA.
-
(2001)
ACM Symposium on Access Control Model and Technology
-
-
Georgiadis, C.K.1
Mavridis, I.2
Pangalos, G.3
Thomas, R.4
-
18
-
-
0023325798
-
Data sharing in group work
-
GRIEF, I. AND SARIN, S. 1987. Data sharing in group work. ACM Trans. Inf. Syst. 5, 2 (April), 187-211.
-
(1987)
ACM Trans. Inf. Syst.
, vol.5
, Issue.2 APRIL
, pp. 187-211
-
-
Grief, I.1
Sarin, S.2
-
20
-
-
0029426927
-
Requirements of role-based access control for collaborative systems
-
Gaithersburg, MD
-
JAEGER, T. AND PRAKASH, A. 1996. Requirements of role-based access control for collaborative systems. In ACM Role-based Access Control Workshop. Gaithersburg, MD. 53-64.
-
(1996)
ACM Role-based Access Control Workshop
, pp. 53-64
-
-
Jaeger, T.1
Prakash, A.2
-
21
-
-
0035790711
-
Access control mechanisms for inter-organizational workflow
-
Chantilly, VA
-
KANG, M. H., PARK, J. S., AND FROSCHER, J. N. 2001. Access control mechanisms for inter-organizational workflow. In ACM Symposium on Access Control Model and Technology. Chantilly, VA.
-
(2001)
ACM Symposium on Access Control Model and Technology
-
-
Kang, M.H.1
Park, J.S.2
Froscher, J.N.3
-
22
-
-
0026993108
-
Flexible active support for collaborative work with conversation builder
-
Toronto, Ontario, Canada
-
KAPLAN, S., TOLONE, W., D.P., B., AND BIGNOLI, C. 1992. Flexible active support for collaborative work with conversation builder. In ACM Conference on Computer-Supported Cooperative Work. Toronto, Ontario, Canada. 378-385.
-
(1992)
ACM Conference on Computer-Supported Cooperative Work
, pp. 378-385
-
-
Kaplan, S.1
Tolone, W.2
B., D.P.3
Bignoli, C.4
-
24
-
-
3142654848
-
-
Reprinted in
-
Reprinted in ACM Operat. Syst. Rev. 8, 1, 18-24, 1974.
-
(1974)
ACM Operat. Syst. Rev.
, vol.8
, Issue.1
, pp. 18-24
-
-
-
25
-
-
85029740685
-
Issues in the design of computer support for co-authoring and commenting
-
Los Angeles, CA
-
NEUWIRTH, C. M., KAUFER, D. S., CHANDHOK, R., AND MORRIS, J. H. 1990. Issues in the design of computer support for co-authoring and commenting. In ACM Conference on Computer-Supported Cooperative Work. Los Angeles, CA. 183-195.
-
(1990)
ACM Conference on Computer-supported Cooperative Work
, pp. 183-195
-
-
Neuwirth, C.M.1
Kaufer, D.S.2
Chandhok, R.3
Morris, J.H.4
-
26
-
-
84994391858
-
Role-based access control on the web
-
PARK, J., SANDHU, R., AND AHN, G.-J. 2001. Role-based access control on the web. ACM Trans. Inf. Syst. Secur. 4, 1 (Feb.).
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.1 FEB
-
-
Park, J.1
Sandhu, R.2
Ahn, G.-J.3
-
27
-
-
0028513932
-
Access control: Principles and practice
-
SANDHU, R. AND SAMARATI, P. 1994. Access control: Principles and practice. IEEE Communications 32, 9, 40-48.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
28
-
-
0030086382
-
Role-based access control models
-
SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Computer 29, 2 (Feb.), 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2 FEB
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
30
-
-
0038663269
-
Role-based EAM using x.509 attribute certificate
-
Cambridge, UK
-
SHIN, D., AHN, G.-J., AND CHO, S. 2002. Role-based EAM using x.509 attribute certificate. In Proceedings of 16th Annual International Federation for Information Processing Working Group 11.3, Working Conference on Data and Application Security. Cambridge, UK.
-
(2002)
Proceedings of 16th Annual International Federation for Information Processing Working Group 11.3, Working Conference on Data and Application Security
-
-
Shin, D.1
Ahn, G.-J.2
Cho, S.3
-
32
-
-
85016864383
-
Integrating communication, cooperation, and awareness: The diva virtual office environment
-
Chapel Hill, NC
-
SOHLENKAMP, M. AND CHWELOS, G. 1994. Integrating communication, cooperation, and awareness: The diva virtual office environment. In ACM Conference on Computer Supported Cooperative Work. Chapel Hill, NC. 331-343.
-
(1994)
ACM Conference on Computer Supported Cooperative Work
, pp. 331-343
-
-
Sohlenkamp, M.1
Chwelos, G.2
-
34
-
-
0002841051
-
Task-based authorization controls (TBAC): Models for active and enterprise-oriented authorization management
-
T. Y. Lin and X. Qian, Eds. North-Holland
-
THOMAS, R. AND SANDHU, R. 1997. Task-based authorization controls (TBAC): Models for active and enterprise-oriented authorization management. In Database Security XI: Status and Prospects, T. Y. Lin and X. Qian, Eds. North-Holland.
-
(1997)
Database Security XI: Status and Prospects
-
-
Thomas, R.1
Sandhu, R.2
-
36
-
-
0032620331
-
Team-and-role-based organizational context and access control for cooperative hypermedia environments
-
WANG, W. 1999. Team-and-role-based organizational context and access control for cooperative hypermedia environments. In ACM Hypertext.
-
(1999)
ACM Hypertext
-
-
Wang, W.1
-
37
-
-
0035790651
-
A model of oasis role-based access control and its support for active security
-
ACM. Chantilly, VA
-
YAO, W., MOODY, K., AND BACON, J. 2001. A model of oasis role-based access control and its support for active security. In ACM Symposium on Access Control Model and Technology. ACM. Chantilly, VA.
-
(2001)
ACM Symposium on Access Control Model and Technology
-
-
Yao, W.1
Moody, K.2
Bacon, J.3
-
38
-
-
0035790650
-
A rule-based framework for role-based delegation
-
Chantilly, VA
-
ZHANG, L., AHN, G.-J., AND CHU, B. 2001. A rule-based framework for role-based delegation. In ACM Symposium on Access Control Model and Technology. Chantilly, VA. 153-162.
-
(2001)
ACM Symposium on Access Control Model and Technology
, pp. 153-162
-
-
Zhang, L.1
Ahn, G.-J.2
Chu, B.3
-
39
-
-
3042684910
-
A rule-based framework for role-based delegation and revocation
-
ZHANG, L., AHN, G.-J., AND CHU, B. 2003. A rule-based framework for role-based delegation and revocation. ACM Trans. Inf. Syst. Secur. 6, 3 (Aug.).
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.3 AUG
-
-
Zhang, L.1
Ahn, G.-J.2
Chu, B.3
|