-
2
-
-
1142309815
-
Provisions and obligations in policy rule management and security applications
-
Hong Kong, China, August
-
C. Bettini, S. Jajodia, S. Wang, and D. Wijesekera. Provisions and obligations in policy rule management and security applications. In Proc. 28th International Conference on Very Large Data Bases, Hong Kong, China, August 2002.
-
(2002)
Proc. 28th International Conference on Very Large Data Bases
-
-
Bettini, C.1
Jajodia, S.2
Wang, S.3
Wijesekera, D.4
-
4
-
-
0029700344
-
Decentralized trust management
-
Oakland, CA, USA, May
-
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proc. of the 1996 IEEE Symposiumon Security and Privacy, Oakland, CA, USA, May 1996.
-
(1996)
Proc. of the 1996 IEEE Symposiumon Security and Privacy
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
5
-
-
85025424440
-
An algebra for composing access control policies
-
February
-
P. Bonatti, S. De Capitani di Vimercati, and P. Samarati. An algebra for composing access control policies. ACM Transactions on Information and System Security, 5(1):1-35, February 2002.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.1
De Capitani Di Vimercati, S.2
Samarati, P.3
-
6
-
-
0036311802
-
A unified framework for regulating access and information release on the web
-
P. Bonatti and P. Samarati. A unified framework for regulating access and information release on the web. Journal of Computer Security, 10(3):241-272, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.1
Samarati, P.2
-
8
-
-
0001843009
-
Referee: Trust management forweb applications
-
Y-H. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, and M. Strauss. Referee: trust management forweb applications. WorldWide Web Journal, 2(3):706-734, 1997.
-
(1997)
WorldWide Web Journal
, vol.2
, Issue.3
, pp. 706-734
-
-
Chu, Y.-H.1
Feigenbaum, J.2
Lamacchia, B.3
Resnick, P.4
Strauss, M.5
-
9
-
-
24644439414
-
Extending policy languages to the semantic web
-
Munich, Germany, July
-
E. Damiani, S. De Capitani di Vimercati, C. Fugazza, and P. Samarati. Extending policy languages to the semantic web. In Proc. of the International Conference on Web Engineering, Munich, Germany, July 2004.
-
(2004)
Proc. of the International Conference on Web Engineering
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Fugazza, C.3
Samarati, P.4
-
10
-
-
85001697848
-
A fine-grained access control system for XML documents
-
May
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati. A fine-grained access control system for XML documents. A CM Transactions on Information and System Security (TISSEC), 5(2): 169-202, May 2002.
-
(2002)
A CM Transactions on Information and System Security (TISSEC)
, vol.5
, Issue.2
, pp. 169-202
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
12
-
-
84867167943
-
Binder, a logic-based security language
-
Oakland, CA, USA, May
-
J. DeTreville. Binder, a logic-based security language. In Proc. of the 2001 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2002.
-
(2002)
Proc. of the 2001 IEEE Symposium on Security and Privacy
-
-
Detreville, J.1
-
13
-
-
0348203654
-
Sets and constraints logic programming
-
September
-
A. Dovier, C. Piazza, E. Pontelli, and G. Rossi. Sets and constraints logic programming. ACM Transactions of Programming Languages and Systems, 22(5):861-931, September 2000.
-
(2000)
ACM Transactions of Programming Languages and Systems
, vol.22
, Issue.5
, pp. 861-931
-
-
Dovier, A.1
Piazza, C.2
Pontelli, E.3
Rossi, G.4
-
14
-
-
0038150613
-
An internet attribute certificate profile for authorization
-
April
-
S. Farrell and R. Housley. An internet attribute certificate profile for authorization. RFC 3281, April 2002.
-
(2002)
RFC
, vol.3281
-
-
Farrell, S.1
Housley, R.2
-
15
-
-
0028404874
-
A model for evaluation and administration of security in object-oriented databases
-
E.B. Fernandez, E. Gudes, and H. Song. A model for evaluation and administration of security in object-oriented databases. IEEE Transaction on Knowledge and Data Engineering, 6(2):275-292, 1994.
-
(1994)
IEEE Transaction on Knowledge and Data Engineering
, vol.6
, Issue.2
, pp. 275-292
-
-
Fernandez, E.B.1
Gudes, E.2
Song, H.3
-
17
-
-
0011795795
-
Provisional authorizations
-
Anup Ghosh, editor, Kluwer Academic Publishers, Boston
-
S. Jajodia, M. Kudo, and V.S. Subrahmanian. Provisional authorizations. In Anup Ghosh, editor, E-Commerce Security and Privacy, pages 133-159. Kluwer Academic Publishers, Boston, 2001.
-
(2001)
E-commerce Security and Privacy
, pp. 133-159
-
-
Jajodia, S.1
Kudo, M.2
Subrahmanian, V.S.3
-
18
-
-
0001619596
-
Flexible support for multiple access control policies
-
June
-
S. Jajodia, P. Samarati, M.L. Sapino, and V.S. Subrahmanian. Flexible support for multiple access control policies. ACM Transactions on Database Systems, 26(2):214-260, June 2001.
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
20
-
-
24644440247
-
Access control specification based on policy evaluation and enforcement model and specification language
-
M. Kudoh, Y. Hirayama, S. Hada, and A. Vollschwitz. Access control specification based on policy evaluation and enforcement model and specification language. In Symposium on Cryptograpy and Information Security, SCIS'2000, 2000.
-
(2000)
Symposium on Cryptograpy and Information Security, SCIS'2000
-
-
Kudoh, M.1
Hirayama, Y.2
Hada, S.3
Vollschwitz, A.4
-
21
-
-
0019608720
-
Formal models for computer security
-
C.E. Landwehr. Formal models for computer security. ACM Computing Surveys, 13(3):247-278, 1981.
-
(1981)
ACM Computing Surveys
, vol.13
, Issue.3
, pp. 247-278
-
-
Landwehr, C.E.1
-
24
-
-
84948440714
-
Design of a role-based trustmanagement framework
-
Oakland, CA, USA, May
-
N. Li, J.C. Mitchell, and W.H. Winsborough. Design of a role-based trustmanagement framework. In Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2002.
-
(2002)
Proc. of the IEEE Symposium on Security and Privacy
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
25
-
-
0041177826
-
Access control policies: Some unanswered questions
-
Franconia, NH, June
-
T. Lunt. Access control policies: Some unanswered questions. In IEEE Computer Security Foundations Workshop II, pages 227-245, Franconia, NH, June 1988.
-
(1988)
IEEE Computer Security Foundations Workshop
, vol.2
, pp. 227-245
-
-
Lunt, T.1
-
29
-
-
0005092487
-
A model of authorization for next-generation database systems
-
March
-
F. Rabitti, E. Bertino, W. Kim, and D. Woelk. A model of authorization for next-generation database systems. ACM TODS, 16(1):89-131, March 1991.
-
(1991)
ACM TODS
, vol.16
, Issue.1
, pp. 89-131
-
-
Rabitti, F.1
Bertino, E.2
Kim, W.3
Woelk, D.4
-
30
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
R. Focardi and R. Gorrieri, editors, LNCS 2171. Springer-Verlag
-
P. Samarati and S. De Capitani di Vimercati. Access control: Policies, models, and mechanisms. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, LNCS 2171. Springer-Verlag, 2001.
-
(2001)
Foundations of Security Analysis and Design
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
31
-
-
84893105662
-
Requirements for policy languages for trust negotiation
-
Monterey, CA, June
-
K.E. Seamons, M. Winslett, T. Yu, B. Smith, E. Child, J. Jacobson, H. Mills, and L. Yu. Requirements for policy languages for trust negotiation. In Proc. of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), Monterey, CA, June 2002.
-
(2002)
Proc. of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002)
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
Smith, B.4
Child, E.5
Jacobson, J.6
Mills, H.7
Yu, L.8
-
33
-
-
20444479906
-
A logic-based framework for attribute based access control
-
Washington DC, USA, October
-
L. Wang, D. Wijesekera, and S. Jajodia. A logic-based framework for attribute based access control. In Proc. of the 2004 ACM Workshop on Formal Methods in Security Engineering, Washington DC, USA, October 2004.
-
(2004)
Proc. of the 2004 ACM Workshop on Formal Methods in Security Engineering
-
-
Wang, L.1
Wijesekera, D.2
Jajodia, S.3
-
35
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
February
-
T. Yu, M. Winslett, and K.E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security, 6(1):l-42, February 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|