-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
4(Sept.
-
Abadi, M., Burrows, M., Lampson, B., Plotkin, G., 1993. A calculus for access control in distributed systems.ACM Trans. Program. Lang. Syst. 15, 4(Sept.), 706-734.
-
(1993)
ACM Trans. Program. Lang. Syst.
, vol.15
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
3
-
-
84956993736
-
Role-based authorization constraints specification
-
ACM (November
-
Ahn, G., Sandhu, R., 2000. Role-based authorization constraints specification.ACM Transactions on Information and System Security 3, 4, ACM (November) 207-226.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 207-226
-
-
Ahn, G.1
Sandhu, R.2
-
4
-
-
84982994153
-
Distributed access-rights management with delegation certificates
-
J. Vitec and C. Jensen Eds. Springer, Berlin
-
Aura, T., 1999. Distributed access-rights management with delegation certificates.Security Internet programming. J. Vitec and C. Jensen Eds. Springer, Berlin, 211-235.
-
(1999)
Security Internet programming.
, pp. 211-235
-
-
Aura, T.1
-
5
-
-
0003123129
-
A role-based delegation model and some extensions
-
Sheraton New Orleans, December 2000a.
-
Barka, E., Sandhu, R., 2000. A role-based delegation model and some extensions. In Proceedings of 16th Annual Computer Security Application Conference, Sheraton New Orleans, December 11-15, 2000a.
-
(2000)
Proceedings of 16th Annual Computer Security Application Conference
, pp. 11-15
-
-
Barka, E.1
Sandhu, R.2
-
6
-
-
0003123129
-
Framework for role-based delegation model
-
Baltimore, October 16-19, 2000b
-
Barka, E., Sandhu, R., 2000. Framework for role-based delegation model. In Proceedings of 23rd National Information Systems Security Conference, Baltimore, October 16-19, 2000b, 101-114.
-
(2000)
Proceedings of 23rd National Information Systems Security Conference
, pp. 101-114
-
-
Barka, E.1
Sandhu, R.2
-
7
-
-
0013192086
-
Push Architectures for USER ROLE assignment
-
Baltimore, October 16-19 2000
-
Bhamidipati, V., Sandhu, R., 2000. Push Architectures for USER ROLE assignment. In Proceedings of 23rd National Information Systems Security Conference, Baltimore, October 16-19, 2000, 89-100.
-
(2000)
Proceedings of 23rd National Information Systems Security Conference
, pp. 89-100
-
-
Bhamidipati, V.1
Sandhu, R.2
-
8
-
-
0029700344
-
Decentralized trust management
-
Oakland, CA. May 1996
-
Blaze, M., Feigenbaum, J., Lacy, J., 1996. Decentralized trust management.IEEE Symposium on Security and Privacy. Oakland, CA. May 1996.
-
(1996)
IEEE Symposium on Security and Privacy.
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
9
-
-
84982899264
-
The role of trust management in distributed system security
-
J. Vitec and C. Jensen, eds. Springer, Berlin
-
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A., 1999. The role of trust management in distributed system security.Security Internet Programming. J. Vitec and C. Jensen, eds. Springer, Berlin, 185-210.
-
(1999)
Security Internet Programming.
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
10
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate intranet
-
1(February
-
Ferraiolo, D., Barkley, J., Kuhn, D. R., 1999. A role-based access control model and reference implementation within a corporate intranet.ACM Transactions on Information and System Security 2, 1(February), 34-64.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, pp. 34-64
-
-
Ferraiolo, D.1
Barkley, J.2
Kuhn, D.R.3
-
11
-
-
0002262722
-
Role-based access control (RBAC): features and Motivations
-
New Orleans, LA, December 11-15 1995
-
Ferraiolo, D., Cugini, J., Kuhn, D. R., 1995. Role-based access control (RBAC): features and Motivations. In Proceedings of 11th Annual Computer Security Application Conference. New Orleans, LA, December 11-15 1995, 241.
-
(1995)
Proceedings of 11th Annual Computer Security Application Conference
, pp. 241
-
-
Ferraiolo, D.1
Cugini, J.2
Kuhn, D.R.3
-
14
-
-
0024984237
-
An architecture for practical delegation a distributed system
-
Oakland, CA, May 7-9, 1990
-
Gasser, M., Mcdermott, E., 1990. An architecture for practical delegation a distributed system.IEEE Computer Society Symposium on Research in Security and Privacy. Oakland, CA, May 7-9, 1990.
-
(1990)
IEEE Computer Society Symposium on Research in Security and Privacy.
-
-
Gasser, M.1
Mcdermott, E.2
-
16
-
-
0034829103
-
Revocations-a classification
-
Nova Scotia, Canada, June 2001
-
Hagstrom, A., Jajodia, S., Presicce, F. P., Wijesekera, D., 2001. Revocations-a classification. In Proceedings of 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, June 2001, 44-58.
-
(2001)
Proceedings of 14th IEEE Computer Security Foundations Workshop
, pp. 44-58
-
-
Hagstrom, A.1
Jajodia, S.2
Presicce, F.P.3
Wijesekera, D.4
-
17
-
-
0031650454
-
OASIS: access control in an open, distributed environment
-
Oakland, CA, May 3-6. IEEE Computer Society Press, Los Alamitos, CA
-
Hayton, R., Bacon, J., Moody, K., 1998. OASIS: access control in an open, distributed environment. In Proceedings of 1998 IEEE Symposium on Security and Privacy. Oakland, CA, May 3-6. IEEE Computer Society Press, Los Alamitos, CA, 3-14.
-
(1998)
Proceedings of 1998 IEEE Symposium on Security and Privacy.
, pp. 3-14
-
-
Hayton, R.1
Bacon, J.2
Moody, K.3
-
19
-
-
0026684778
-
Authentication in distributed systems: theory and practice
-
November 1992
-
Lampson, B. W., Abadi, M., Burrows, M. L., Wobber, E., 1992. Authentication in distributed systems: theory and practice.ACM Transactions on Computer Systems 10, 4, 265-310, November 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.W.1
Abadi, M.2
Burrows, M.L.3
Wobber, E.4
-
20
-
-
0032671779
-
A logic-based knowledge representation for authorization with delegation (extended abstract)
-
extended version is IBM Research Report RC 21492
-
Li, N., Feigenbaum, J., Grosof, B. N., 1999. A logic-based knowledge representation for authorization with delegation (extended abstract). In Proceeding 12th intl. IEEE Computer Security Foundations Workshop, (extended version is IBM Research Report RC 21492).
-
(1999)
Proceeding 12th intl. IEEE Computer Security Foundations Workshop
-
-
Li, N.1
Feigenbaum, J.2
Grosof, B.N.3
-
22
-
-
84930508042
-
Role delegation for a distributed, unified RBAC/MAC
-
University of Cambridge, UK July 29-31, 2002
-
Liebrand, M., Ellis, H. J., Phillips, C., Ting, T. C., 2002. Role delegation for a distributed, unified RBAC/MAC. In Proceedings of Sixteenth Annual IFIP WG 11.3 Working Conference on Data and Application Security King's College, University of Cambridge, UK July 29-31, 2002.
-
(2002)
Proceedings of Sixteenth Annual IFIP WG 11.3 Working Conference on Data and Application Security King's College
-
-
Liebrand, M.1
Ellis, H.J.2
Phillips, C.3
Ting, T.C.4
-
23
-
-
0012077289
-
Attribute certification: an enabling technology for delegation and role-based controls in distributed environments
-
Linn, J., Nystrom, M., 1999. Attribute certification: an enabling technology for delegation and role-based controls in distributed environments.ACM Workshop on Role-Based Access Control 121-130.
-
(1999)
ACM Workshop on Role-Based Access Control
, pp. 121-130
-
-
Linn, J.1
Nystrom, M.2
-
25
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
1(February
-
Sandhu, R., Bhamidipati, V., Munawer, O., 1999. The ARBAC97 model for role-based administration of roles.ACM Transactions on Information and System Security 2, 1(February), 105-135.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, O.3
-
26
-
-
0030086382
-
Role-based access control model
-
2(February
-
Sandhu, R., Coyne, E., Feinstein, H., Youman, C., 1996. Role-based access control model.IEEE Computer 29, 2(February).
-
(1996)
IEEE Computer
, vol.29
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
27
-
-
0035790651
-
A model of OASIS role-based access control and its support for active security
-
Chantilly, VA, May 3-4, 2001
-
Yao, W., Moody, K., Bacon, J., 2001. A model of OASIS role-based access control and its support for active security. In Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT), Chantilly, VA, May 3-4, 2001, 171-181.
-
(2001)
Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT
, pp. 171-181
-
-
Yao, W.1
Moody, K.2
Bacon, J.3
-
28
-
-
0035790650
-
A Rule-based framework for role-based delegation
-
Chantilly, VA, May 3-4, 2001
-
Zhang, L., Ahn, G., Chu, B., 2001. A Rule-based framework for role-based delegation. In Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT 2001), Chantilly, VA, May 3-4, 2001 153-162.
-
(2001)
Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT 2001
, pp. 153-162
-
-
Zhang, L.1
Ahn, G.2
Chu, B.3
-
29
-
-
0242456746
-
A role-based delegation framework for healthcare information systems
-
Monterey, CA, June 3-4
-
Zhang, L., Ahn, G., Chu, B., 2002. A role-based delegation framework for healthcare information systems. In Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT2002). Monterey, CA, June 3-4, 2002, 125-134.
-
(2002)
Proceedings of ACM Symposium on Access Control Models and Technologies (SACMAT2002).
, vol.2002
, pp. 125-134
-
-
Zhang, L.1
Ahn, G.2
Chu, B.3
|