-
1
-
-
0008724838
-
An authorization model for temporal and derived data: Securing information portals
-
Vijayalakshmi Atluri and Avigdor Gal. An authorization model for temporal and derived data: securing information portals. ACM Trans. Inf. Syst. Secur., 5(1):62-94, 2002.
-
(2002)
ACM Trans. Inf. Syst. Secur.
, vol.5
, Issue.1
, pp. 62-94
-
-
Atluri, V.1
Gal, A.2
-
2
-
-
84865788031
-
A model of OASIS role-based access control and its support for active security
-
Jean Bacon, Ken Moody, and Walt Yao. A model of OASIS role-based access control and its support for active security. ACM Trans. Inf. Syst. Secur., 5(4):492-540, 2002.
-
(2002)
ACM Trans. Inf. Syst. Secur.
, vol.5
, Issue.4
, pp. 492-540
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
5
-
-
0038062314
-
Complexity and expressive power of logic programming
-
Evgeny Dantsin, Thomas Eiter, Georg Gottlob, and Andrei Voronkov. Complexity and expressive power of logic programming. ACM Comput. Surv., 33(3):374-425, 2001.
-
(2001)
ACM Comput. Surv.
, vol.33
, Issue.3
, pp. 374-425
-
-
Dantsin, E.1
Eiter, T.2
Gottlob, G.3
Voronkov, A.4
-
6
-
-
0018008817
-
On an authorization mechanism
-
Ronald Fagin. On an authorization mechanism. ACM Trans. Database Syst., 3(3):310-319, 1978.
-
(1978)
ACM Trans. Database Syst.
, vol.3
, Issue.3
, pp. 310-319
-
-
Fagin, R.1
-
8
-
-
84976657250
-
An authorization mechanism for a relational database system
-
Patricia P. Griffiths and Bradford W. Wade. An authorization mechanism for a relational database system. ACM Transactions on Database Systems (TODS), 1(3):242-255, 1976.
-
(1976)
ACM Transactions on Database Systems (TODS)
, vol.1
, Issue.3
, pp. 242-255
-
-
Griffiths, P.P.1
Wade, B.W.2
-
9
-
-
0034829103
-
Revocations - A classification
-
IEEE Computer Society
-
Asa Hagstrom, Sushil Jajodia, Francesco Parisi-Presicce, and Duminda Wijesekera. Revocations - a classification. In CSFW '01: Proceedings of the 14th IEEE Workshop on Computer Security Foundations, page 44. IEEE Computer Society, 2001.
-
(2001)
CSFW '01: Proceedings of the 14th IEEE Workshop on Computer Security Foundations
, pp. 44
-
-
Hagstrom, A.1
Jajodia, S.2
Parisi-Presicce, F.3
Wijesekera, D.4
-
11
-
-
84947436665
-
Resolving conflicts in authorization delegations
-
7th Australian Conference on Information Security and Privacy, Springer
-
Chun Ruan and Vijay Varadharajan. Resolving conflicts in authorization delegations. In 7th Australian Conference on Information Security and Privacy, volume 2384 of Lecture Notes in Computer Science, pages 271-285. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2384
, pp. 271-285
-
-
Ruan, C.1
Varadharajan, V.2
-
12
-
-
0030086382
-
Role-based access control models
-
R Sandhu, E. Coyne, H. Feinstem, and C. Yournan. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstem, H.3
Yournan, C.4
-
16
-
-
35248894984
-
Fidelis: A policy-driven trust management framework
-
Trust Management. First International Conference, iTrust, Springer
-
Walt Yao. Fidelis: A policy-driven trust management framework. In Trust Management. First International Conference, iTrust, volume 2692 of Lecture Notes in Computer Science, pages 301-317. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2692
, pp. 301-317
-
-
Yao, W.1
-
17
-
-
3042684910
-
A rule-based framework for role-based delegation and revocation
-
Longlma Zhang. Gail-Joon Ahn. and Bei-Tseng Chu. A rule-based framework for role-based delegation and revocation. ACM Trans. Inf. Syst. Secur., 6(3):404-441, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.3
, pp. 404-441
-
-
Zhang, L.1
Ahn, G.-J.2
Chu, B.-T.3
|