-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
M. Abadi, M. Burrows, and B. Lampson. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706-734, 1993.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
-
3
-
-
0033650839
-
Injecting RBAC to secure a web-based workflow system
-
Berlin, Germany, July 26-27. ACM
-
G.-J. Ahn, R. Sandhu, M. Kang, and J. Park. Injecting RBAC to secure a web-based workflow system. In Proceedings of 5th ACM Workshop on Role-Based Access Control, Berlin, Germany, July 26-27 2000. ACM.
-
(2000)
Proceedings of 5th ACM Workshop on Role-based Access Control
-
-
Ahn, G.-J.1
Sandhu, R.2
Kang, M.3
Park, J.4
-
5
-
-
0029700344
-
Decentralized trust management
-
Oakland, CA, May
-
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proceedings of IEEE Symposium on Security and Privac, pages 164-173, Oakland, CA, May 1996.
-
(1996)
Proceedings of IEEE Symposium on Security and Privac
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
6
-
-
0001470602
-
REFEREE: Trust management for web applications
-
September
-
Y. H. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, and M. Strauss. REFEREE: Trust management for web applications. Computer Networks and ISDN systems, 29(8-13), September 1997.
-
(1997)
Computer Networks and ISDN Systems
, vol.29
, Issue.8-13
-
-
Chu, Y.H.1
Feigenbaum, J.2
LaMacchia, B.3
Resnick, P.4
Strauss, M.5
-
7
-
-
4143058053
-
Using trust and risk in role-based access control policies
-
Yorktown, NY, June
-
N. Dimmock, A. Belokosztolszki, D. Eyers, J. Bacon, and K. Moody. Using trust and risk in role-based access control policies. InProceedings of 9th ACM Symposium on Access Control Models and Technologies, Yorktown, NY, June 2004.
-
(2004)
Proceedings of 9th ACM Symposium on Access Control Models and Technologies
-
-
Dimmock, N.1
Belokosztolszki, A.2
Eyers, D.3
Bacon, J.4
Moody, K.5
-
8
-
-
0003358457
-
SPKI certificate theory
-
September
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory. RFC 2693, September 1999.
-
(1999)
RFC
, vol.2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
9
-
-
0003686066
-
An internet attribute certificate profile for authorization
-
PKIX Working Group, June
-
S. Farrell and R. Housley. An internet attribute certificate profile for authorization. Technical report, PKIX Working Group, June 2001.
-
(2001)
Technical Report
-
-
Farrell, S.1
Housley, R.2
-
10
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
August
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control ACM Transactions on Information and System Security, 4(3), August 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
11
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
Oakland, CA, May
-
A. Herzberg, Y. Mass, J. Michaeli, D. Naor, and Y. Ravid. Access control meets public key infrastructure, or: assigning roles to strangers. In Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, May 2000.
-
(2000)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Herzberg, A.1
Mass, Y.2
Michaeli, J.3
Naor, D.4
Ravid, Y.5
-
15
-
-
0012077289
-
Attribute certification: An enabling technology for delegation and role-based controls in distributed environments
-
Fairfax, VA, October 28-29. ACM
-
J. Linn and M. Nystrom. Attribute certification: An enabling technology for delegation and role-based controls in distributed environments. In Proceedings of 4th ACM Workshop on Role-Based Access Control, Fairfax, VA, October 28-29 1999. ACM.
-
(1999)
Proceedings of 4th ACM Workshop on Role-based Access Control
-
-
Linn, J.1
Nystrom, M.2
-
18
-
-
34047204338
-
Rbac on the web using Idap
-
Ont., Canada, July
-
J. Park, G. Ahn, and R. Sandhu. Rbac on the web using Idap. In Proceedings of 15th Annual IFIP WG 11.3 Working Conference on Data and Application Security, Ont., Canada, July 2001.
-
(2001)
Proceedings of 15th Annual IFIP WG 11.3 Working Conference on Data and Application Security
-
-
Park, J.1
Ahn, G.2
Sandhu, R.3
-
20
-
-
0003614529
-
SDSI - A simple distributed security infrastructure
-
September
-
R. L. Rivest and B. Lampson. SDSI - a simple distributed security infrastructure. Technical report, September 1996.
-
(1996)
Technical Report
-
-
Rivest, R.L.1
Lampson, B.2
-
22
-
-
0030086382
-
Role-based access control models
-
February
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
23
-
-
0038663269
-
Role-based EAM using x.509 attribute certificate
-
Cambridge, UK, July 29-31
-
D. Shin, G.-J. Ahn, and S. Cho. Role-based EAM using x.509 attribute certificate. In Proceedings of Sixteenth Annual IFIP WG 11.3 Working conference on Data and Application Security, Cambridge, UK, July 29-31 2002.
-
(2002)
Proceedings of Sixteenth Annual IFIP WG 11.3 Working Conference on Data and Application Security
-
-
Shin, D.1
Ahn, G.-J.2
Cho, S.3
-
24
-
-
85084164318
-
Certificate-based access control for widely distributed resources
-
Washington, D.C., August 23-26
-
M. Thompson, W. Johnston, S. Mudumbai, G. Hoo, K. Jackson, and A. Essiari. Certificate-based access control for widely distributed resources. In Proceedings of 8th USENIX Security Symposium, Washington, D.C., August 23-26 1999.
-
(1999)
Proceedings of 8th USENIX Security Symposium
-
-
Thompson, M.1
Johnston, W.2
Mudumbai, S.3
Hoo, G.4
Jackson, K.5
Essiari, A.6
|