-
3
-
-
0035790651
-
A model of OASIS role-based access control and its support for active security
-
Yao, W., Moody, K., and Bacon, J.M.: ' A model of OASIS role-based access control and its support for active security ', Proc. Sixth ACM Symposium on Access Control Models and Technologies, 2001, p. 171-181
-
(2001)
Proc. Sixth ACM Symposium on Access Control Models and Technologies
, pp. 171-181
-
-
Yao, W.1
Moody, K.2
Bacon, J.M.3
-
4
-
-
84865788031
-
A model of OASIS role-based access control and its support for active security
-
Bacon, J., Moody, K., and Yao, W.: ' A model of OASIS role-based access control and its support for active security ', ACM Trans. Inf. Syst. Secur., 2002, 5, (4), p. 492-540
-
(2002)
ACM Trans. Inf. Syst. Secur.
, vol.5
, Issue.4
, pp. 492-540
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
5
-
-
0003400251
-
Secure computer systems: Unified exposition and multics interpretation
-
July MITRE Corp., Bedford, MA
-
'Secure computer systems: Unified exposition and multics interpretation', Technical report, MTR-2997, July, 1975 MITRE Corp., Bedford, MA
-
(1975)
Technical Report
, vol.MTR-2997
-
-
-
6
-
-
0003400255
-
Integrity considerations for secure computer systems
-
April MITRE Corp., Bedford, MA
-
'Integrity considerations for secure computer systems', Technical report, TR-3153, April, 1977 MITRE Corp., Bedford, MA
-
(1977)
Technical Report
, vol.TR-3153
-
-
-
7
-
-
0022012611
-
A comment on the "basic security theorem" of Bell and LaPadula
-
McLean, J.: ' A comment on the "basic security theorem" of Bell and LaPadula ', ' Inf. Process. Lett. ', 1985, 20, (2), p. 67-70
-
(1985)
Inf. Process. Lett.
, vol.20
, Issue.2
, pp. 67-70
-
-
McLean, J.1
-
8
-
-
0028513932
-
Access control: Principles and practice
-
Sandhu, R.S., and Samarati, P.: ' Access control: principles and practice ', IEEE Commun. Mag., 1994, 32, (9), p. 40-48
-
(1994)
IEEE Commun. Mag.
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.S.1
Samarati, P.2
-
10
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E., Feinstein, H.L., and Youman, C.E.: ' Role-based access control models ', Computer, 1996, 29, (2), p. 38-47
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.2
Feinstein, H.L.3
Youman, C.E.4
-
11
-
-
0001940210
-
The role graph model and confiict of interest
-
Nyanchama, M., and Osborn, S.L.: ' The role graph model and confiict of interest ', ACM Trans. Inf. Syst. Secur., 1999, 2, (1), p. 3-33
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1
, pp. 3-33
-
-
Nyanchama, M.1
Osborn, S.L.2
-
12
-
-
0242571490
-
Role-based security in database management systems
-
North-Holland Publishing Co., Amsterdam
-
Lochowsky, F.H., and Woo, C.C.: ' Role-based security in database management systems ', Landwehr, C.E., Database security: status prospects, (North-Holland Publishing Co., Amsterdam 1988), p. 209-222
-
(1988)
Database Security: Status Prospects
, pp. 209-222
-
-
Lochowsky, F.H.1
Woo, C.C.2
-
13
-
-
0033652039
-
The NIST model for role-based access control: Towards a unified standard
-
Sandhu, R.S., Ferraiolo, D., and Kuhn, R.: ' The NIST model for role-based access control: towards a unified standard ', Proc Fifth ACM Workshop on Role-Based Access Control, 2000, Berlin, Germany p. 47-63
-
(2000)
Proc Fifth ACM Workshop on Role-Based Access Control
, pp. 47-63
-
-
Sandhu, R.S.1
Ferraiolo, D.2
Kuhn, R.3
-
14
-
-
0030644642
-
Separation of duty in role-based environments
-
Simon, R.T., and Zurko, M.E.: ' Separation of duty in role-based environments ', PCSFW: Proc. Tenth Computer Security Foundations Workshop, 1997, IEEE Computer Society Press, Silver Spring, USA
-
(1997)
PCSFW: Proc. Tenth Computer Security Foundations Workshop
-
-
Simon, R.T.1
Zurko, M.E.2
-
16
-
-
0242625194
-
Role mining-revealing business roles for security administration using data mining technology
-
Kuhlmann, M., Schimpf, G., and Shohat, D.: ' Role mining-revealing business roles for security administration using data mining technology ', Proc. Eighth ACM Symposium on Access Control Models and Technologies, 2003, Como, Italy
-
(2003)
Proc. Eighth ACM Symposium on Access Control Models and Technologies
-
-
Kuhlmann, M.1
Schimpf, G.2
Shohat, D.3
-
17
-
-
0242709332
-
A scenario-driven role engineering process for functional RBAC roles
-
Neumann, G., and Strembeck, M.: ' A scenario-driven role engineering process for functional RBAC roles ', Proc. Seventh ACM Symposium on Access Control Models and Technologies, 2002, ACM Press, Monterey, USA p. 33-42
-
(2002)
Proc. Seventh ACM Symposium on Access Control Models and Technologies
, pp. 33-42
-
-
Neumann, G.1
Strembeck, M.2
-
18
-
-
0242709337
-
Observations on the role life-cycle in the context of enterprise security management
-
Kern, A., Kuhlmann, M., Schaad, A., and Moffett, J.D.: ' Observations on the role life-cycle in the context of enterprise security management ', Proc. Seventh ACM Symposium on Access Control Models and Technologies, 2002, ACM Press, Monterey, USA p. 43-51
-
(2002)
Proc. Seventh ACM Symposium on Access Control Models and Technologies
, pp. 43-51
-
-
Kern, A.1
Kuhlmann, M.2
Schaad, A.3
Moffett, J.D.4
-
19
-
-
0035790675
-
The role-based access control system of a European bank: A case study and discussion
-
Schaad, A., Moffett, J.D., and Jacob, J.: ' The role-based access control system of a European bank: a case study and discussion ', Proc. Sixth ACM Symposium on Access Control Models and Technologies, 2002, ACM Press, Monterey, USA p. 3-9
-
(2002)
Proc. Sixth ACM Symposium on Access Control Models and Technologies
, pp. 3-9
-
-
Schaad, A.1
Moffett, J.D.2
Jacob, J.3
-
20
-
-
84944039217
-
Translating role-based access control policy within context
-
Bacon, J.M., Lloyd, M., and Moody, K.:: ' Translating role-based access control policy within context ', Lect. Notes Comput. Sci., 2001, 1995, p. 107-119
-
(2001)
Lect. Notes Comput. Sci.
, vol.1995
, pp. 107-119
-
-
Bacon, J.M.1
Lloyd, M.2
Moody, K.3
-
22
-
-
4944223328
-
Cassandra: Flexible trust management, applied to electronic health records
-
June
-
Becker, M.Y., and Sewell, P.: ' Cassandra: flexible trust management, applied to electronic health records ', Proc. Seventeenth IEEE Computer Security Foundations Workshop, June 2004, Pacific Grove, USA
-
(2004)
Proc. Seventeenth IEEE Computer Security Foundations Workshop
-
-
Becker, M.Y.1
Sewell, P.2
-
23
-
-
84944048132
-
The Ponder policy specification language
-
Damianou, N.C., Dulay, N., Lupu, E.C., and Sloman, M.S.:: ' The Ponder policy specification language ', Lect Notes Comput. Sci., 2001, 1995, p. 18-38
-
(2001)
Lect Notes Comput. Sci.
, vol.1995
, pp. 18-38
-
-
Damianou, N.C.1
Dulay, N.2
Lupu, E.C.3
Sloman, M.S.4
-
24
-
-
1542388763
-
Rei: A policy language for the me-centric project
-
4, October Hewlett Packard Laboratories
-
'Rei: a policy language for the me-centric project', Technical report HPL-2002-270, 4, October, 2002 Hewlett Packard Laboratories
-
(2002)
Technical Report
, vol.HPL-2002-270
-
-
-
25
-
-
0242540373
-
The Tees Confidentiality Model: An authorization model for identities and roles
-
Longstaff, J.J., Lockyer, M.A., and Nicholas, J.: ' The Tees Confidentiality Model: an authorization model for identities and roles ', Proc. Eighth ACM Symposium on Access Control Models and Technologies, 2003, Como, Italy
-
(2003)
Proc. Eighth ACM Symposium on Access Control Models and Technologies
-
-
Longstaff, J.J.1
Lockyer, M.A.2
Nicholas, J.3
-
26
-
-
33644551792
-
Authorisation models for complex computing applications
-
Oct.
-
Longstaff, J.J., Lockyer, M.A., and Nicholas, J.: ' Authorisation models for complex computing applications ', Proc. Information Security Solutions Europe Conf., Oct. 7-9 2003, Vienna, Austria
-
(2003)
Proc. Information Security Solutions Europe Conf.
-
-
Longstaff, J.J.1
Lockyer, M.A.2
Nicholas, J.3
-
27
-
-
0033646048
-
A model of accountability, confidentiality and override for healthcare and other applications
-
Longstaff, J.J., Lockyer, M.A., Capper, G., and Thick, M.G.: ' A model of accountability, confidentiality and override for healthcare and other applications ', Proc. Fifth ACM Workshop on Role-Based Access Control (RBAC '00), 2000, Berlin, Germany p. 71-76
-
(2000)
Proc. Fifth ACM Workshop on Role-Based Access Control (RBAC '00)
, pp. 71-76
-
-
Longstaff, J.J.1
Lockyer, M.A.2
Capper, G.3
Thick, M.G.4
-
28
-
-
0002817535
-
The PERMIS X.509 role based privilege management infrastructure
-
Chadwick, D.W., and Otenko, A.: ' The PERMIS X.509 role based privilege management infrastructure ', Proc. Seventh ACM Symposium on Access Control Models and Technologies, 2002, ACM Press, Monterey, USA p. 135-140
-
(2002)
Proc. Seventh ACM Symposium on Access Control Models and Technologies
, pp. 135-140
-
-
Chadwick, D.W.1
Otenko, A.2
-
31
-
-
84902515152
-
Persistent versus dynamic role membership
-
August
-
Bacon, J.M., Moody, K., Chadwick, D.W., and Otenko, A.: ' Persistent versus dynamic role membership ', Seventeenth IFIP WG3 Annual Working Conf. on Data and Application Security, August 2003, IFIP, Estes Park, CO, USA p. 344-357
-
(2003)
Seventeenth IFIP WG3 Annual Working Conf. on Data and Application Security
, pp. 344-357
-
-
Bacon, J.M.1
Moody, K.2
Chadwick, D.W.3
Otenko, A.4
-
32
-
-
33644531830
-
-
Grimson, W., Berry, D., Grimson, J., Stephens, G., Felton, E., Given, P., and O'Moore, R.: ' Technical description: Federated healthcare record server - the Synapses paradigm ', 1996), http://www.cs.tcd.ie/synapses/public/html/ technicaldescription.html
-
(1996)
Technical Description: Federated Healthcare Record Server - The Synapses Paradigm
-
-
Grimson, W.1
Berry, D.2
Grimson, J.3
Stephens, G.4
Felton, E.5
Given, P.6
O'Moore, R.7
-
33
-
-
0031336278
-
PCASSO: Applying and extending state-of-the-art security in the healthcare domain
-
Baker, D.B., Barnhart, R.M., and Buss, T.T.: ' PCASSO: applying and extending state-of-the-art security in the healthcare domain ', Proc. Thirteenth Annual Computer Security Applications Conf., 1997, IEEE Computer Society, Silver Spring, USA p. 251
-
(1997)
Proc. Thirteenth Annual Computer Security Applications Conf.
, pp. 251
-
-
Baker, D.B.1
Barnhart, R.M.2
Buss, T.T.3
-
34
-
-
84957006898
-
Access control and trust in the use of widely distributed services
-
Bacon, J.M., Moody, K., and Yao, W.: ' Access control and trust in the use of widely distributed services ', Lect Notes Comput. Sci., 2001, 2218, p. 295-310
-
(2001)
Lect Notes Comput. Sci.
, vol.2218
, pp. 295-310
-
-
Bacon, J.M.1
Moody, K.2
Yao, W.3
-
35
-
-
84944075856
-
-
Hine, J.H., Yao, W., Bacon, J.M., and Moody, K.:: ' An architecture for distributed OASIS services ', 2000, 1795, p. 104-120
-
(2000)
An Architecture for Distributed OASIS Services
, vol.1795
, pp. 104-120
-
-
Hine, J.H.1
Yao, W.2
Bacon, J.M.3
Moody, K.4
|