-
1
-
-
4544247567
-
Using web service technologies to create an information broker'
-
Turner, M., Zhu, F., Kotsiopoulos, I., Russell, M., Budgen, D., Bennett, K., Brereton, P., Keane, J., Layzell, P., and Rigby, M.: ' Using web service technologies to create an information broker' ', Proc. 26th Int. Conf. on Software Engineering (ICSE 2004), 2004, IEEE Computer Society Press, p. 552-561
-
(2004)
Proc. 26th Int. Conf. on Software Engineering (ICSE 2004)
, pp. 552-561
-
-
Turner, M.1
Zhu, F.2
Kotsiopoulos, I.3
Russell, M.4
Budgen, D.5
Bennett, K.6
Brereton, P.7
Keane, J.8
Layzell, P.9
Rigby, M.10
-
2
-
-
84949487550
-
Service-based software: The future for flexible software'
-
Bennett, K.H., Layzell, P.J., Budgen, D., Brereton, P., Macaulay, L., and Munro, M.: ' Service-based software: the future for flexible software' ', Proc. 7th Asia-Pacific Software Engineering Conf., 2000, IEEE Computer Society Press, p. 214-221
-
(2000)
Proc. 7th Asia-Pacific Software Engineering Conf.
, pp. 214-221
-
-
Bennett, K.H.1
Layzell, P.J.2
Budgen, D.3
Brereton, P.4
MacAulay, L.5
Munro, M.6
-
3
-
-
0001901698
-
The future of software
-
Brereton, O.P., Budgen, D., Bennett, K., Munro, M., Layzell, P., Macaulay, L., Griffiths, D., and Stannett, C.: ' The future of software ', Commun. ACM, 1999, 42, (12), p. 78-84
-
(1999)
Commun. ACM
, vol.42
, Issue.12
, pp. 78-84
-
-
Brereton, O.P.1
Budgen, D.2
Bennett, K.3
Munro, M.4
Layzell, P.5
MacAulay, L.6
Griffiths, D.7
Stannett, C.8
-
4
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
Focardi, R., Gorrieri, R., Foundations of security analysis and design
-
Samarati, P., and De Capitani di Vimercati, S.: ' Access control: policies, models, and mechanisms ', Focardi, R., Gorrieri, R., Foundations of security analysis and design, 2001), 2172, p. 137-196 Lecture Notes in Computer Science 2172
-
(2001)
Lecture Notes in Computer Science
, vol.2172
, pp. 137-196
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
5
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., and Chandramouli, R.: ' Proposed NIST standard for role-based access control ', ACM Trans. Inf. Syst. Secur., 2001, 4, (3), p. 224-274
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
6
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E., Feinstein, H., and Youman, C.: ' Role-based access control models ', Computer, 1996, 29, (2), p. 38-47
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
7
-
-
0012604970
-
Toward open, secure, widely distributed services
-
Bacon, J., and Moody, K.: ' Toward open, secure, widely distributed services ', Commun. ACM, 2002, 45, (6), p. 59-64
-
(2002)
Commun. ACM
, vol.45
, Issue.6
, pp. 59-64
-
-
Bacon, J.1
Moody, K.2
-
8
-
-
0242540373
-
The Tees confidentiality model: An authorisation model for identities and roles
-
Longstaff, J.J., Lockyer, M.A., and Nicholas, J.: ' The Tees confidentiality model: an authorisation model for identities and roles ', Proc. 8th ACM Symposium on Access Control Models and Technologies (SACMAT 2003), 2003, ACM Press, p. 125-133
-
(2003)
Proc. 8th ACM Symposium on Access Control Models and Technologies (SACMAT 2003)
, pp. 125-133
-
-
Longstaff, J.J.1
Lockyer, M.A.2
Nicholas, J.3
-
9
-
-
33644501401
-
Distributed communication methods and RBAC for use in health care applications
-
NISTIR 5820
-
'Distributed communication methods and RBAC for use in health care applications', NIST Internal Report, 5820 (NISTIR 5820), 1996 http://hissa.nist.gov/rbac/poole/ir5820/nistir5820.htm
-
(1996)
NIST Internal Report
, vol.5820
-
-
-
10
-
-
0031387996
-
Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments
-
Thomas, R.K.: ' Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments ', Proc. 2nd ACM Workshop on Role-Based Access Control, 1997, ACM Press, p. 13-19
-
(1997)
Proc. 2nd ACM Workshop on Role-Based Access Control
, pp. 13-19
-
-
Thomas, R.K.1
-
11
-
-
12244265258
-
The inference problem: A survey
-
Farkas, C., and Jajodia, S.: ' The inference problem: a survey ', ACM SIGKDD Explorations Newsletter, 2002, 4, (2), p. 6-12
-
(2002)
ACM SIGKDD Explorations Newsletter
, vol.4
, Issue.2
, pp. 6-12
-
-
Farkas, C.1
Jajodia, S.2
-
13
-
-
0035790754
-
Flexible team-based access control using contexts
-
Georgiadis, C., Mavridis, I., Pangalos, G., and Thomas, R.: ' Flexible team-based access control using contexts ', Proc. 6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001), 2001, ACM Press, p. 21-27
-
(2001)
Proc. 6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001)
, pp. 21-27
-
-
Georgiadis, C.1
Mavridis, I.2
Pangalos, G.3
Thomas, R.4
-
14
-
-
84865788031
-
A model of OASIS role-based access control and its support for active security
-
Bacon, J., Moody, K., and Yao, W.: ' A model of OASIS role-based access control and its support for active security ', ACM Trans. Inf. Syst. Secur., 2002, 5, (4), p. 492-540
-
(2002)
ACM Trans. Inf. Syst. Secur.
, vol.5
, Issue.4
, pp. 492-540
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
15
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer, J., and Schroeder, M.: ' The protection of information in computer systems ', Proc. IEEE, 1975, 63, (9), p. 1278-1308
-
(1975)
Proc. IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
16
-
-
4744374960
-
Dynamic data integration using web services
-
Zhu, F., Turner, M., Kotsiopoulos, I., Bennett, K., Russell, M., Budgen, D., Brereton, P., Keane, J., Layzell, P., Rigby, M., and Xu, J.: ' Dynamic data integration using web services ', Proc. IEEE Int. Conf. on Web Services (IC-WS 2004), 2004, IEEE Computer Society Press, p. 262-269
-
(2004)
Proc. IEEE Int. Conf. on Web Services (IC-WS 2004)
, pp. 262-269
-
-
Zhu, F.1
Turner, M.2
Kotsiopoulos, I.3
Bennett, K.4
Russell, M.5
Budgen, D.6
Brereton, P.7
Keane, J.8
Layzell, P.9
Rigby, M.10
Xu, J.11
-
17
-
-
0035119667
-
Access control model with provisional actions
-
Kudo, M., and Hada, S.: ' Access control model with provisional actions ', IEICE Trans. Fundam., 2001, E84-A, (1), p. 295-302
-
(2001)
IEICE Trans. Fundam.
, vol.E84-A
, Issue.1
, pp. 295-302
-
-
Kudo, M.1
Hada, S.2
-
18
-
-
1542373232
-
XML path language (XPath) 2.0
-
W3C Working Draft 12, W3C
-
'XML Path Language (XPath) 2.0', Technical report, W3C Working Draft 12, W3C, http://www.w3.org/TR/xpath20/
-
Technical Report
-
-
|