-
1
-
-
84893074859
-
A system to specify and manage multipolicy access control models
-
Bertino, E., Catania, B., Ferrari, E., Perlasca, P., 2002. A System to Specify and Manage Multipolicy Access Control Models. Policies for Distributed Systems and Networks, p.116-127.
-
(2002)
Policies for Distributed Systems and Networks
, pp. 116-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
2
-
-
0037319591
-
On the establishment of an access VPN in broadband access networks
-
Cohen, R., 2003. On the establishment of an access VPN in broadband access networks. Communications Magazine, IEEE, 41(2):156-163.
-
(2003)
Communications Magazine, IEEE
, vol.41
, Issue.2
, pp. 156-163
-
-
Cohen, R.1
-
4
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
doi: 10.1145/501978.501980
-
Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D., Chandramouli, R., 2001. Proposed NIST standard for role-based access control. ACM Trans. Inform. and System Security, 4(3):224-274. [doi: 10.1145/501978.501980]
-
(2001)
ACM Trans. Inform. and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
5
-
-
1642588201
-
A policy-based network management system for IP VPN
-
Guo, X., Yang, K., Galis, A., Cheng, X., Yang B., Liu, D., 2003. A Policy-based Network Management System for IP VPN. Communication Technology Proceedings. ICCT 2003, 2:1630-1633.
-
(2003)
Communication Technology Proceedings. ICCT 2003
, vol.2
, pp. 1630-1633
-
-
Guo, X.1
Yang, K.2
Galis, A.3
Cheng, X.4
Yang, B.5
Liu, D.6
-
8
-
-
84893109932
-
Web-based policy deployment management system
-
Ku, H., Son, H.G., Facsko, J., Tyrrell, J., Haines, A., 2002. Web-based Policy Deployment Management System. Proceedings of Policies for Distributed Systems and Networks, p.240-243.
-
(2002)
Proceedings of Policies for Distributed Systems and Networks
, pp. 240-243
-
-
Ku, H.1
Son, H.G.2
Facsko, J.3
Tyrrell, J.4
Haines, A.5
-
9
-
-
0026139216
-
Content-dependent access control
-
doi: 10.1145/122120.122125
-
Moffett, M.D., Sloman, M.S., 1991. Content-dependent access control. ACM SIGOPS Operating Systems Review, 25(2):63-70. [doi: 10.1145/122120.122125]
-
(1991)
ACM SIGOPS Operating Systems Review
, vol.25
, Issue.2
, pp. 63-70
-
-
Moffett, M.D.1
Sloman, M.S.2
-
10
-
-
0142071646
-
Integrated access control and intrusion detection for Web servers
-
doi: 10.1109/TPDS.2003.1233707
-
Ryutov, T., Neuman, C., Dongho, K., 2003. Integrated access control and intrusion detection for Web servers. IEEE Trans. on Parallel and Distributed Systems, 14(9): 841-850. [doi: 10.1109/TPDS.2003.1233707]
-
(2003)
IEEE Trans. on Parallel and Distributed Systems
, vol.14
, Issue.9
, pp. 841-850
-
-
Ryutov, T.1
Neuman, C.2
Dongho, K.3
-
11
-
-
1642609327
-
Security policy specification language
-
Sanchez, L., Condell, M., 2002. Security Policy Specification Language. Internet Draft, http://www.csie.nctu.edu.tw/-jkzao/Publication/draft -ietf-ipsec-spsl-01.pdf.
-
(2002)
-
-
Sanchez, L.1
Condell, M.2
-
12
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H., Youman, C., 1996. Role-based access control models. IEEE Computer, 29(2):38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.3
Youman, C.4
-
13
-
-
85084160641
-
The flask security architecture: System support for diverse security policies
-
Spencer, R., Smalley, S., Loscocco, P., Hibler, M., Andersen, D., Lepreau, J., 1999. The Flask Security Architecture: System Support for Diverse Security Policies. Proceedings of the Eighth Security Symposium, p.123-139.
-
(1999)
Proceedings of the Eighth Security Symposium
, pp. 123-139
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Hibler, M.4
Andersen, D.5
Lepreau, J.6
-
14
-
-
25844454801
-
Extending role-based access control model with states
-
Steinmuller, B., Safarik, J., 2001. Extending Role-based Access Control Model with States. EUROCON'2001, International Conference on Trends in Communications, 2:398-399.
-
(2001)
EUROCON'2001, International Conference on Trends in Communications
, vol.2
, pp. 398-399
-
-
Steinmuller, B.1
Safarik, J.2
-
15
-
-
84890798816
-
Simultaneous enforcement of the Bell-LaPadula and the Biba security policy models in an osi-distributed system
-
Singapore
-
Verschuren, J., Govaerts, R., Vandewalle, J., 1992. Simultaneous Enforcement of the Bell-LaPadula and the Biba Security Policy Models in an OSI-distributed System. ICCS/ISITA'92, Singapore, p.257-263.
-
(1992)
ICCS/ISITA'92
, pp. 257-263
-
-
Verschuren, J.1
Govaerts, R.2
Vandewalle, J.3
-
16
-
-
84886891220
-
Policy-based network management
-
ICCT 2000
-
Wang, C., 2000. Policy-based Network Management. Communication Technology Proceedings. ICCT 2000, 1:101-105.
-
(2000)
Communication Technology Proceedings
, vol.1
, pp. 101-105
-
-
Wang, C.1
-
17
-
-
33645646528
-
A model for content-dependent access control for web-based services with role-based approach
-
Wolf, R., Keinz, T., Schneider, M., 2003. A Model for Content-dependent Access Control for Web-based Services with Role-based Approach. Database and Expert Systems Applications, Proceedings 14th International Workshop, p.209-214.
-
(2003)
Database and Expert Systems Applications, Proceedings 14th International Workshop
, pp. 209-214
-
-
Wolf, R.1
Keinz, T.2
Schneider, M.3
-
18
-
-
84942767213
-
Applying the semantic web layers to access control
-
Yague, M.I., Mana, A., Lopez, J., Troya, J.M., 2003. Applying the Semantic Web Layers to Access Control. Proceedings of Database and Expert Systems Applications, p. 622-626.
-
(2003)
Proceedings of Database and Expert Systems Applications
, pp. 622-626
-
-
Yague, M.I.1
Mana, A.2
Lopez, J.3
Troya, J.M.4
|