-
1
-
-
4143096907
-
Spatial role-based access control model for wireless networks
-
2003. VTC 2003-Fall. 6-9 Oct.
-
Hansen F., Oleshchuk V., "Spatial Role-Based Access Control Model for Wireless Networks", 2003 IEEE 58th Vehicular Technology Conference, 2003. VTC 2003-Fall. 6-9 Oct. 2003, Volume 3, Page(s):2093-2097
-
(2003)
2003 IEEE 58th Vehicular Technology Conference
, vol.3
, pp. 2093-2097
-
-
Hansen, F.1
Oleshchuk, V.2
-
3
-
-
17444406680
-
A generalized temporal role-based access control model
-
Joshi, J.B.D., Bertino, E., Latif, U. and Ghafoor, A. "A generalized temporal role-based access control model". IEEE Transactions on Knowledge and Data Engineering, 17 (1). 4-23, 2005
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.B.D.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
8
-
-
0030086382
-
Role-based access control models
-
IEEE Press
-
Sandhu, R., Coyne, E.J., Feinstein, H. L., Youman. C. E., "Role-based access control models". IEEE Computer 29(2), IEEE Press, 1996,p 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
9
-
-
84944792110
-
TRBAC: A temporal role-based access control model
-
Aug.
-
Bertino, E., Bonatti, P. A., Ferrari, E., "TRBAC: A temporal role-based access control model". ACM Transactions on Information & System Security, 4(3), Aug.2001, p.191-233.
-
(2001)
ACM Transactions on Information & System Security
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
10
-
-
0035791053
-
Securing context-aware applications using environment roles
-
ACM Press, Chantilly, Virginia, United States
-
Covington, M.J., Long, W., Srinivasan, S., Dev, A.K., Ahamad, M., Abowd, G.D., "Securing context-aware applications using environment roles", in Proceedings of the sixth ACM symposium on Access control models and technologies ACM Press, Chantilly, Virginia, United States 2001 10-20
-
(2001)
Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
, pp. 10-20
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dev, A.K.4
Ahamad, M.5
Abowd, G.D.6
-
11
-
-
4444246080
-
An integrated approach to engineer and enforce context constraints in RBAC environments
-
August
-
Strembeck, M., Neumann, G., "An integrated approach to engineer and enforce context constraints in RBAC environments", ACM Transactions on Information and System Security (TISSEC) Volume 7, Issue 3 (August 2004) Pages: 392-427
-
(2004)
ACM Transactions on Information and System Security (TISSEC)
, vol.7
, Issue.3
, pp. 392-427
-
-
Strembeck, M.1
Neumann, G.2
-
12
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
August
-
Ferraiolo, D. F., Sandhu, F., Gavrila, S., Kuhn D. R., Chandramouli, R., "Proposed NIST standard for role-based access Control", ACM Transactions on Information and System Security (TISSEC) Volume 4, Issue 3, August 2001.
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.3
-
-
Ferraiolo, D.F.1
Sandhu, F.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
13
-
-
0036649481
-
Spatio-temporal predicates
-
Erwig, M, Schneider, M., "Spatio-Temporal Predicates", IEEE Transactions on Knowledge and Data Engineering, 14 (4). 881-901, 2002
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, Issue.4
, pp. 881-901
-
-
Erwig, M.1
Schneider, M.2
-
14
-
-
18844418489
-
Context-based access control in ubiquitous environments
-
30 Aug.-1 Sept.
-
Corradi, A., Montanari, R., Tibaldi, D., "Context-based Access Control in Ubiquitous Environments", Proceedings. Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). 30 Aug.-1 Sept. 2004 Page(s):253-260
-
(2004)
Proceedings. Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004)
, pp. 253-260
-
-
Corradi, A.1
Montanari, R.2
Tibaldi, D.3
-
16
-
-
4143110148
-
Rote based access control in remote and ambient spaces
-
ACM Press, YorkTown Heights, New York, United States
-
Wedde, H. F., Lischka, M., "Rote Based Access Control in Remote and Ambient Spaces", in Proceedings of the ninth ACM symposium on Access control models and technologies ACM Press, YorkTown Heights, New York, United States 2004 21-30
-
(2004)
Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies
, pp. 21-30
-
-
Wedde, H.F.1
Lischka, M.2
-
17
-
-
0000924965
-
Spatial and temporal content-based access to hypervideo databases
-
Springer-Verlag, 1998
-
Jiang, H., Elmagarmid, A. K., "Spatial and temporal content-based access to hypervideo databases", The VLDB Journal (1998) 7: 226-238, Springer-Verlag, 1998
-
(1998)
The VLDB Journal
, vol.7
, pp. 226-238
-
-
Jiang, H.1
Elmagarmid, A.K.2
-
18
-
-
0032620331
-
Team-and-role-based organizational context and access control for cooperative hypermedia environments
-
(Darmstadt, Germany). ACM Press
-
Wang, W., "Team-and-Role-Based Organizational Context and Access Control for Cooperative Hypermedia Environments", Proceedings of Hypertext '99: Returning to our diverse roots (Darmstadt, Germany 1999). ACM Press, 37-46
-
(1999)
Proceedings of Hypertext '99: Returning to Our Diverse Roots
, pp. 37-46
-
-
Wang, W.1
-
19
-
-
14644442295
-
An authorization model for geospatial data
-
October-December
-
Atluri, V., Chun, S. A., "An Authorization Model for Geospatial Data", IEEE Transactions on Dependable and Secure Computing, Vol. 1, No. 4, October-December 2004
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.4
-
-
Atluri, V.1
Chun, S.A.2
-
20
-
-
0035790437
-
Realms and states: A framework for location aware mobile computing
-
Rome, Italy
-
Narayanan, A. K., "Realms and States: A Framework for Location Aware Mobile Computing", Proceedings of the 1st International Workshop on Mobile Commerce, Rome, Italy, Pages: 48-54, 2001
-
(2001)
Proceedings of the 1st International Workshop on Mobile Commerce
, pp. 48-54
-
-
Narayanan, A.K.1
-
21
-
-
15944413918
-
Context-sensitivity in role-based access control
-
Kumar, A., Karnik, N., Chafle, G., "Context-Sensitivity in Role-based Access Control", ACM SIGOPS Operating Systems Review, Volume 36, 3: 53-66, 2002
-
(2002)
ACM SIGOPS Operating Systems Review
, vol.36
, Issue.3
, pp. 53-66
-
-
Kumar, A.1
Karnik, N.2
Chafle, G.3
-
22
-
-
0031387996
-
Team-based Access Control (TMAC): A primitive for applying role-based access controls in collaborative environments
-
Fairfax, Virginia, United States
-
Thomas, R. K., "Team-based Access Control (TMAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments", Proceedings of the second ACM workshop on Role-based access control, Fairfax, Virginia, United States, Pages: 13-19, 1997
-
(1997)
Proceedings of the Second ACM Workshop on Role-based Access Control
, pp. 13-19
-
-
Thomas, R.K.1
-
24
-
-
11044223672
-
Access-control language for multidomain environments
-
Nov.-Dec.
-
Joshi, J.B.D., "Access-control language for multidomain environments", IEEE Internet Computing, Volume 8, Issue 6, Nov.-Dec. 2004 Page(s):40-50
-
(2004)
IEEE Internet Computing
, vol.8
, Issue.6
, pp. 40-50
-
-
Joshi, J.B.D.1
|