-
3
-
-
0035791550
-
On specifying security policies forWeb documents with an XML-based language
-
Chantilly, VA. ACM Press, New York
-
Bertino E, Castano S, Ferrari E (2001) On specifying security policies forWeb documents with an XML-based language. In: Proc. 6th ACM symposium on access control models and technologies (SACMAT'01), Chantilly, VA. ACM Press, New York, pp 57-65
-
(2001)
Proc. 6th ACM Symposium On Access Control Models and Technologies (SACMAT'01)
, pp. 57-65
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
-
4
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino E, Ferrari E, Atluri V (2002) The specification and enforcement of authorization constraints in workflow management systems. ACM Trans Inf Syst Secur 2:65-104
-
(2002)
ACM Trans Inf Syst Secur
, vol.2
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
6
-
-
84893077785
-
Obligation monitoring in policy management
-
Monterey, CA. IEEE Press, Los Alamitos, CA
-
Bettini C, Jajodia S, Wang XS, Wijesekera D (2002) Obligation monitoring in policy management. In: Proc. 3rd international workshop on policies for distributed systems and networks (POLICY'02), Monterey, CA. IEEE Press, Los Alamitos, CA, pp 2-12
-
(2002)
Proc. 3rd International Workshop On Policies For Distributed Systems and Networks (POLICY'02)
, pp. 2-12
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
7
-
-
1142309815
-
Provisions and obligations in policy management and security applications
-
Hong Kong. Morgan Kaufmann, San Francisco
-
Bettini C, Jajodia S, Wang XS, Wijesekera D (2002) Provisions and obligations in policy management and security applications. In: Proc. 28th conference on very large data bases (VLDB'02), Hong Kong. Morgan Kaufmann, San Francisco, pp 502-513
-
(2002)
Proc. 28th Conference On Very Large Data Bases (VLDB'02)
, pp. 502-513
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
9
-
-
0029700344
-
Decentralized trust management
-
Oakland, CA. IEEE Press, Los Alamitos, CA
-
Blaze M, Feigenbaum J, Lacy J (1996) Decentralized trust management. In: Proc. IEEE symposium on security and privacy, Oakland, CA. IEEE Press, Los Alamitos, CA, pp 164-173
-
(1996)
Proc. IEEE Symposium On Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
10
-
-
0036311802
-
A unified framework for regulating access and information release on the Web
-
Bonatti P, Samarati P (2002) A unified framework for regulating access and information release on the Web. J Comput Secur 10:241-272
-
(2002)
J Comput Secur
, vol.10
, pp. 241-272
-
-
Bonatti, P.1
Samarati, P.2
-
15
-
-
0036328418
-
Unraveling the Web services web: An introduction to SOAP, WSDL, and UDDI
-
Curbera F, Duftler M, Khalaf R, Nagy W, Mukhi N, Weerawarana S (2002) Unraveling the Web services web: an introduction to SOAP, WSDL, and UDDI. IEEE Internet Comput 6:86-93
-
(2002)
IEEE Internet Comput
, vol.6
, pp. 86-93
-
-
Curbera, F.1
Duftler, M.2
Khalaf, R.3
Nagy, W.4
Mukhi, N.5
Weerawarana, S.6
-
16
-
-
3042585572
-
The next step in Web services
-
Curbera F, Khalaf R, Mukhi N, Tai S, Weerawarana S (2003) The next step in Web services. Commun ACM 46:29-34
-
(2003)
Commun ACM
, vol.46
, pp. 29-34
-
-
Curbera, F.1
Khalaf, R.2
Mukhi, N.3
Tai, S.4
Weerawarana, S.5
-
17
-
-
0003358457
-
SPKI certificate theory
-
Ellison C, Frantz B, Lampson B, Rivest R, Thomas B, Ylonen T (1999) SPKI certificate theory. Internet Eng. Task Force RFC 2693. www.rfc-editor.org/rfc/rfc2693.txt
-
(1999)
Internet Eng. Task Force RFC 2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
18
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed NIST standard for role-based access control. ACM Trans Inf Syst Secur 4:224-274
-
(2001)
ACM Trans Inf Syst Secur
, vol.4
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
19
-
-
0042794768
-
-
W3C Note
-
Ford W, Hallam-Baker P, Fox B, Dillaway B, LaMacchia B, Epstein J, Lapp J (2001) XML Key Management Specification (XKMS). W3C Note. www.w3.org/TR/xkms
-
(2001)
XML Key Management Specification (XKMS)
-
-
Ford, W.1
Hallam-Baker, P.2
Fox, B.3
Dillaway, B.4
Lamacchia, B.5
Epstein, J.6
Lapp, J.7
-
22
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
Berkeley, CA. IEEE Press, Los Alamitos, CA
-
Herzberg A, Mass Y, Mihaeli J, Naor D, Ravid Y (2000) Access control meets public key infrastructure, or: assigning roles to strangers. In: Proc. IEEE symposium on security and privacy, Berkeley, CA. IEEE Press, Los Alamitos, CA, pp 2-14
-
(2000)
Proc. IEEE Symposium On Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
Naor, D.4
Ravid, Y.5
-
25
-
-
62349090353
-
RT: A Role-based trust-management framework
-
Washington, DC. IEEE Press, Los Alamitos, CA
-
Li N, Mitchell JC (2003) RT: A Role-based trust-management framework. In: Proc. 3rd DARPA conference and exposition on information survivability (DISCEX'03), Washington, DC. IEEE Press, Los Alamitos, CA, 1:201-212
-
(2003)
Proc. 3rd DARPA Conference and Exposition On Information Survivability (DISCEX'03)
, vol.1
, pp. 201-212
-
-
Li, N.1
Mitchell, J.C.2
-
26
-
-
84948440714
-
Design of a rolebased trust-management framework
-
Berkeley, CA. IEEE Press, Los Alamitos, CA
-
Li N, Mitchell JC, Winsborough WH (2002) Design of a rolebased trust-management framework. In: Proc. IEEE symposium on security and privacy, Berkeley, CA. IEEE Press, Los Alamitos, CA, pp 104-120
-
(2002)
Proc. IEEE Symposium On Security and Privacy
, pp. 104-120
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
27
-
-
33646201881
-
Database schema evolution using EVER diagrams
-
Bari, Italy. ACM Press, New York
-
Liu CT, Chang SK, Chrysanthis PK (1994) Database schema evolution using EVER diagrams. In: Proc. ACM workshop on advanced visual interfaces (AVI'94), Bari, Italy. ACM Press, New York, pp 123-132
-
(1994)
Proc. ACM Workshop On Advanced Visual Interfaces (AVI'94)
, pp. 123-132
-
-
Liu, C.T.1
Chang, S.K.2
Chrysanthis, P.K.3
-
29
-
-
33646198826
-
Sky-Query: A Web service approach to federate databases
-
Asilomar, CA
-
Malik T, Szalay AS, Budawari T, Thakar AR (2003) Sky-Query: a Web service approach to federate databases. In: Proc. conference on innovative data systems research (CIDR'03), Asilomar, CA. www-db.cs.wisc.edu/cidr/program/p17.pdf
-
(2003)
Proc. Conference On Innovative Data Systems Research (CIDR'03)
-
-
Malik, T.1
Szalay, A.S.2
Budawari, T.3
Thakar, A.R.4
-
31
-
-
35248864500
-
Concurrent and real-time update of access control policies
-
Prague, Czech Republic. Lecture notes in computer science, Springer, Berlin Heidelberg New York
-
Ray I, Xin T (2003) Concurrent and real-time update of access control policies. In: Proc. 14th international on workshop database and expert systems applications (DEXA'03), Prague, Czech Republic. Lecture notes in computer science, vol 2736. Springer, Berlin Heidelberg New York, pp 330-339
-
(2003)
Proc. 14th International On Workshop Database and Expert Systems Applications (DEXA'03)
, vol.2736
, pp. 330-339
-
-
Ray, I.1
Xin, T.2
-
32
-
-
1142273446
-
PFIRES: A policy framework for information security
-
Rees J, Bandyopadhyay S, Spafford EH (2003) PFIRES: A policy framework for information security. Commun ACM 46:101-106
-
(2003)
Commun ACM
, vol.46
, pp. 101-106
-
-
Rees, J.1
Bandyopadhyay, S.2
Spafford, E.H.3
-
33
-
-
0028513932
-
Access control: Principles and practice
-
Sandhu RS, Samarati P (1994) Access control: principles and practice. IEEE Commun Mag 32:40-48
-
(1994)
IEEE Commun Mag
, vol.32
, pp. 40-48
-
-
Sandhu, R.S.1
Samarati, P.2
-
34
-
-
85056545124
-
Limiting the disclosure of sensitive access control policies during automated trust negotiation
-
San Diego, ISOC, Reston, VA
-
Seamons KE, Winslett M, Yu T (2001) Limiting the disclosure of sensitive access control policies during automated trust negotiation. In: Proc. symposium on network and distributed systems security (NDSS'01), San Diego, ISOC, Reston, VA
-
(2001)
Proc. Symposium On Network and Distributed Systems Security (NDSS'01)
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
-
38
-
-
84867569718
-
-
UDDI.org, Discovery, And Integration
-
UDDI.org (2003) Universal Description, Discovery, And Integration. www.uddi.org
-
(2003)
Universal Description
-
-
-
39
-
-
10444249814
-
-
VeriSign, (current April 2003)
-
VeriSign (2003) Trust Services Integration Kit (TSIK). (www.xmltrustcenter.org/developer/verisign/tsik) (current April 2003)
-
(2003)
Trust Services Integration Kit (TSIK)
-
-
-
41
-
-
0036871183
-
Negotiating trust on the Web
-
Winslett M, Yu T, Seamons KE, Hess A, Jacobson J, Jarvis R, Smith B, Yu L (2002) Negotiating trust on the Web. IEEE Internet Comput 6:30-37
-
(2002)
IEEE Internet Comput
, vol.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
42
-
-
0038148412
-
A unified scheme for resource protection in automated trust negotiation
-
Berkeley, CA. IEEE Press, Los Alamitos, CA
-
Yu T, Winslett M (2003) A unified scheme for resource protection in automated trust negotiation. In: Proc. IEEE symposium on security and privacy, Berkeley, CA. IEEE Press, Los Alamitos, CA, pp 110-122
-
(2003)
Proc. IEEE Symposium On Security and Privacy
, pp. 110-122
-
-
Yu, T.1
Winslett, M.2
-
43
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
Yu T, Winslett M, Seamons KE (2003) Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans Inf Syst Secur 6:1-42
-
(2003)
ACM Trans Inf Syst Secur
, vol.6
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|