-
1
-
-
30644477677
-
Supporting conditional delegation in secure workflow management systems
-
[Atl05], Sweden, Jun 1-3
-
[Atl05] V. Atluri, J. Warner, Supporting Conditional Delegation in Secure Workflow Management Systems, ACM Symposium on Access Control Models and Technologies, Sweden, Jun 1-3, 2005.
-
(2005)
ACM Symposium on Access Control Models and Technologies
-
-
Atluri, V.1
Warner, J.2
-
4
-
-
0000985630
-
An examination of federal and commercial access control policy needs
-
[Fer93], Baltimore, MD, September 20-23
-
[Fer93] D. F. Ferraiolo, D. M. Gilbert, and N Lynch. An Examination of Federal and Commercial Access Control Policy Needs. In Proceedings of NISTNCSC National Computer Security Conference, pages 107-116, Baltimore, MD, September 20-23 1993.
-
(1993)
Proceedings of NISTNCSC National Computer Security Conference
, pp. 107-116
-
-
Ferraiolo, D.F.1
Gilbert, D.M.2
Lynch, N.3
-
5
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
[Fer01], August
-
[Fer01] D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. Richard Kuhn, R. Chandramouli. Proposed NIST Standard for Role-based Access Control. ACM Transactions on Information and System Security (TISSEC) Volume 4, Issue 3, August 2001.
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.3
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Richard Kuhn, D.4
Chandramouli, R.5
-
9
-
-
0035251598
-
Digital government security infrastructure design challenges
-
[Jos01a], February
-
[Jos01a] J. B. D. Joshi, A. Ghafoor, W. Aref, E. H. Spafford. Digital Government Security Infrastructure Design Challenges. IEEE Computer, Vol. 34, No. 2, February 2001, pages 66-72.
-
(2001)
IEEE Computer
, vol.34
, Issue.2
, pp. 66-72
-
-
Joshi, J.B.D.1
Ghafoor, A.2
Aref, W.3
Spafford, E.H.4
-
10
-
-
0000206310
-
Security models for web-based applications
-
[Jos01b] (Feb.)
-
[Jos01b] J. B. D. Joshi, W. G. Aref, A. Ghafoor and E. H. Spafford. Security models for web-based applications. Communications of the ACM, 44, 2 (Feb. 2001), pages 38-72.
-
(2001)
Communications of the ACM
, vol.44
, Issue.2
, pp. 38-72
-
-
Joshi, J.B.D.1
Aref, W.G.2
Ghafoor, A.3
Spafford, E.H.4
-
13
-
-
17444406680
-
Generalized temporal role based access control model
-
[Jos05], Jan
-
[Jos05] J. B. D. Joshi, E. Bertino, U. Latif, A. Ghafoor. Generalized Temporal Role Based Access Control Model. IEEE Transactions on Knowledge and Data Engineering, Vol 17, No. 1 pages 4-23, Jan, 2005.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.B.D.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
17
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
[Osb00], May
-
[Osb00] S. Osborn, R. Sandhu, Q. Munawer. Configuring Role-based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Transactions on Information and System Security, 3(2):85-106, May 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
18
-
-
0030086382
-
Role-based access control models
-
[San96a], IEEE Press
-
[San96a] R. Sandhu, E. J. Coyne, H. L. Feinstein, C. E. Youman. Role-Based Access Control Models. IEEE Computer 29(2): 38-47, IEEE Press, 1996
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
19
-
-
50249183308
-
Role hierarchies and constraints for lattice-based access controls
-
[San96b] E. Bertino, H. Kurth, G. Martella, and E. Montolivo Eds., LNCS N. 1146, Rome, Italy
-
[San96b] R. Sandhu. Role Hierarchies and Constraints for Lattice-based Access Controls. In E. Bertino, H. Kurth, G. Martella, and E. Montolivo Eds., Computer Security - Esorics'96, LNCS N. 1146, Rome, Italy, 1996, pages 65-79.
-
(1996)
Computer Security - Esorics'96
, pp. 65-79
-
-
Sandhu, R.1
-
21
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
[San99], February
-
[San99] R. Sandhu, V. Bhamidipati and Q. Munawer, The ARBAC97 Model for Role-Based Administration of Roles, ACM Transactions on Information and System Security, Volume 2, Number 1, February, 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
22
-
-
28244460211
-
Secure interoperation in a multi-domain environment employing RBAC policies
-
[Sha04], Submitted to
-
[Sha04] B. Shafiq, J. B. D. Joshi, E. Bertino, A. Ghafoor, Secure Interoperation in a Multi-Domain Environment Employing RBAC Policies, Submitted to IEEE Transactions on Knowledge and Data Engineering (2004).
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
-
-
Shafiq, B.1
Joshi, J.B.D.2
Bertino, E.3
Ghafoor, A.4
-
24
-
-
0031387996
-
Team Based Access Control (TBAC): A primitive for applying role-based access controls in collaborative environments
-
[Tho97], Nov
-
[Tho97] R. K. Thomas. Team Based Access Control (TBAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments. ACM Proceedings of the second ACM workshop on Role-based access control Fairfax., Nov, 1997.
-
(1997)
ACM Proceedings of the Second ACM Workshop on Role-based Access Control Fairfax
-
-
Thomas, R.K.1
-
25
-
-
30644480988
-
A fine-grained, controllable, user-to-user delegation method in RBAC
-
[Wai05], Sweden, Jun 1-3
-
[Wai05] J. Wainer, A. Kumar, A Fine-grained, Controllable, User-to-user Delegation Method in RBAC, ACM Symposium on Access Control Models and Technologies, Sweden, Jun 1-3, 2005.
-
(2005)
ACM Symposium on Access Control Models and Technologies
-
-
Wainer, J.1
Kumar, A.2
-
26
-
-
0242540371
-
PBDM: A flexible delegation model in RBAC
-
[Zha03a]
-
[Zha03a] X. Zhang, S. Oh and R. Sandhu, PBDM: A Flexible Delegation Model in RBAC, SACMAT 2003.
-
SACMAT 2003
-
-
Zhang, X.1
Oh, S.2
Sandhu, R.3
-
27
-
-
3042684910
-
A rule-based framework for role-based delegation
-
[Zha03b], August
-
[Zha03b] L. Zhang, G. Ahn, and B. Chu, A rule-based Framework for Role-Based Delegation, ACM Transactions on Information and Systems Security, Vol 6, No. 3, August 2003, Pages 404-4.
-
(2003)
ACM Transactions on Information and Systems Security
, vol.6
, Issue.3
, pp. 404-404
-
-
Zhang, L.1
Ahn, G.2
Chu, B.3
|