-
2
-
-
84928693825
-
Merging heterogeneous security orderings
-
Bonatti, P.A., Sapino, M. L., Subrahmanian, V.S. Merging Heterogeneous Security Orderings.Esorics'96,183-197.
-
Esorics'96
, pp. 183-197
-
-
Bonatti, P.A.1
Sapino, M.L.2
Subrahmanian, V.S.3
-
4
-
-
0004116989
-
-
MIT press
-
Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C. Introduction to Algorithms, Second Edition, MIT press, 1991.
-
(1991)
Introduction to Algorithms, Second Edition
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
6
-
-
0000985630
-
An examination of federal and commercial access control policy needs
-
Ferraiolo, D. F., Gilbert, D. M., Lynch, N. An Examination of Federal and Commercial Access Control Policy Needs, NISTNCSC National Computer Security,1993, 107-116.
-
(1993)
NISTNCSC National Computer Security
, pp. 107-116
-
-
Ferraiolo, D.F.1
Gilbert, D.M.2
Lynch, N.3
-
8
-
-
0010032891
-
Computational issues in secure interoperation
-
January
-
Gong, L., Qian, X. Computational Issues in Secure Interoperation. IEEE Transaction on Software and Engineering, Vol. 22, No. 1, January 1996.
-
(1996)
IEEE Transaction on Software and Engineering
, vol.22
, Issue.1
-
-
Gong, L.1
Qian, X.2
-
9
-
-
0016349356
-
Approximation algorithms for combinatorial problems
-
Johnson, D.S., Approximation algorithms for combinatorial problems. J. Comput. System Sci. 9, 1974. 256-278.
-
(1974)
J. Comput. System Sci.
, vol.9
, pp. 256-278
-
-
Johnson, D.S.1
-
10
-
-
0000206310
-
Security models for web-based applications
-
Joshi, J.B.D., Aref, W.G., Ghafoor, A., Spafford, E.H. Security Models for Web-based Applications. Communications of the ACM, 44, 2, 2001, 38-72.
-
(2001)
Communications of the ACM
, vol.44
, Issue.2
, pp. 38-72
-
-
Joshi, J.B.D.1
Aref, W.G.2
Ghafoor, A.3
Spafford, E.H.4
-
11
-
-
0242625215
-
Temporal hierarchies and inheritance semantics for GTRBAC
-
Monterey, California, USA
-
Joshi, J.B.D., Bertino, E., Ghafoor, A. Temporal hierarchies and inheritance semantics for GTRBAC, Proceedings of the seventh ACM symposium on Access control models and technologies, Monterey, California, USA, 2002, 74 - 83.
-
(2002)
Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies
, pp. 74-83
-
-
Joshi, J.B.D.1
Bertino, E.2
Ghafoor, A.3
-
12
-
-
17444406680
-
A generalised temporal role based access control model
-
Joshi, J.B.D., Bertino, E., Latif, U., Ghafoor, A. A Generalised Temporal Role Based Access Control Model. IEEE Transactions on Knowledge and Data Engineering, 17(1), 2005, 4-23.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.B.D.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
14
-
-
24344502331
-
An analysis of expressiveness and design issues for the generalized temporal role-based access control model
-
April
-
Joshi, J.B.D., Bertino, E., Ghafoor, A. An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model, IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 2, April 2005.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.2
-
-
Joshi, J.B.D.1
Bertino, E.2
Ghafoor, A.3
-
15
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
Osborn, S., Sandhu, R., Munawer, Q. Configuring Role-based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Transactions on Information and System Security, 3(2), 2000, 85-106.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
17
-
-
50249183308
-
Role hierarchies and constraints for lattice-based access controls
-
Computer Security - Esorics'96
-
Sandhu, R. Role hierarchies and constraints for lattice-based access controls. Computer Security - Esorics'96, LNCS N. 1146, 1996, 65-79.
-
(1996)
LNCS
, Issue.1146
, pp. 65-79
-
-
Sandhu, R.1
-
19
-
-
28244460211
-
Secure interoperation in a multi-domain environment employing RBAC policies
-
Shafiq, B., Joshi, J.B.D., Bertino, E., Ghafoor, A. Secure Interoperation In a Multi-Domain Environment Employing RBAC Policies, Knowledge and Data Engineering, 2005.
-
(2005)
Knowledge and Data Engineering
-
-
Shafiq, B.1
Joshi, J.B.D.2
Bertino, E.3
Ghafoor, A.4
-
20
-
-
30644461515
-
SERAT: SEcure role mApping technique for decentralized secure interoperability
-
Stockholm, Sweden
-
Shehab, M., Bertino, E., Ghafoor, A. SERAT: SEcure Role mApping Technique for Decentralized Secure Interoperability,. In Proceedings of the ACM Symposium on Access Control, Models and Technologies (SACMAT 05), Stockholm, Sweden, 2005.
-
(2005)
Proceedings of the ACM Symposium on Access Control, Models and Technologies (SACMAT 05)
-
-
Shehab, M.1
Bertino, E.2
Ghafoor, A.3
|