-
2
-
-
0034860363
-
An integrated solution for secure group communication in wide-area networks
-
July
-
D. Agarwal, O. Chevassut, M. R. Thompson, and G. Tsudik. An integrated solution for secure group communication in wide-area networks. In Proc. of the 6th IEEE Symposium on Computers and Communications, pages 22-28, July 2001.
-
(2001)
Proc. of the 6th IEEE Symposium on Computers and Communications
, pp. 22-28
-
-
Agarwal, D.1
Chevassut, O.2
Thompson, M.R.3
Tsudik, G.4
-
3
-
-
33847139457
-
Managing dynamic user communities in a grid of autonomous resources
-
R. Alfieri, R. Cecchini, V. Ciaschini, L. dell'Agnello, A. Gianoli, F. Spataro, F, Bonnassieux, P. Broadfoot, G, Lowe, L. Cornwall, J. Jensen, D. Kelsey, A. Frohner, D. Groep, W. S. de Cerff, M. Steenbakkers, G. Venekamp, D. Kouril, A. McNab, O. Mulmo, M. Silander, J. Hahkala, and K. Lhorentey. Managing dynamic user communities in a grid of autonomous resources, In Proc. of Computing in High Energy and Nuclear Physics (CHEP03), 2003.
-
(2003)
Proc. of Computing in High Energy and Nuclear Physics (CHEP03)
-
-
Alfieri, R.1
Cecchini, R.2
Ciaschini, V.3
Dell'Agnello, L.4
Gianoli, A.5
Spataro, F.6
Bonnassieux, F.7
Broadfoot, P.8
Lowe, G.9
Cornwall, L.10
Jensen, J.11
Kelsey, D.12
Frohner, A.13
Groep, D.14
De Cerff, W.S.15
Steenbakkers, M.16
Venekamp, G.17
Kouril, D.18
McNab, A.19
Mulmo, O.20
Silander, M.21
Hahkala, J.22
Lhorentey, K.23
more..
-
5
-
-
33748064404
-
Multilayer privilege management for dynamic collaborative scientific communities
-
July
-
D. Chadwick, T. Dimitrakos, K. K.-V. Dam, D. M. Randal, B. Matthews, and A. Otenko. Multilayer privilege management for dynamic collaborative scientific communities. In Proc. of the Workshop on Grid Security Practice and Experience, pages 7-14, July 2004.
-
(2004)
Proc. of the Workshop on Grid Security Practice and Experience
, pp. 7-14
-
-
Chadwick, D.1
Dimitrakos, T.2
Dam, K.K.-V.3
Randal, D.M.4
Matthews, B.5
Otenko, A.6
-
6
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
August
-
D. Ferraiolo, R. Sandhu, S. Gavrila, and R. R. Kuhn. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security (TISSEC), 4; 224-274, August 2001.
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, R.R.4
-
9
-
-
0036532324
-
A practical approach to the intergroup protocols
-
K. Berket, D. Agarwal, and O. Chevassut. A practical approach to the intergroup protocols. Future Generation Computer Systems, 18(5):709-719, 2002.
-
(2002)
Future Generation Computer Systems
, vol.18
, Issue.5
, pp. 709-719
-
-
Berket, K.1
Agarwal, D.2
Chevassut, O.3
-
10
-
-
33745857060
-
The PRIMA grid authorization system
-
M. Lorch and D. G. Kafura. The PRIMA grid authorization system. Journal of Grid Computing, 2(3):279-298, 2004.
-
(2004)
Journal of Grid Computing
, vol.2
, Issue.3
, pp. 279-298
-
-
Lorch, M.1
Kafura, D.G.2
-
12
-
-
84858934420
-
XACML profile for SAML 2.0
-
August
-
OASIS. XACML profile for SAML 2.0. Working draft 04, http://www.oasis- open.org/committees/download.php/8831/oasis-xacml-profile-saml-wd-04.pdf, August 2004.
-
(2004)
Working Draft 04
-
-
-
15
-
-
84887853842
-
A community authorization service for group collaboration
-
June
-
L. Pearlman, V. Welch, I. Foster, C. Kesselman, and S. Tuecke. A community authorization service for group collaboration. In Proc. of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02), June 2002.
-
(2002)
Proc. of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
-
18
-
-
0030086382
-
Role based access control models
-
February
-
R. Sandhu, E, J. Coyne, H. L. Feinstem, and C. E. Youman, Role based access control models. IEEE Computer, 29, February 1996.
-
(1996)
IEEE Computer
, vol.29
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstem, H.L.3
Youman, C.E.4
-
19
-
-
2942654406
-
Certificate-based authorization policy in a PKI environment
-
M. Thompson, A. Essiari, and S. Mudumbai. Certificate-based authorization policy in a PKI environment. ACM Transaction on Information and System Security (TISSEC), 6(4):566-588, 2003.
-
(2003)
ACM Transaction on Information and System Security (TISSEC)
, vol.6
, Issue.4
, pp. 566-588
-
-
Thompson, M.1
Essiari, A.2
Mudumbai, S.3
-
20
-
-
19944381369
-
Internet x.509 public key infrastructure (PKI) proxy certificate profile
-
S. Tuecke, V. Welch, D. Engert, L. Pearlman, and M. Thompson. Internet x.509 public key infrastructure (PKI) proxy certificate profile. RFC 3820, 2004.
-
(2004)
RFC
, vol.3820
-
-
Tuecke, S.1
Welch, V.2
Engert, D.3
Pearlman, L.4
Thompson, M.5
|