-
1
-
-
33748061718
-
History-based access control for mobile code
-
San Diego, California, USA, February
-
M. Abadi and C. Fournet. History-based Access Control for Mobile Code. In Proceedings of the 10th Annual Network and Distributed System Security Symposium, pages 107-121, San Diego, California, USA, February 2003.
-
(2003)
Proceedings of the 10th Annual Network and Distributed System Security Symposium
, pp. 107-121
-
-
Abadi, M.1
Fournet, C.2
-
2
-
-
0036510173
-
A content-based authorization model for digital libraries
-
March
-
N. R. Adam, V. Atluri, E. Bertino, and E. Ferrari. A Content-Based Authorization Model for Digital Libraries. IEEE Transactions on Knowledge and Data Engineering, 14(2):296-315, March 2002.
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, Issue.2
, pp. 296-315
-
-
Adam, N.R.1
Atluri, V.2
Bertino, E.3
Ferrari, E.4
-
3
-
-
85084162149
-
A general and flexible access-control system for the web
-
San Francisco, California, USA, August
-
L. Bauer, M. A. Schneider, and E. W. Felten. A General and Flexible Access-Control System for the Web. In Proceedings of the 11th USENIX Security Symposium, San Francisco, California, USA, August 2002.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Bauer, L.1
Schneider, M.A.2
Felten, E.W.3
-
4
-
-
30644474741
-
GEO-RBAC: A spatially aware RBAC
-
Stockholm, Sweeden, June
-
E. Bertino, B. Catania, and M. L. Damiani. GEO-RBAC: A Spatially Aware RBAC. In Proceedings of the 10th ACM Symposium on Access Control Models and Technologies (SACMAT'05), pages 29-37, Stockholm, Sweeden, June 2005.
-
(2005)
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies (SACMAT'05)
, pp. 29-37
-
-
Bertino, E.1
Catania, B.2
Damiani, M.L.3
-
5
-
-
4744370524
-
A trust-based context-aware access control model for web-services
-
San Diego, California, USA, June
-
R. Bhatti, E. Bertino, and A. Ghafoor. A Trust-based Context-Aware Access Control Model for Web-Services. In Proceedings of the IEEE International Conference on Web Services (ICWS'04), pages 184-191, San Diego, California, USA, June 2004.
-
(2004)
Proceedings of the IEEE International Conference on Web Services (ICWS'04)
, pp. 184-191
-
-
Bhatti, R.1
Bertino, E.2
Ghafoor, A.3
-
6
-
-
1642341365
-
Access control in dynamic XM-based web-services with X-RBAC
-
Las Vegas, Nevada, USA, June
-
R. Bhatti, J. Joshi, E. Bertino, and A. Ghafoor. Access Control in Dynamic XM-based Web-Services with X-RBAC. In Proceedings of the 1st International Conference on Web Services, Las Vegas, Nevada, USA, June 2003.
-
(2003)
Proceedings of the 1st International Conference on Web Services
-
-
Bhatti, R.1
Joshi, J.2
Bertino, E.3
Ghafoor, A.4
-
7
-
-
0003226048
-
The KeyNote trust management system version 2
-
Internet Society, Network Working Group
-
M. Blaze, J. Feigenbaum, and J. Ioannidis. The KeyNote Trust Management System Version 2. Internet Society, Network Working Group. RFC 2704, 1999.
-
(1999)
RFC
, vol.2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
-
8
-
-
0029700344
-
Decentralized trust management
-
Oakland, California, USA, May
-
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized Trust Management. In Proceedings of 17th IEEE Symposium on Security and Privacy, pages 164-173, Oakland, California, USA, May 1996.
-
(1996)
Proceedings of 17th IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
10
-
-
0037362986
-
Role-based access control with X.509 attribute certificates
-
March/April
-
D. Chadwick, A. Otenko, and E. Ball. Role-Based Access Control with X.509 Attribute Certificates. IEEE Internet Computing, 7(2):62-69, March/April 2003.
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.2
, pp. 62-69
-
-
Chadwick, D.1
Otenko, A.2
Ball, E.3
-
11
-
-
0242456748
-
Models for Coalition-based Access Control (CBAC)
-
Monterey, California, USA, June
-
E. Cohen, R. K. Thomas, W. Winsborough, and D. Shands. Models for Coalition-based Access Control (CBAC). In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT'02), pages 97-106, Monterey, California, USA, June 2002.
-
(2002)
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT'02)
, pp. 97-106
-
-
Cohen, E.1
Thomas, R.K.2
Winsborough, W.3
Shands, D.4
-
12
-
-
33846986465
-
New paradigm for access control in open environments
-
Athens, Greece, December
-
E. Damiani, S. Vimercati, and P. Samarati. New Paradigm for Access Control in Open Environments. In Proceedings of the 5th IEEE Symposium on Signal Processing and Information Technology (ISSPIT'05), Athens, Greece, December 2005.
-
(2005)
Proceedings of the 5th IEEE Symposium on Signal Processing and Information Technology (ISSPIT'05)
-
-
Damiani, E.1
Vimercati, S.2
Samarati, P.3
-
13
-
-
0032218233
-
History-based access control for mobile code
-
San Francisco, California, USA, November
-
G. Edjlali, A. Acharya, and V. Chaudhary. History-based Access Control for Mobile Code. In Proceedings of the 5th ACM Conference on Computer and Communication Security (CCS'98), pages 38-48, San Francisco, California, USA, November 1998.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communication Security (CCS'98)
, pp. 38-48
-
-
Edjlali, G.1
Acharya, A.2
Chaudhary, V.3
-
14
-
-
0002357382
-
Role-based access controls
-
Bultimore, Maryland, USA, October
-
D. Ferraiolo and R. Kuhn. Role-Based Access Controls. In Proceedings of the 15th NIST-NCSC National Computer Security Conference, pages 554-563, Bultimore, Maryland, USA, October 1992.
-
(1992)
Proceedings of the 15th NIST-NCSC National Computer Security Conference
, pp. 554-563
-
-
Ferraiolo, D.1
Kuhn, R.2
-
15
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
August
-
D. Ferraiolo, R. Sandhu, S. Gavrila, R. Kuhn, and R. Chandramouli. Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and Systems Security, 4(3):224-274, August 2001.
-
(2001)
ACM Transactions on Information and Systems Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, R.4
Chandramouli, R.5
-
16
-
-
0035790754
-
Flexible team-based access control using contexts
-
Chantily, Virginia, USA, May
-
C. K. Georgiadis, I. Mavridis, G. Pangalos, and R. K. Thomas. Flexible Team-based Access Control Using Contexts. In Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies (SACMAT'01), pages 21-27, Chantily, Virginia, USA, May 2001.
-
(2001)
Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies (SACMAT'01)
, pp. 21-27
-
-
Georgiadis, C.K.1
Mavridis, I.2
Pangalos, G.3
Thomas, R.K.4
-
18
-
-
0031118725
-
Access control for large collections
-
April
-
H.M.Gladney. Access Control for Large Collections. ACM Transactions on Information Systems, 15(2):154-194, April 1997.
-
(1997)
ACM Transactions on Information Systems
, vol.15
, Issue.2
, pp. 154-194
-
-
Gladney, H.M.1
-
19
-
-
17444406680
-
A generalized temporal role-based access control model
-
January
-
J. Joshi, E. Bertino, U. Latif, and A. Ghafoor. A Generalized Temporal Role-Based Access Control Model. IEEE Transactions on Knowledge and Data Engineering, 17(1):4-23, January 2005.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
22
-
-
0036085965
-
Design of a role-based trust-management framework
-
Oakland, California, May
-
N. Li, J. Mitchell, and W. Winsborough. Design of a Role-Based Trust-Management Framework. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages 114-130, Oakland, California, May 2002.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.2
Winsborough, W.3
-
23
-
-
33744503327
-
Beyond proof-of-compliance: Safety and availability analysis in trust management
-
Oakland, California, May
-
N. Li, W. Winsborough, and J. Mitchell. Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management. In Proceedings of the 2003 IEEE Symposium on Security and Privacy, Oakland, California, May 2003.
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
-
-
Li, N.1
Winsborough, W.2
Mitchell, J.3
-
25
-
-
35048832496
-
A vector model of trust for developing trustworthy systems
-
Proceedings of the 9th European Symposium of Research in Computer Security (ESORICS 2004), Sophia Antipolis, France, September
-
I. Ray and S. Chakraborty. A Vector Model of Trust for Developing Trustworthy Systems. In Proceedings of the 9th European Symposium of Research in Computer Security (ESORICS 2004), volume 3193 of Lecture Notes in Computer Science, pages 260-275, Sophia Antipolis, France, September 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3193
, pp. 260-275
-
-
Ray, I.1
Chakraborty, S.2
-
26
-
-
0030086382
-
Role-based access control models
-
February
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-Based Access Control Models. IEEE Computer, 29(2):38-47, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
28
-
-
0031387996
-
Team-based Access Control (TMAC): A primitive for applying role-based access controls in collaborative environments
-
Fairfax, Virginia, USA, November
-
R. K. Thomas. Team-based Access Control (TMAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments. In Proceedings of the Second ACM Workshop on Role-based Access Control (RBAC'97), pages 13-19, Fairfax, Virginia, USA, November 1997.
-
(1997)
Proceedings of the Second ACM Workshop on Role-based Access Control (RBAC'97)
, pp. 13-19
-
-
Thomas, R.K.1
-
29
-
-
0035791094
-
The YGuard access control model: Set-based access control
-
Chantily, Virginia, USA, May
-
T. van den Akker, Q. O. Snell, and M. J. Clement. The YGuard Access Control Model: Set-based Access Control. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT'01), pages 75-84, Chantily, Virginia, USA, May 2001.
-
(2001)
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT'01)
, pp. 75-84
-
-
Van Den Akker, T.1
Snell, Q.O.2
Clement, M.J.3
-
30
-
-
4143110148
-
Role-based access control in ambient and remote space
-
Yorktown Heights, New York, USA, June
-
H. F. Wedde and M. Lischka. Role-Based Access Control in Ambient and Remote Space. In Proceedings of the 9th ACM Symposium on Access Control Models and Technologies (SACMAT'04), pages 21-30, Yorktown Heights, New York, USA, June 2004.
-
(2004)
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies (SACMAT'04)
, pp. 21-30
-
-
Wedde, H.F.1
Lischka, M.2
-
31
-
-
0030698978
-
Assuring security and privacy for digital library transactions on the Web: Client and server security policies
-
Washington, DC, USA, May
-
M. Winslett, N. Ching, V. Jones, and I. Slepchin. Assuring security and privacy for digital library transactions on the Web: client and server security policies. In Proceedings of the IEEE international forum on Research and Technology Advances in Digital Libraries, pages 140-151, Washington, DC, USA, May 1997.
-
(1997)
Proceedings of the IEEE International Forum on Research and Technology Advances in Digital Libraries
, pp. 140-151
-
-
Winslett, M.1
Ching, N.2
Jones, V.3
Slepchin, I.4
|