-
1
-
-
84865788031
-
A model of OASIS role-based access control and its support for active security
-
ACM Press, New York
-
Bacon, J., Moody, K., and Yao, W.: A Model of OASIS Role-Based Access Control and Its Support for Active Security. ACM Trans. Information and System Security, Vol. 5, No. 4. ACM Press, New York (2002) 492-540
-
(2002)
ACM Trans. Information and System Security
, vol.5
, Issue.4
, pp. 492-540
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
2
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
ACM Press, New York
-
Osborn, S.L., Sandhu, R., and Munawer, Q.: Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Trans. Information and System Security, Vol. 3, No. 2. ACM Press, New York (2000) 85-106
-
(2000)
ACM Trans. Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.L.1
Sandhu, R.2
Munawer, Q.3
-
3
-
-
4644260332
-
OWL: Web ontology language semantics and abstract syntax
-
Patel-Schneider, P.P., Hayes, P., Horrocks, I., ed.: 10 February
-
Patel-Schneider, P.P., Hayes, P., Horrocks, I., ed.: OWL: Web Ontology Language Semantics and Abstract Syntax. W3C Recommendation 10 February 2004. Latest version is available at http://www.w3.org/TR/owl-semantics/
-
(2004)
W3C Recommendation
-
-
-
4
-
-
18744404327
-
-
W3C Member Submission, 21 May
-
Horrocks, I., Patel-Schneider, P. F., Boley, H., Tabet, S., Grosof, B. and Dean, M.: SWRL: A semantic web rule language combining owl and ruleml. W3C Member Submission, 21 May 2004. Available at http://www.w3.org/Submission/SWRL/
-
(2004)
SWRL: A Semantic Web Rule Language Combining Owl and Ruleml
-
-
Horrocks, I.1
Patel-Schneider, P.F.2
Boley, H.3
Tabet, S.4
Grosof, B.5
Dean, M.6
-
5
-
-
84992227458
-
The NIST model for role-based access control: Towards a unified standard
-
ACM Press, New York
-
Ferraiolo, D., et al.: The NIST Model for Role-Based Access Control: Towards a Unified Standard. ACM Trans. Information and System Security, Vol. 4, No. 3. ACM Press, New York (2001) 224-274
-
(2001)
ACM Trans. Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.1
-
7
-
-
11044223672
-
Access-control language for multidomain environments
-
IEEE. IEEE Inc., Piscataway
-
Joshi, J.B.D.: Access-control language for multidomain environments. Internet Computing, IEEE, Vol 8, Is 6. IEEE Inc., Piscataway (2004) 40-50
-
(2004)
Internet Computing
, vol.8
, Issue.6
, pp. 40-50
-
-
Joshi, J.B.D.1
-
8
-
-
1142268572
-
KAoS semantic policy and domain services: An application of DAML to Web services-based grid architectures
-
Submitted to the, Melbourne, Australia, July
-
Johnson, M., Chang, P., Jeffers, R., Bradshaw, J., et al: KAoS Semantic Policy and Domain Services: An Application of DAML to Web Services-Based Grid Architectures. Submitted to the AAMAS 03 workshop on Web Services and Agent-Based Engineering, Melbourne, Australia, July, (2003)
-
(2003)
AAMAS 03 Workshop on Web Services and Agent-based Engineering
-
-
Johnson, M.1
Chang, P.2
Jeffers, R.3
Bradshaw, J.4
-
9
-
-
37149051976
-
KAoS policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement
-
To appear in, Lake Como, Italy
-
Uszok, A., Bradshaw, J., Jeffers, R., Suri, N., et al.: KAoS Policy and Domain Services: Toward a Description-Logic Approach to Policy Representation, Deconfliction, and Enforcement. To appear in proceedings of IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Como, Italy, (2003)
-
(2003)
Proceedings of IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY 2003)
-
-
Uszok, A.1
Bradshaw, J.2
Jeffers, R.3
Suri, N.4
-
10
-
-
84893084758
-
A policy language for pervasive computing environment
-
To appear in, Lake Como, Italy
-
Kagal, L., Finin, T., Johshi, A.: A Policy Language for Pervasive Computing Environment. To appear in proceedings of IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Como, Italy, (2003)
-
(2003)
Proceedings of IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY 2003)
-
-
Kagal, L.1
Finin, T.2
Johshi, A.3
-
11
-
-
84944048132
-
The ponder policy specification language
-
proceedings of Workshop on Policies for Distributed Systems and Networks (POLICY 2001). Springer-Verlag, Bristol, UK
-
Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language. In proceedings of Workshop on Policies for Distributed Systems and Networks (POLICY 2001). Springer-Verlag, LNCS 1995, Bristol, UK, (2001)
-
(2001)
LNCS
, vol.1995
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
12
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
Dresden, Germany
-
Lodderstedt, T., Basin, D. A., and Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. Proceedings of the 5th International Conference on the Unified Modeling Language, Dresden, Germany (2002) 426-441
-
(2002)
Proceedings of the 5th International Conference on the Unified Modeling Language
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.A.2
Doser, J.3
-
13
-
-
4143147399
-
Constraints: Using UML to visualize role-based access control constraints
-
ACM Press, New York
-
Indrakshi Ray, Na Li, Robert France, and Dae-Kyoo Kim: Constraints: Using UML To Visualize Role-Based Access Control Constraints. Proceedings of the ninth ACM symposium on Access control models and technologies. ACM Press, New York (2004) 115-124
-
(2004)
Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies
, pp. 115-124
-
-
Ray, I.1
Li, N.2
France, R.3
Kim, D.-K.4
-
14
-
-
0141876269
-
Generalized role-based access control for securing future applications
-
Baltimore, MD. U.S.A., Oct. 16-19
-
Covington, M J., Moyer, M J., and Ahamad, M.: Generalized Role-Based Access Control for Securing Future Applications. Proceedings of the 23rd National Information Systems Security Conference (NISSC 2000), Baltimore, MD. U.S.A., Oct. 16-19, 2000.
-
(2000)
Proceedings of the 23rd National Information Systems Security Conference (NISSC 2000)
-
-
Covington, M.J.1
Moyer, M.J.2
Ahamad, M.3
-
15
-
-
0010032891
-
Computational issues in secure intel-operation
-
IEEE Inc., Piscataway
-
Gong, L., and Qian, X.: Computational Issues in Secure Intel-operation. IEEE Trans. Software and Eng., Vol. 22, No. 1. IEEE Inc., Piscataway (1996) 43-52
-
(1996)
IEEE Trans. Software and Eng.
, vol.22
, Issue.1
, pp. 43-52
-
-
Gong, L.1
Qian, X.2
|