-
1
-
-
84941161593
-
-
EGEE project, http://egee-intranet.web.cern.ch/.
-
-
-
-
2
-
-
84941150924
-
-
Oasis eXstensible Access Control Markup Language Committee, XACML V2.0. www.oasis-open.org/committees/.
-
XACML V2.0.
-
-
-
3
-
-
84941155104
-
-
Oasis Security Services Technical Committee, SAML V2.0. www.oasis-open.org /committees/.
-
-
-
-
4
-
-
0242496718
-
-
Dec
-
The Caldicott Report, www.hpa.org.uk/confidentiality/caldicott.htm. Dec 1997.
-
(1997)
The Caldicott Report
-
-
-
5
-
-
84941158822
-
-
Datagrid project, http://eu-datagrid.web.cern.ch/eu-datagrid/.
-
-
-
-
6
-
-
84941162583
-
-
Data protection act 1998. The Stationery Office Limited, London, 1998
-
Data protection act 1998. The Stationery Office Limited, London, 1998.
-
-
-
-
8
-
-
0032218229
-
A security architecture for computational grids
-
I. Foster, C. Kesselman, G. Tsudik, and S. Tuecke. A security architecture for computational grids. In 5th ACM Conference on Computer and Communications Security, pages 83-92, 1998.
-
(1998)
5th ACM Conference on Computer and Communications Security
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
10
-
-
27544448594
-
Neurogrid: Using grid technology to advance neuroscience
-
J. Geddes, S. Lloyd, A. C. Simpson, M. Rossor, N. Fox, D. Hill, J. Hajnal, S.Lawrie, A. Mclntosh, E. Johnstone, J. Wardlaw, D. Perry, R. Procter, P. Bath, and E. Bullmore. Neurogrid: Using grid technology to advance neuroscience. In 18th IEEEd Symposium on Computer-Based Medical Systems, pages 570-572, 2005.
-
(2005)
18th IEEEd Symposium on Computer-based Medical Systems
, pp. 570-572
-
-
Geddes, J.1
Lloyd, S.2
Simpson, A.C.3
Rossor, M.4
Fox, N.5
Hill, D.6
Hajnal, J.7
Lawrie, S.8
Mclntosh, A.9
Johnstone, E.10
Wardlaw, J.11
Perry, D.12
Procter, R.13
Bath, P.14
Bullmore, E.15
-
12
-
-
0011255177
-
Internet X.509 public key infrastructure certificate and Certificate Revocation List (CRL) profile
-
Apr
-
R. Housley, W. Polk, W. Ford, and D. Solo. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280, Apr 2002.
-
(2002)
RFC
, vol.3280
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
13
-
-
2442528432
-
National programme for information technology
-
M. Humber. National Programme for Information Technology. British Medical Journal, 328(7449):1145-1146, 2004.
-
(2004)
British Medical Journal
, vol.328
, Issue.7449
, pp. 1145-1146
-
-
Humber, M.1
-
14
-
-
2642579954
-
Constrained delegation in XML-based access control and digital rights management standards
-
Dec
-
G. Navarro, B. Sadhigi-Firozabadi, E. Rissanen, and J. Borrell. Constrained delegation in XML-based access control and digital rights management standards. In Proceedings of Communication,Network and Information Security, Dec 2003.
-
(2003)
Proceedings of Communication,Network and Information Security
-
-
Navarro, G.1
Sadhigi-Firozabadi, B.2
Rissanen, E.3
Borrell, J.4
-
15
-
-
22144465809
-
Towards secure grid-enabled healthcare
-
D. J. Power, E. A. Politou, M. A. Slaymaker, and A. C. Simpson. Towards secure grid-enabled healthcare. Software: Practice and Experience, 35(9):857-871, 2005.
-
(2005)
Software: Practice and Experience
, vol.35
, Issue.9
, pp. 857-871
-
-
Power, D.J.1
Politou, E.A.2
Slaymaker, M.A.3
Simpson, A.C.4
-
16
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. Computer, 29(2):38-47, 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
17
-
-
33749661756
-
Policy administration control and delegation using XACML and delegent
-
Nov
-
L. Seitz, E. Rissanen, T. Sandholm, B. S. Firozibadi, and O. Mulmo. Policy administration control and delegation using XACML and delegent. In 6th IEEE/ACM International Workshop on Grid Computing, Nov 2005.
-
(2005)
6th IEEE/ACM International Workshop on Grid Computing
-
-
Seitz, L.1
Rissanen, E.2
Sandholm, T.3
Firozibadi, B.S.4
Mulmo, O.5
-
19
-
-
4944261591
-
X.509 proxy certificates for dynamic delegation
-
V. Welch, I. Foster, C. Kesselman, O. Mulmo, L. Pearlman, S. Tuecke, J. Gawor, S. Meder, and F. Siebenlist. X.509 Proxy Certificates for Dynamic Delegation. In 3rd Annual PKI R&D Workshop, 2004.
-
(2004)
3rd Annual PKI R&D Workshop
-
-
Welch, V.1
Foster, I.2
Kesselman, C.3
Mulmo, O.4
Pearlman, L.5
Tuecke, S.6
Gawor, J.7
Meder, S.8
Siebenlist, F.9
-
20
-
-
0242456746
-
A role-based delegation framework for healthcare information systems
-
L. Zhang, G. J. Ahn, and B. T. Chu. A role-based delegation framework for healthcare information systems. In SACMAT, pages 125-134, 2002.
-
(2002)
SACMAT
, pp. 125-134
-
-
Zhang, L.1
Ahn, G.J.2
Chu, B.T.3
-
21
-
-
3042684910
-
A rule-based framework for role-based delegation and revocation
-
L. Zhang, G. J. Ahn, and B. T. Chu. A rule-based framework for role-based delegation and revocation. ACM Transactions on Information and System Security, 6(3):404-441, 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.3
, pp. 404-441
-
-
Zhang, L.1
Ahn, G.J.2
Chu, B.T.3
|