-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
Abadi M., Burrows M., Lampson B., and Plotkin G. A calculus for access control in distributed systems. ACM Trans Programming Languages Systems 15 4 (1993) 706-734
-
(1993)
ACM Trans Programming Languages Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
2
-
-
84956993736
-
-
Ahn G-J, Sandhu R. Role-based authorization constraints specification. ACM Trans Inf System Security 2003;3(4):207-26.
-
-
-
-
3
-
-
0242552308
-
-
Ahn G-J, Zhang L, Shin D, Chu B. Authorization management for role-based collaboration. In: IEEE international conference on system, man and cybernetic (SMC2003); Washington, DC, October 2003. p. 4128-214.
-
-
-
-
4
-
-
33750497926
-
-
Barka E, Sandhu R. A role-based delegation model and some extensions. In: Proceedings of the 16th annual computer security application conference; Sheraton, New Orleans. December 11-15, 2000a.
-
-
-
-
5
-
-
33750501666
-
-
Barka E, Sandhu R. Framework for role-based delegation model. In: Proceedings of the 23rd national information systems security conference; Baltimore, MD, October 16-19, 2000b. p. 101-14.
-
-
-
-
6
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino E., Ferrari E., and Atluri V. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans Inf System Security 2 1 (1999) 65-104
-
(1999)
ACM Trans Inf System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
7
-
-
0040884892
-
A flexible authorization mechanism for relational data management systems
-
Bertino E., Jajodia S., and Samarati P. A flexible authorization mechanism for relational data management systems. ACM Trans Inf Systems 17 2 (1999) 101-140
-
(1999)
ACM Trans Inf Systems
, vol.17
, Issue.2
, pp. 101-140
-
-
Bertino, E.1
Jajodia, S.2
Samarati, P.3
-
10
-
-
0002422823
-
A role based access control model and reference implementation within a corporate intranet
-
Ferraiolo D.F., Barkley J.F., and Kuhn D.R. A role based access control model and reference implementation within a corporate intranet. ACM Trans Inf System Security 2 1 (1999)
-
(1999)
ACM Trans Inf System Security
, vol.2
, Issue.1
-
-
Ferraiolo, D.F.1
Barkley, J.F.2
Kuhn, D.R.3
-
11
-
-
33750494808
-
-
Gasser M, McDermott E. An architecture for practical delegation in a distributed system. In: Proceedings of the IEEE computer society symposium on research in security and privacy; Oakland, CA, May 7-9, 1990.
-
-
-
-
12
-
-
0037345397
-
A multi-agent system approach for monitoring the prescription of restricted use of antibiotics
-
Godo L., Puyol-Gruart J., Sabater J., Torra V., Barrufet P., and Fàbregas X. A multi-agent system approach for monitoring the prescription of restricted use of antibiotics. Artif Intell Med 27 3 (2003) 259-282
-
(2003)
Artif Intell Med
, vol.27
, Issue.3
, pp. 259-282
-
-
Godo, L.1
Puyol-Gruart, J.2
Sabater, J.3
Torra, V.4
Barrufet, P.5
Fàbregas, X.6
-
14
-
-
0035281459
-
-
Gribble, SD, et al. The Ninja architecture for robust Internet-scale systems and services. Comput Networks 2001.
-
-
-
-
15
-
-
0034829103
-
-
Hagstrom A, Jajodia S, Presicce FP, Wijesekera D. Revocations-a classification. In: Proceedings of the 14th IEEE computer security foundations workshop; Nova Scotia, Canada, June 2001. p. 44-58.
-
-
-
-
16
-
-
33750528262
-
-
Kagal L, Finin T, Joshi A. Trust-based security in pervasive computing environments. IEEE Comput 2001. p. 2-5.
-
-
-
-
18
-
-
0032264589
-
-
Myers BA, Stiel H, Gargiulo R. Collaboration using multiple PDAs connected to a PC. In: Proceedings of the CSCW'98: ACM conference on computer-supported cooperative work; Seattle, WA, November 14-18, 1998. p. 285-294.
-
-
-
-
19
-
-
33750505974
-
-
The Pittsburgh Pebbles PDA Project. Available at www.cs.cmu.edu/∼pebbles; 2004
-
-
-
-
20
-
-
0030086382
-
Role-based access control models
-
Sandhu R.S., Coyne E.J., Feinstein H.L., and Youman C.E. Role-based access control models. IEEE Comput 29 2 (1996) 38-47
-
(1996)
IEEE Comput
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
22
-
-
33750495467
-
-
Shin D, Ahn G-J, Cho S. Role-based EAM using X.509 attribute certificate. In: Proceedings of the sixteenth annual IFIP WG 11.3 working conference on data and application security; King's College, University of Cambridge, UK, July 29-31, 2002. p. 285-94.
-
-
-
-
23
-
-
3042684910
-
-
Zhang L, Ahn G-J, Chu B. A rule-based framework for role-based delegation and revocation. ACM Trans Inf System Security 2003;6(3):404-41.
-
-
-
-
24
-
-
33750508413
-
-
ITU-T Recommendation X.509. Information technology: open systems interconnection-the directory: public-key and attribute certificate frameworks, ISO/IEC 9594-8, 2001.
-
-
-
|