-
2
-
-
33745809433
-
Attribute-based authentication model for dynamic mobile environments
-
York, UK, Springer Lecture Notes in Computer Science
-
Covington, M.J., Sastry, M.R., Manohar, D.J.: Attribute-based authentication model for dynamic mobile environments. In: Proceedings of The 3rd International Conference on Security in Pervasive Computing (SPC '06), York, UK, Springer Lecture Notes in Computer Science (2006)
-
(2006)
Proceedings of the 3rd International Conference on Security in Pervasive Computing (SPC '06)
-
-
Covington, M.J.1
Sastry, M.R.2
Manohar, D.J.3
-
3
-
-
0002045898
-
Role based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role based access control models. In: IEEE Computer. Volume 2. (1996)
-
(1996)
IEEE Computer
, vol.2
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
4
-
-
0035791053
-
Securing context-aware applications using environment roles
-
Chantilly, Virginia, USA
-
Covington, M.J., Long, W., Srinivasan, S., Dey, A., Ahamad, M., Abowd, G.: Securing context-aware applications using environment roles, In: Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT), Chantilly, Virginia, USA (2001) 10-20
-
(2001)
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 10-20
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dey, A.4
Ahamad, M.5
Abowd, G.6
-
5
-
-
33745450500
-
Formal model and policy specification of usage control
-
Zhang, X., Parisi-Presicce, F., Sandhu, R.: Formal model and policy specification of usage control. In: ACM Transactions on Information and System Security. Volume 8. (2005) 351-387
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, pp. 351-387
-
-
Zhang, X.1
Parisi-Presicce, F.2
Sandhu, R.3
-
6
-
-
0031365182
-
Role templates for content-based access control
-
Fairfax, Virginia, USA
-
Giuri, L., Iglio, P.: Role templates for content-based access control. In: Proceedings of the Second ACM Workshop on Role Based Access Control, Fairfax, Virginia, USA (1997) 153-159
-
(1997)
Proceedings of the Second ACM Workshop on Role Based Access Control
, pp. 153-159
-
-
Giuri, L.1
Iglio, P.2
-
7
-
-
0035006262
-
Generalized role based access control
-
Mesa, Arizona, USA
-
Moyer, M.J., Ahamad, M.: Generalized role based access control. In: Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), Mesa, Arizona, USA (2001)
-
(2001)
Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS)
-
-
Moyer, M.J.1
Ahamad, M.2
-
8
-
-
4444341241
-
Content-triggered trust negotiation
-
Hess, A., Holt, J., Jacobson, J., Seamons, K.E.: Content-triggered trust negotiation. ACM Transactions on Information and System Security 7 (2004) 428-456
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, pp. 428-456
-
-
Hess, A.1
Holt, J.2
Jacobson, J.3
Seamons, K.E.4
-
9
-
-
30744448197
-
Context sensitive access control
-
Stockholm, Sweden
-
Hulsebosch, R.J., Salden, A.H., Bargh, M.S., Ebben, P.W.G., Reitsma, J.: Context sensitive access control. In: Proceedings of the 10th ACM Symposium on Access Control Models and Technologies (SACMAT 2005), Stockholm, Sweden (2005) 111-119
-
(2005)
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies (SACMAT 2005)
, pp. 111-119
-
-
Hulsebosch, R.J.1
Salden, A.H.2
Bargh, M.S.3
Ebben, P.W.G.4
Reitsma, J.5
|