-
2
-
-
3142653715
-
-
Ph.D. thesis, Birbeck College, University of London, UK
-
CRAMPTON, J. 2002. Authorizations and antichains. Ph.D. thesis, Birbeck College, University of London, UK.
-
(2002)
Authorizations and Antichains
-
-
Crampton, J.1
-
4
-
-
3142510989
-
Administrative scope: A foundation for role-based administrative models
-
CRAMPTON, J. AND LOIZOU, G. 2003. Administrative scope: A foundation for role-based administrative models. ACM Transactions on Information and System Security 6, 2 (May), 201-231.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.2 MAY
, pp. 201-231
-
-
Crampton, J.1
Loizou, G.2
-
5
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
FERRAIOLO, D. F., SANDHU, R. S., GAVRILA, S., KUHN, D. R., AND CHANDRAMOULI, R. 2001. Proposed NIST standard for role-based access control. ACM Transactions on Information and Systems Security 4, 3 (Aug.), 224-274.
-
(2001)
ACM Transactions on Information and Systems Security
, vol.4
, Issue.3 AUG.
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.S.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
6
-
-
0242709323
-
The role control center: Features and case studies
-
FEHRAIOLO, D. F., CHANDRAMOULI, R., AHN, G.-J., AND GAVRILA, S. 2003. The role control center: Features and case studies. In Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies.
-
(2003)
Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies
-
-
Fehraiolo, D.F.1
Chandramouli, R.2
Ahn, G.-J.3
Gavrila, S.4
-
8
-
-
84942812332
-
Protection - Principles and practice
-
AFIPS Press, Montvale, N.J.
-
GRAHAM, G. S. AND DENNING, P. J. 1972. Protection - principles and practice. In Proceedings of the AFIPS Spring Joint Computer Conference. Vol. 40. AFIPS Press, Montvale, N.J. 417-429.
-
(1972)
Proceedings of the AFIPS Spring Joint Computer Conference
, vol.40
, pp. 417-429
-
-
Graham, G.S.1
Denning, P.J.2
-
9
-
-
0016984825
-
Protection in operating systems
-
HARHISON, M. A., RUZZO, W. L., AND ULLMAN, J. D. 1976. Protection in operating systems. Communications of the ACM 19, 8 (Aug.), 461-471.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8 AUG.
, pp. 461-471
-
-
Harhison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
11
-
-
84957011508
-
Decidability of safety in graph-based models for access control
-
Springer, New York
-
KOCH, M., MANCINI, L. V., AND PAHISI-PHESICCE, F. 2002a. Decidability of safety in graph-based models for access control. In Proceedings of the Seventh European Symposium on Research in Computer Security (ESORICS 2002). Springer, New York. 229-243.
-
(2002)
Proceedings of the Seventh European Symposium on Research in Computer Security (ESORICS 2002)
, pp. 229-243
-
-
Koch, M.1
Mancini, L.V.2
Pahisi-Phesicce, F.3
-
12
-
-
85008430937
-
A graph-based formalism for RBAC
-
KOCH, M., MANCINI, L. V., AND PAHISI-PHESICCE, F. 2002b. A graph-based formalism for RBAC. ACM Transactions on Information and System Security 5, 3 (Aug.), 332-365.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.3 AUG.
, pp. 332-365
-
-
Koch, M.1
Mancini, L.V.2
Pahisi-Phesicce, F.3
-
15
-
-
3142654848
-
-
Reprinted in (Jan)
-
Reprinted in ACM Operating Systems Review 8, 1, 18-24 (Jan 1974).
-
(1974)
ACM Operating Systems Review
, vol.8
, Issue.1
, pp. 18-24
-
-
-
17
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
LI, N., WINSBOROUGH, W. H., AND MITCHELL, J. C. 2003. Distributed credential chain discovery in trust management. Journal of Computer Security 11, 1 (Feb.), 35-86.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1 FEB.
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
18
-
-
0036085965
-
Design of a role-based trust management framework
-
IEEE Computer Society Press, Washington, DC
-
LI, N., MITCHELL, J. C., AND WINSBOROUGH, W. H. 2002. Design of a role-based trust management framework. In Proceedings of the 2002 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Washington, DC. 114-130.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
19
-
-
30544438141
-
Beyond proof-of-compliance: Security analysis in trust management
-
LI, N., MITCHELL, J. C., AND WINSBOROUGH, W H. 2005. Beyond proof-of-compliance: Security analysis in trust management. Journal of the ACM 62, 3 (May), 474-514.
-
(2005)
Journal of the ACM
, vol.62
, Issue.3 MAY
, pp. 474-514
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
21
-
-
0017512599
-
A linear time algorithm for deciding subject security
-
LIPTON, R. J. AND SNYDER, L. 1977. A linear time algorithm for deciding subject security. Journal of the ACM 24, 3, 455-464.
-
(1977)
Journal of the ACM
, vol.24
, Issue.3
, pp. 455-464
-
-
Lipton, R.J.1
Snyder, L.2
-
25
-
-
0023999796
-
The schematic protection model: Its definition and analysis for acyclic attenuating systems
-
SANDHU, R. S. 1988. The schematic protection model: Its definition and analysis for acyclic attenuating systems. Journal of the ACM 36, 2, 404-432.
-
(1988)
Journal of the ACM
, vol.36
, Issue.2
, pp. 404-432
-
-
Sandhu, R.S.1
-
27
-
-
0030086382
-
Role-based access control models
-
SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Computer 29, 2 (Feb.), 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2 FEB.
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
28
-
-
0001549660
-
The ARBAC97 model for role-based aministration of roles
-
SANDHU, R. S., BHAMIDIPATI, V., AND MUNAWER, Q. 1999. The ARBAC97 model for role-based aministration of roles. ACM Transactions on Information and Systems Security 2, 1 (Feb.), 105-135.
-
(1999)
ACM Transactions on Information and Systems Security
, vol.2
, Issue.1 FEB.
, pp. 105-135
-
-
Sandhu, R.S.1
Bhamidipati, V.2
Munawer, Q.3
-
29
-
-
0035790675
-
The role-based access control system of a European bank: A case study and discussion
-
ACM Press, New York
-
SCHAAD, A., MOFFETT, J., AND JACOB, J. 2001. The role-based access control system of a European bank: A case study and discussion. In Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies. ACM Press, New York. 3-9.
-
(2001)
Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
, pp. 3-9
-
-
Schaad, A.1
Moffett, J.2
Jacob, J.3
-
31
-
-
4143074723
-
A logical specification for usage control
-
ZHANG, X., PARK, J., PAHISI-PRESICCE, F., AND SANDHU, R. S. 2004. A logical specification for usage control. In Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies (SACMAT 2004).
-
(2004)
Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies (SACMAT 2004)
-
-
Zhang, X.1
Park, J.2
Pahisi-Presicce, F.3
Sandhu, R.S.4
-
32
-
-
33745450500
-
Formal model and policy specification of usage control
-
ZHANG, X., PARISI-PRESICCE, F., SANDHU, R. S., AND PARK, J. 2005. Formal model and policy specification of usage control. ACM Transactions on Information and System Security 8, 351-387.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, pp. 351-387
-
-
Zhang, X.1
Parisi-Presicce, F.2
Sandhu, R.S.3
Park, J.4
|