-
1
-
-
0031861856
-
Network topologies and virtual place
-
Adams, P., "Network Topologies and Virtual Place," Annals of the Association of American Geographers, Vol. 88, No. 1, 1998, pp. 88-106.
-
(1998)
Annals of the Association of American Geographers
, vol.88
, Issue.1
, pp. 88-106
-
-
Adams, P.1
-
2
-
-
0036041342
-
A task-based security model to facilitate collaboration in trusted multi-agency networks
-
Madrid, Spain, March 11-14
-
Aljareh, S. and N. Rossiter, "A Task-based Security Model to facilitate Collaboration in Trusted Multi-agency Networks," Proceedings of the 2002 ACM symposium on Applied computing, Madrid, Spain, March 11-14, 2002, pp. 744-749.
-
(2002)
Proceedings of the 2002 ACM Symposium on Applied Computing
, pp. 744-749
-
-
Aljareh, S.1
Rossiter, N.2
-
3
-
-
8644259247
-
Mechanisms for controlling access in the global grid environment
-
Angelis, G., S. Gritzalis, and C. Lambrinoudakis, "Mechanisms for Controlling Access in the Global Grid Environment," Internet Research, Vol. 14, No. 5, 2004, pp. 347-352.
-
(2004)
Internet Research
, vol.14
, Issue.5
, pp. 347-352
-
-
Angelis, G.1
Gritzalis, S.2
Lambrinoudakis, C.3
-
4
-
-
84968461696
-
Protecting information on the web
-
Bertino, E., E. Pagani, G. Rossi, and P. Samarati, "Protecting Information on the Web," Communications of the ACM, Vol. 43, No. 11, 2000, pp. 189-198.
-
(2000)
Communications of the ACM
, vol.43
, Issue.11
, pp. 189-198
-
-
Bertino, E.1
Pagani, E.2
Rossi, G.3
Samarati, P.4
-
5
-
-
0013080980
-
-
Addison-Wesley, Boston, MA, US
-
Bishop, M.., "COMPUTER SECURITY, ART AND SCIENCE," Addison-Wesley, Boston, MA, US.
-
Computer Security, Art and Science
-
-
Bishop, M.1
-
6
-
-
21944443795
-
CRUD matrices for detailed object oriented design
-
Brandon, D., "CRUD Matrices for Detailed Object Oriented Design," Journal of Computing Sciences in Colleges, Vol. 18, No. 2, 2002, pp. 306-322.
-
(2002)
Journal of Computing Sciences in Colleges
, vol.18
, Issue.2
, pp. 306-322
-
-
Brandon, D.1
-
8
-
-
27544456214
-
Designing virtual environments to support cooperation in the real world
-
Crabtree, A., T. Rodden, and J. Mariani, "Designing Virtual Environments to Support Cooperation in the Real World," Virtual Reality, Vol. 6, No. 2, 2002, pp. 63-74.
-
(2002)
Virtual Reality
, vol.6
, Issue.2
, pp. 63-74
-
-
Crabtree, A.1
Rodden, T.2
Mariani, J.3
-
9
-
-
0038343548
-
Access control: Principles and solutions
-
De Capitani di Vimercati, S., S. Paraboschi, and P. Samarati, "Access Control: Principles and Solutions," Software-Practice and Experience, Vol. 33, No. 5, 2002, pp. 397-421.
-
(2002)
Software-practice and Experience
, vol.33
, Issue.5
, pp. 397-421
-
-
De Capitani Di Vimercati, S.1
Paraboschi, S.2
Samarati, P.3
-
10
-
-
0141911037
-
-
Artech House, Boston, USA
-
Ferraiolo, D. F., D. R. Kuhn and R. Chandramouli, ROLE-BASED ACCESS CONTROLS, Artech House, Boston, USA, 2003.
-
(2003)
Role-based Access Controls
-
-
Ferraiolo, D.F.1
Kuhn, D.R.2
Chandramouli, R.3
-
11
-
-
0010410660
-
Toward a unified view of electronic commerce, electronic business, and collaborative commerce: A knowledge management approach
-
Holsapple, C. W., M. Singh, "Toward a Unified View of Electronic Commerce, Electronic Business, and Collaborative Commerce: A Knowledge Management Approach," Knowledge and Process Management, Vol. 7, No. 3, 2000, pp. 151-164.
-
(2000)
Knowledge and Process Management
, vol.7
, Issue.3
, pp. 151-164
-
-
Holsapple, C.W.1
Singh, M.2
-
12
-
-
0000206310
-
Security models for web-based applications
-
Joshi, J., W. Aref, A. Ghafoor, and E. Spafford, "Security Models for Web-based Applications," Communications of the ACM, Vol. 44, No. 2, 2001, pp. 38-44.
-
(2001)
Communications of the ACM
, vol.44
, Issue.2
, pp. 38-44
-
-
Joshi, J.1
Aref, W.2
Ghafoor, A.3
Spafford, E.4
-
13
-
-
77952407814
-
Organization based access control
-
Lake Como, Italy, June 4-6
-
Kalam, A. A. E., R. E. Baida, P. Balbiani and S. Benferhat et al, "Organization Based Access Control," Proceedings of the Fourth IEEE International Workshop on Policies for Distributed Systems and Networks, Lake Como, Italy, June 4-6, 2003, pp. 120-134.
-
(2003)
Proceedings of the Fourth IEEE International Workshop on Policies for Distributed Systems and Networks
, pp. 120-134
-
-
Kalam, A.A.E.1
Baida, R.E.2
Balbiani, P.3
Benferhat, S.4
-
14
-
-
0036040733
-
A framework for analyzing e-commerce security
-
Kesh, S., S, Ramanujan, and S. Nerur, "A Framework for Analyzing E-Commerce Security," Information Management and Computer Security, Vol. 10, No. 4, 2002, pp. 149-158.
-
(2002)
Information Management and Computer Security
, vol.10
, Issue.4
, pp. 149-158
-
-
Kesh, S.1
Ramanujan, S.2
Nerur, S.3
-
15
-
-
33845583957
-
Frameworks for a human centered collaborative commerce system
-
Budapest, Hungary, July 24-27, Accepted
-
Kim, S. Y., and W. W. Smari, "Frameworks for a Human Centered Collaborative Commerce System," World Automation Congress (WAC2006), International Symposium on Soft Computing for Industry (ISSCI 2006), Budapest, Hungary, July 24-27, 2006, Accepted.
-
(2006)
World Automation Congress (WAC2006), International Symposium on Soft Computing for Industry (ISSCI 2006)
-
-
Kim, S.Y.1
Smari, W.W.2
-
16
-
-
33845510100
-
On a collaborative commerce framework and architecture for next generation commerce
-
Saint Louis, MO, USA, May 15-20
-
Kim, S. Y., and W. W. Smari, "On a Collaborative Commerce Framework and Architecture for Next Generation Commerce," The 2005 International Symposium on Collaborative Technologies and Systems, Saint Louis, MO, USA, May 15-20, 2005, pp. 282-289.
-
(2005)
The 2005 International Symposium on Collaborative Technologies and Systems
, pp. 282-289
-
-
Kim, S.Y.1
Smari, W.W.2
-
17
-
-
16244393735
-
Toward an integrated human-centered knowledge-based collaborative decision making system
-
November 8-10, Las Vegas, Nevada, USA
-
Kim, S.Y., A. Godbole, R. Huang, R. Panchadhar, and W. Smari, "Toward an Integrated Human-centered Knowledge-based Collaborative Decision Making System," The 2004 IEEE International Conference on Information Reuse and Integration, November 8-10, 2004, Las Vegas, Nevada, USA, pp. 394-401.
-
(2004)
The 2004 IEEE International Conference on Information Reuse and Integration
, pp. 394-401
-
-
Kim, S.Y.1
Godbole, A.2
Huang, R.3
Panchadhar, R.4
Smari, W.5
-
18
-
-
0002696308
-
Experience with personalization on yahoo!
-
Manber, U. A. Patel, and J. Robison, "Experience with Personalization on Yahoo!," Communications of the ACM, Vol. 43, No. 8, 2000, pp. 35-39.
-
(2000)
Communications of the ACM
, vol.43
, Issue.8
, pp. 35-39
-
-
Manber, U.A.P.1
Robison, J.2
-
19
-
-
0038825675
-
Task-role-based access control model
-
Oh, S. and S. Park, "Task-role-based access control model," Information Systems 28, 2003, pp. 533-562.
-
(2003)
Information Systems
, vol.28
, pp. 533-562
-
-
Oh, S.1
Park, S.2
-
20
-
-
33845580321
-
Pushing the digital frontier: Insights into the changing landscape of e-business
-
Pal, P., and J. Ray (ed.), New York
-
Pal, P., and J. Ray (ed.), PUSHING THE DIGITAL FRONTIER: INSIGHTS INTO THE CHANGING LANDSCAPE OF E-BUSINESS, AMACOM Books, New York, 2001.
-
(2001)
AMACOM Books
-
-
-
21
-
-
0031622611
-
WebGroup: A secure group access control tool for the world-wide web
-
Stanford University, California, USA, June 17-19
-
Petitcolas, F. A. P. and K. Zhang, "WebGroup: A Secure Group Access Control Tool for the World-Wide Web," IEEE 7th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 98), Stanford University, California, USA, June 17-19, 1998, pp. 301-305.
-
(1998)
IEEE 7th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 98)
, pp. 301-305
-
-
Petitcolas, F.A.P.1
Zhang, K.2
-
22
-
-
33845564758
-
-
IBM Corp., Armonk, NY, Last accessed 27 June 2005
-
Saha, A., "Application Framework for E-business: Portals," IBM Corp., Armonk, NY, 1999, Available at: http://www-128.ibm.com/developerworks/ web/library/waportals/, Last accessed 27 June 2005.
-
(1999)
Application Framework for e-business: Portals
-
-
Saha, A.1
-
23
-
-
0030086382
-
Role-based access control models
-
Sandhu, R., E. Coyne, H. Feinstein, and C. Youman, "Role-based Access Control Models," IEEE Computer, Vol. 29, No. 2, 1996, pp. 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
24
-
-
0028513932
-
Access control: Principles and practice
-
Sandhu, R. and P. Samarati, "Access Control: Principles and Practice," IEEE Communications Magazine, Vol. 32, No. 9, 1994, pp. 40-48.
-
(1994)
IEEE Communications Magazine
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
25
-
-
33845585328
-
Toward a distributed collaborative human-centric decision-making system: An information grid approach
-
Kuala Lumpur, Malaysia, November
-
st International Conference on Computers, Communications, and Signal Processing, Kuala Lumpur, Malaysia, November, 2005a, pp. 271-277.
-
(2005)
st International Conference on Computers, Communications, and Signal Processing
, pp. 271-277
-
-
Smari, W.1
McQuay, W.2
Kim, S.3
Godbole, A.4
-
26
-
-
33845584546
-
A framework and a methodology for the design and development of collaborative systems and platforms
-
Honolulu, Hawaii, November
-
th International Conference on Computer Applications in Industry and Engineering, Honolulu, Hawaii, November, 2005b, pp.249-256.
-
(2005)
th International Conference on Computer Applications in Industry and Engineering
, pp. 249-256
-
-
Smari, W.1
McQuay, W.2
Kim, S.3
Godbole, A.4
-
27
-
-
11844281487
-
Portals: Toward an application framework for interoperability
-
Smith, M., "Portals: Toward an Application framework for Interoperability," Communications of the ACM, Vol. 47, No. 10, 2004, pp. 93-97.
-
(2004)
Communications of the ACM
, vol.47
, Issue.10
, pp. 93-97
-
-
Smith, M.1
-
28
-
-
0002841051
-
Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management
-
Lake Tahoe, California, August 11-13
-
Thomas, R. K. and R. S. Sandhu, "Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management," Proceedings of the IFIP WG11.3 Workshop on Database Security, Lake Tahoe, California, August 11-13, 1997, pp. 166-181.
-
(1997)
Proceedings of the IFIP WG11.3 Workshop on Database Security
, pp. 166-181
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
29
-
-
24344501341
-
Access control in collaborative systems
-
Tolone, W., G. Ahn, and T. Pai, "Access Control in Collaborative Systems," ACM Computing Surveys, Vol. 37, No. 1, 2005, pp. 29-41.
-
(2005)
ACM Computing Surveys
, vol.37
, Issue.1
, pp. 29-41
-
-
Tolone, W.1
Ahn, G.2
Pai, T.3
-
30
-
-
33845480524
-
Advanced collaborative technologies supporting the 21st century warfighter in a network centric environment
-
Saint Louis, MO, USA, May 15-20
-
Whitted, G., and M. Just, "Advanced Collaborative Technologies Supporting the 21st Century Warfighter in a Network Centric Environment," The 2005 International Symposium on Collaborative Technologies and Systems, Saint Louis, MO, USA, May 15-20, 2005, pp. 399-406.
-
(2005)
The 2005 International Symposium on Collaborative Technologies and Systems
, pp. 399-406
-
-
Whitted, G.1
Just, M.2
|