-
1
-
-
84957006898
-
Access control and trust in the use of widely distributed services
-
Springer-Verlag, New York
-
Bacon, J., Moody, K., and Yao, W. Access control and trust in the use of widely distributed services. In Middleware 2001, Vol. 2218 of Lecture Notes in Computer Science. Springer-Verlag, New York, 2001, 300-315.
-
(2001)
Middleware 2001, Vol. 2218 of Lecture Notes in Computer Science
, pp. 300-315
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
2
-
-
33947157642
-
-
Bhatti, R., Bertino, K., and Ghafoor, A. X-FEDERATE: A policy engineering framework for federated access management. IEEE Transactions on Software 32, 5 (May 2006), 330-346.
-
Bhatti, R., Bertino, K., and Ghafoor, A. X-FEDERATE: A policy engineering framework for federated access management. IEEE Transactions on Software 32, 5 (May 2006), 330-346.
-
-
-
-
3
-
-
23244445557
-
-
Bhatti, R., Joshi, J., Bertino, E., and Ghafoor, A. X-GTRBAC: An XML-based policy specification framework and architecture for enterprisewide access control. ACM Transactions on Information and System Security 8, 2 (May 2005), 187-227.
-
Bhatti, R., Joshi, J., Bertino, E., and Ghafoor, A. X-GTRBAC: An XML-based policy specification framework and architecture for enterprisewide access control. ACM Transactions on Information and System Security 8, 2 (May 2005), 187-227.
-
-
-
-
4
-
-
84957800809
-
KeyNote: Trust management for public-key infrastructures
-
Cambridge, U.K, Apr. 15-17, Springer, New York
-
Blaze, M., Feigenbaum, J., and Keromytis, A. KeyNote: Trust management for public-key infrastructures. In Proceedings of the Sixth International Workshop on Security Protocols (Cambridge, U.K., Apr. 15-17). Springer, New York, 1998, 59-63.
-
(1998)
Proceedings of the Sixth International Workshop on Security Protocols
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.3
-
5
-
-
1142265580
-
Identity management (guest editors' introduction)
-
Nov.-Dec
-
Buell, D. and Sandhu, R. Identity management (guest editors' introduction). IEEE Internet Computing 7, 6 (Nov.-Dec. 2003), 26-28.
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.6
, pp. 26-28
-
-
Buell, D.1
Sandhu, R.2
-
6
-
-
78651460476
-
Using SAML to link the Globus Toolkit to the PERMIS authorization infrastructure
-
Windermere, U.K, Sept. 15-18, Springer, New York
-
Chadwick, D., Otenko, S., and Welch, V. Using SAML to link the Globus Toolkit to the PERMIS authorization infrastructure. In Proceedings of the Eighth Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (Windermere, U.K., Sept. 15-18). Springer, New York, 2004, 251-262.
-
(2004)
Proceedings of the Eighth Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security
, pp. 251-262
-
-
Chadwick, D.1
Otenko, S.2
Welch, V.3
-
7
-
-
0002817535
-
The PERMIS X.509 role-based privilege-management infrastructure
-
Monterey, CA, June 3-4, ACM Press, New York
-
Chadwick, D. and Otenko, A. The PERMIS X.509 role-based privilege-management infrastructure. In Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies (Monterey, CA, June 3-4). ACM Press, New York, 2002, 135-140.
-
(2002)
Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies
, pp. 135-140
-
-
Chadwick, D.1
Otenko, A.2
-
9
-
-
0033724294
-
Access control meets public key infrastructure: Assigning roles to strangers
-
Oakland, CA, May 14-17, IEEE Press, Piscataway, NJ
-
Herzberg, A., Mass, Y., Mihaeli, J., Naor, D., and Ravid, Y. Access control meets public key infrastructure: Assigning roles to strangers. In Proceedings of the 2000 IEEE Symposium on Security and Privacy (Oakland, CA, May 14-17). IEEE Press, Piscataway, NJ, 2000, 2-14.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
Naor, D.4
Ravid, Y.5
-
10
-
-
0033719386
-
Risks of the Passport Single Sign-on Protocol
-
June
-
Kormann, D. and Rubin, A. Risks of the Passport Single Sign-on Protocol. Computer Networks 33, 6 (June 2000), 51-58.
-
(2000)
Computer Networks
, vol.33
, Issue.6
, pp. 51-58
-
-
Kormann, D.1
Rubin, A.2
-
11
-
-
0036085965
-
Design of a role-based trust-management framework
-
Oakland, CA, May 12-15, IEEE Computer Society Press, Piscataway, NJ
-
Li, N., Mitchell, J., and Winsborough, W. Design of a role-based trust-management framework. In Proceedings of the 2002 IEEE Symposium on Security and Privacy (Oakland, CA, May 12-15). IEEE Computer Society Press, Piscataway, NJ, 2002, 114-130.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.2
Winsborough, W.3
-
12
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Dec
-
Needham, R. and Schroeder, M. Using encryption for authentication in large networks of computers. Commun. ACM 21, 12 (Dec. 1978), 993-999.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
|