-
1
-
-
23244445557
-
X-GTRBAC: An XML-Based Policy Specification Framework and Architecture for Enterprise-Wide Access Control
-
R. Bhatti, J.B.D. Joshi, E. Bertino, and A. Ghafoor, "X-GTRBAC: An XML-Based Policy Specification Framework and Architecture for Enterprise-Wide Access Control," ACM Trans. Information and System Security (TISSEC), vol. 8, no. 2, 2005.
-
(2005)
ACM Trans. Information and System Security (TISSEC)
, vol.8
, Issue.2
-
-
Bhatti, R.1
Joshi, J.B.D.2
Bertino, E.3
Ghafoor, A.4
-
2
-
-
4143146358
-
X GTRBAC Admin: A Decentralized Administration Model for Enterprise Wide Access Control
-
June
-
R. Bhatti, J.B.D. Joshi, E. Bertino, and A. Ghafoor, "X GTRBAC Admin: A Decentralized Administration Model for Enterprise Wide Access Control," Proc. Ninth ACM Symp. Access Control Models and Technologies, June 2004.
-
(2004)
Proc. Ninth ACM Symp. Access Control Models and Technologies
-
-
Bhatti, R.1
Joshi, J.B.D.2
Bertino, E.3
Ghafoor, A.4
-
3
-
-
84957800809
-
KeyNote: Trust Management for Public-Key Infrastructures
-
M. Blaze, J. Feigenbaum, and A.D. Keromytis, "KeyNote: Trust Management for Public-Key Infrastructures," Proc. Security Protocols Int'l Workshop, pp. 59-63, 1998.
-
(1998)
Proc. Security Protocols Int'l Workshop
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
5
-
-
0023266943
-
A Comparison of Commercial and Military Computer Security Policies
-
Apr
-
D.D. Clark and D.R. Wilson, "A Comparison of Commercial and Military Computer Security Policies," Proc. IEEE Symp. Security and Privacy, pp. 184-194, Apr. 1987.
-
(1987)
Proc. IEEE Symp. Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
7
-
-
0001809810
-
The Ponder Specification Language
-
Jan
-
N. Damianou, N. Dulay, E. Lupu, and M Sloman, "The Ponder Specification Language," Proc. Workshop Policies for Distributed Systems and Networks (Policy2001), Jan. 2001.
-
(2001)
Proc. Workshop Policies for Distributed Systems and Networks (Policy2001)
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
8
-
-
0003981627
-
-
RFC 2692, Internet Eng. Task Force Draft IETF, Sept
-
C.M. Ellison, "SPKI Requirements," RFC 2692, Internet Eng. Task Force Draft IETF, Sept. 1999, http://www.ietf.org/rfc/rfc2692.txt.
-
(1999)
SPKI Requirements
-
-
Ellison, C.M.1
-
9
-
-
33947189414
-
-
T. Fink, M. Koch, and K. Pauls, An MDA Approach to Access Control Specifications Using MOF and Profiles, Proc. First Int'l Workshop Views on Designing Complex Architectures (VODCA), 2004.
-
T. Fink, M. Koch, and K. Pauls, "An MDA Approach to Access Control Specifications Using MOF and Profiles," Proc. First Int'l Workshop Views on Designing Complex Architectures (VODCA), 2004.
-
-
-
-
10
-
-
0033724294
-
Access Control Meets Public Key Infrastructure, or: Assigning Roles to Strangers
-
A. Herzberg, Y. Mass, J. Mihaeli, D. Naor, and Y. Ravid, "Access Control Meets Public Key Infrastructure, or: Assigning Roles to Strangers," Proc. 2000 IEEE Symp. Security and Privacy, pp. 2-14, 2000.
-
(2000)
Proc. 2000 IEEE Symp. Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
Naor, D.4
Ravid, Y.5
-
11
-
-
11044223672
-
An Access Control Language for Multi-Domain Environments
-
Nov./Dec
-
J.B.D. Joshi, R. Bhatti, E. Bertino, and A. Ghafoor, "An Access Control Language for Multi-Domain Environments," IEEE Internet Computing, vol. 8, no. 6, pp. 40-50, Nov./Dec. 2004.
-
(2004)
IEEE Internet Computing
, vol.8
, Issue.6
, pp. 40-50
-
-
Joshi, J.B.D.1
Bhatti, R.2
Bertino, E.3
Ghafoor, A.4
-
12
-
-
17444406680
-
Generalized Temporal Role Based Access Control Model (GTRBAC)
-
Jan
-
J.B.D. Joshi, E. Bertino, U. Latif, and A. Ghafoor, "Generalized Temporal Role Based Access Control Model (GTRBAC)," IEEE Trans. Knowledge and Data Eng., vol. 17, no. 1, Jan. 2005.
-
(2005)
IEEE Trans. Knowledge and Data Eng
, vol.17
, Issue.1
-
-
Joshi, J.B.D.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
15
-
-
84942257511
-
The STRONGMAN Architecture
-
Apr
-
A. Keromytis, S. Ioannidis, M. Greenwald, and J. Smith, "The STRONGMAN Architecture," Proc. Third DARPA Information Survivability Conf. and Exposition (DISCEX III), Apr. 2003.
-
(2003)
Proc. Third DARPA Information Survivability Conf. and Exposition (DISCEX III)
-
-
Keromytis, A.1
Ioannidis, S.2
Greenwald, M.3
Smith, J.4
-
17
-
-
79955143136
-
SecureUML: A UMLbased Modeling Language for Model-Driven Security
-
T. Lodderstedt, D.A. Basin, and J. Doser, "SecureUML: A UMLbased Modeling Language for Model-Driven Security," Proc. Fifth Int'l Conf. Unified Modeling Language, pp. 426-441, 2002.
-
(2002)
Proc. Fifth Int'l Conf. Unified Modeling Language
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.A.2
Doser, J.3
-
18
-
-
0033333334
-
Conflicts in Policy-Based Distributed Systems Management
-
Nov./Dec
-
E. Lupu and M. Sloman, "Conflicts in Policy-Based Distributed Systems Management," IEEE Trans. Software Eng., vol. 25, no. 6, Nov./Dec. 1999.
-
(1999)
IEEE Trans. Software Eng
, vol.25
, Issue.6
-
-
Lupu, E.1
Sloman, M.2
-
19
-
-
0347720836
-
An Adaptive Policy Based Management Framework for Network Services Management, J
-
Sept
-
L. Lymberopoulos, E. Lupu, and M. Sloman, "An Adaptive Policy Based Management Framework for Network Services Management," J. Networks and Systems Management, special issue on policy based management of networks and services, vol. 11, no. 3, Sept. 2003.
-
(2003)
Networks and Systems Management
, vol.11
, Issue.3
-
-
Lymberopoulos, L.1
Lupu, E.2
Sloman, M.3
-
20
-
-
0030086382
-
Role-Based Access Control Models
-
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, "Role-Based Access Control Models," Computer, vol. 29, no. 2, pp. 38-47, 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
22
-
-
2942654406
-
Certificate-Based Authorization Policy in a PKI Environment
-
Nov
-
M. Thompson, A. Essiari, and S. Mudumbai, "Certificate-Based Authorization Policy in a PKI Environment," ACM Trans. Information and System Security, (TISSEC), vol. 6, no. 4, pp. 566-588, Nov. 2003.
-
(2003)
ACM Trans. Information and System Security, (TISSEC)
, vol.6
, Issue.4
, pp. 566-588
-
-
Thompson, M.1
Essiari, A.2
Mudumbai, S.3
-
23
-
-
1642632086
-
Consistency Analysis of UML Class and Sequence Diagrams Based on Attributed Typed Graphs and Their Transformation
-
Technical Report No. 2000/3, Technische Universität Berlin, Mar
-
A. Tsiolakis, "Consistency Analysis of UML Class and Sequence Diagrams Based on Attributed Typed Graphs and Their Transformation," Technical Report No. 2000/3, Technische Universität Berlin, Mar. 2000.
-
(2000)
-
-
Tsiolakis, A.1
-
24
-
-
25844511227
-
Automatic Inclusion of Middleware Performance Attributes into Architectural UML Software Models
-
Aug
-
T. Verdickt, B. Dhoedt, F. Gielen, and P. Demeester, "Automatic Inclusion of Middleware Performance Attributes into Architectural UML Software Models," IEEE Trans. Software Eng., vol. 31, no. 8, Aug. 2005.
-
(2005)
IEEE Trans. Software Eng
, vol.31
, Issue.8
-
-
Verdickt, T.1
Dhoedt, B.2
Gielen, F.3
Demeester, P.4
-
26
-
-
33947171794
-
-
Department of Defense Directive No. 8320.2, Dec. 2004, http://www.fas.org/irp/doddir/dod/d8320_2.pdf.
-
Department of Defense Directive No. 8320.2, Dec. 2004, http://www.fas.org/irp/doddir/dod/d8320_2.pdf.
-
-
-
-
28
-
-
33947141761
-
-
OASIS SAML
-
OASIS SAML, http://xml.coverpages.org/saml.html, 2004.
-
(2004)
-
-
-
29
-
-
33947187105
-
-
OASIS XACML
-
OASIS XACML, http://www.oasis-open.org/committees/tc_home.php?wg_abbrev= xacml, 2005.
-
(2005)
-
-
-
30
-
-
33947106303
-
-
Web Services Roadmap, http://www-128.ibm.com/developerworks/library/ specification/ws-secmap/, 2002.
-
(2002)
Web Services Roadmap
-
-
-
31
-
-
33947178738
-
-
Shibboleth, http://shibboleth.internet2.edu/docs/draft-mace-shibboleth- arch-protocols-latest.pdf, 2001.
-
(2001)
Shibboleth
-
-
-
32
-
-
33947126347
-
-
Alliance
-
Liberty Alliance, http://www.projectliberty.org/resources/specifications. php, 2005.
-
(2005)
Liberty
-
-
-
33
-
-
33947152782
-
-
Resource Access Decision (RAD), Version 1,0, Object Management Group, 2001.
-
Resource Access Decision (RAD), Version 1,0, Object Management Group, 2001.
-
-
-
|