-
2
-
-
0347720836
-
An adaptive policy based framework for network services management
-
Plenum Press
-
L. Lymberopoulos, E. Lupu, and M. Sloman, An adaptive policy based framework for network services management, Journal of Network and Systems Management, Vol. 11, No. 3, pp. 277-303, 2003, Plenum Press.
-
(2003)
Journal of Network and Systems Management
, vol.11
, Issue.3
, pp. 277-303
-
-
Lymberopoulos, L.1
Lupu, E.2
Sloman, M.3
-
3
-
-
35248856852
-
Rule-based systems security model
-
Springer-Verlag Press
-
M. Smirnov, Rule-based systems security model. In Proc. of MMM-ACNS, pp. 135-146, 2003, Springer-Verlag Press.
-
(2003)
Proc. of MMM-ACNS
, pp. 135-146
-
-
Smirnov, M.1
-
4
-
-
84964853055
-
Access control: Policies, models, and mechanism
-
R. Focardi and F. Gorrieri eds, Foundations of Security Analysis and Design, of, Springer-Verlag Press
-
S. De Capitani di Vimercati and P. Samarati, Access control: Policies, models, and mechanism. In R. Focardi and F. Gorrieri (eds.), Foundations of Security Analysis and Design, Vol. 2171 of LNCS. Springer-Verlag Press, 2001.
-
(2001)
LNCS
, vol.2171
-
-
De Capitani di Vimercati, S.1
Samarati, P.2
-
5
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models, IEEE Computer, Vol. 39, No. 2, pp. 38-47, 1996.
-
(1996)
IEEE Computer
, vol.39
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
6
-
-
0003593599
-
-
SPKI, IETF RFC 2693. Available from
-
SPKI, SPKI certificate theory, 1999. IETF RFC 2693. Available from http://www.ietf.org/rfc/rfc2693.txt.
-
(1999)
SPKI certificate theory
-
-
-
7
-
-
62349090353
-
RT: A role-based trust-management framework
-
IEEE press
-
N. Li and J. C. Mitchell, RT: A role-based trust-management framework. In Proc. of DISCEX III Conf., pp. 201-212, 2003, IEEE press.
-
(2003)
Proc. of DISCEX III Conf
, pp. 201-212
-
-
Li, N.1
Mitchell, J.C.2
-
8
-
-
0036311802
-
A unified framework for regulating access and information release on the web
-
PP
-
P. Bonatti and P. Samarati, A unified framework for regulating access and information release on the web, Journal of Computer Security, Vol. 10, No. 3, PP. 241-272, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.1
Samarati, P.2
-
9
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
T. Yu, M. Winslett, and K. E. Seamons, Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation, ACM Transactions on Information and System Security, Vol. 6, No. 1, pp. 1-42, 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
10
-
-
0038148412
-
A unified scheme for resource protection in automated trust negotiation
-
May IEEE press
-
T. Yu and M. Winslett, A unified scheme for resource protection in automated trust negotiation. In Proc. IEEE Symposium on Security and Privacy, pp. 110-122, May 2003 IEEE press.
-
(2003)
Proc. IEEE Symposium on Security and Privacy
, pp. 110-122
-
-
Yu, T.1
Winslett, M.2
-
12
-
-
33748042046
-
Interactive credential negotiation for stateful business processes
-
Springer-Verlag Press
-
H. Koshutanski and F. Massacci, Interactive credential negotiation for stateful business processes. In Proc. of In Proc. Conference, pp. 257-273, 2005, Springer-Verlag Press.
-
(2005)
Proc. of In Proc. Conference
, pp. 257-273
-
-
Koshutanski, H.1
Massacci, F.2
-
13
-
-
84864174077
-
Abduction and deduction in logic programming for access control for autonomic systems
-
Tech. Report, DIT-05-053, University of Trento, July
-
H. Koshutanski and F. Massacci, Abduction and deduction in logic programming for access control for autonomic systems. Tech. Report, DIT-05-053, University of Trento, July 2005. http://eprints.biblio.unitn.it/archive/ 00000821/0l/053.pdf.
-
(2005)
-
-
Koshutanski, H.1
Massacci, F.2
|