-
1
-
-
34147200848
-
-
M. Weiser, The computer for the 21st century, Scientific American 265 (9) (1991) 66-75.
-
-
-
-
3
-
-
0031346670
-
-
D.R. Kuhn, Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems, in: Second ACM Workshop on Role-Based Access Control, 1997.
-
-
-
-
4
-
-
0031682433
-
-
V.D. Gligor, S.I. Gavrila, D. Ferraiolo, On the formal definition of separation-of-duty policies and their composition. in: IEEE Symposium on Security and Privacy, May, 1998.
-
-
-
-
5
-
-
20244366652
-
The vision and technical foundations of ubiquitous computing
-
Mattern T. The vision and technical foundations of ubiquitous computing. UPGRADE 11 5 (2001)
-
(2001)
UPGRADE
, vol.11
, Issue.5
-
-
Mattern, T.1
-
6
-
-
0030086382
-
Role-based access control models
-
Sandhu R.S., Coynek E.J., Feinsteink H.L., and Youmank C.E. Role-based access control models. IEEE Computer 29 2 (1996) 38-47
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coynek, E.J.2
Feinsteink, H.L.3
Youmank, C.E.4
-
7
-
-
0033652039
-
-
R. Sandhu, D. Ferraiolo, R. Kuhn, The NIST model for role-base access control-toward a unified standard, in: Proceedings, 5th ACM Workshop on Role Based Access Control, July, 2000, pp. 26-27.
-
-
-
-
8
-
-
34147218081
-
-
J. Zao, H. Wee, J. Chu, D. Jackson, RBAC Schema Verification Using Lightweight Formal Model and Constraint Analysis, MIT, Cambridge, 2002.
-
-
-
-
9
-
-
84893084758
-
-
L. Kagal, T. Finin, A. Joshi, A policy language for a pervasive computing environment, in: Proceedings of IEEE 4th International Workshop on Policies for Distributed Systems and Networks, Italy, June, 2003.
-
-
-
-
10
-
-
27544445065
-
-
D.K.W. Chiu, P.C.K. Hung, Privacy and access control issues in financial enterprise content management. HICSS, 2005.
-
-
-
-
11
-
-
2442622092
-
Representation and reasoning for DAML-based policy and domain services in KAoS and Nomads
-
ACM Press, Melbourne, Australia, New York
-
Bradshaw J.M., et al. Representation and reasoning for DAML-based policy and domain services in KAoS and Nomads. Proceedings of the Autonomous Agents and Multi-Agent Systems Conference (AAMAS 2003) (2003), ACM Press, Melbourne, Australia, New York
-
(2003)
Proceedings of the Autonomous Agents and Multi-Agent Systems Conference (AAMAS 2003)
-
-
Bradshaw, J.M.1
-
12
-
-
33745685859
-
-
R. Montanari et al., Context-based security management for multi-agent systems, in: Second IEEE Symposium on Multi-Agent Security and Survivability, 2005.
-
-
-
-
13
-
-
33845740756
-
-
N. Sriharee et al., On using WS-policy, ontology, and rule reasoning to discover web services, INTELLCOMM 2004 (2004) 246-255.
-
-
-
-
14
-
-
84956993736
-
-
G.-J. Ahn, R. Sandhu, Role-based authorization constraints specification, ACM Transactions on Information and System Security 3 (4) (2000) 207-226.
-
-
-
-
15
-
-
14844297758
-
-
N. Li, Z. Bizri, M.V. Tripunitara, On mutually-exclusive roles and separation of duty, in: Proceedings of the 11th ACM conference on Computer and Communications Security, Washington DC, USA, October 2004, pp. 25-29.
-
-
-
-
16
-
-
1542305463
-
-
C.-J. Moon, D.-H. Park, S.-J. Park, D.-K. Baik, Symmetric RBAC model that takes the separation of duty and role hierarchies into consideration, Computers and Security 23 (2) (2004).
-
-
-
-
18
-
-
79551602978
-
-
T. Berners-Lee, J. Hendler, O. Lassila, The semantic web, Scientific American 284 (5) (2001) 34-43.
-
-
-
-
19
-
-
34147213489
-
-
S. Bechhofer, F. vanHarmelen, J. Hendler, et al. OWL web ontology language reference, W3C Recommendation (2004), .
-
-
-
-
20
-
-
34147205804
-
-
T. Strang, et al., A context modeling survey, in: UbiComp 1st International Workshop on Advanced Context Modelling Reasoning and Management, Nottingham, 2004, pp. 34-41.
-
-
-
-
21
-
-
35048848479
-
Visual modeling of OWL DL ontologies using UML
-
Springer, Hiroshima, Japan
-
Brockmans S., Volz R., Eberhart A., and Loeffler P. Visual modeling of OWL DL ontologies using UML. Proceedings of the Third International Semantic Web Conference (2004), Springer, Hiroshima, Japan 198-213
-
(2004)
Proceedings of the Third International Semantic Web Conference
, pp. 198-213
-
-
Brockmans, S.1
Volz, R.2
Eberhart, A.3
Loeffler, P.4
-
22
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Ferraiolo D.F., Sandhu R., Gavrila S., Kuhn D.R., and Chandramouli R. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security 4 3 (2001) 224-274
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
23
-
-
34147192772
-
-
.
-
-
-
-
26
-
-
34147195560
-
-
M.E. Shin, G.-J. Ahn, UML-based representation of role-based access control, Enabling Technologies: Infrastructure for Collaborative Enterprises, 2000 (WET ICE 2000).
-
-
-
-
29
-
-
0003727420
-
-
Baader F., Calvanese D., McGuinness D., Nardi D., and Patel-Schneider P. (Eds), Cambridge University Press, Cambridge
-
In: Baader F., Calvanese D., McGuinness D., Nardi D., and Patel-Schneider P. (Eds). The Description Logic HandBook (2002), Cambridge University Press, Cambridge
-
(2002)
The Description Logic HandBook
-
-
|