-
3
-
-
0016984825
-
Protection in operating systems
-
Harrison MA, Ruzzo WL, Ullman JD. Protection in operating systems. Communications of ACM, 1976,19(8):461-471.
-
(1976)
Communications of ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
4
-
-
0003969633
-
Trusted computer system evaluation criteria (TESEC)
-
Department of Defense. Technical Report, DOD 5200.28-STD
-
Department of Defense. Trusted computer system evaluation criteria (TESEC). Technical Report, DOD 5200.28-STD, 1985.
-
(1985)
-
-
-
6
-
-
0030086382
-
Role-Based access control models
-
Sandhu R, Coyne EJ, Feinstein HL, Youman CE. Role-Based access control models. IEEE Computer, 1996,29(2):38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
7
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
Sandhu R, Bhamidipati V, Munawer Q. The ARBAC97 model for role-based administration of roles. ACM Trans. on Information and System Security (TISSEC), 1999,2(1):105-135.
-
(1999)
ACM Trans. on Information and System Security (TISSEC)
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
8
-
-
84977755884
-
The ARBAC99 model for administration of roles
-
Washington: IEEE Computer Society
-
Sandhu R, Munawer Q. The ARBAC99 model for administration of roles. In: Proc. of the 15th Annual Computer Security Applications Conf. Washington: IEEE Computer Society, 1999. 229-238. http://www.list.gmu.edu/confrnc/acsac/acsac99(org).pdf
-
(1999)
Proc. of the 15th Annual Computer Security Applications Conf.
, pp. 229-238
-
-
Sandhu, R.1
Munawer, Q.2
-
9
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Ferraiolo DF, Sandhu R, Gavrila S. Proposed NIST standard for role-based access control. ACM Trans. on Information and Systems Security (TISSEC), 2001,4(3):224-274.
-
(2001)
ACM Trans. on Information and Systems Security (TISSEC)
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
-
10
-
-
0002841051
-
Task-Based authentication control (TBAC): A family of models for active an enterprise-oriented authentication management
-
California
-
Thomas RK, Sandhu RS. Task-Based authentication control (TBAC): A family of models for active an enterprise-oriented authentication management. In: Proc. of the 11th IFIP Conf. on Database Security. California, 1997. 11-13. http://www.list.gmu.edu/confrnc/ifip/i97tbac.pdf
-
(1997)
Proc. of the 11th IFIP Conf. on Database Security
, pp. 11-13
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
11
-
-
0038825675
-
Task-Role-Based access control model
-
Oh S, Park S. Task-Role-Based access control model. Information System, 2003,28(6):533-562.
-
(2003)
Information System
, vol.28
, Issue.6
, pp. 533-562
-
-
Oh, S.1
Park, S.2
-
15
-
-
61849106857
-
Condor high throughput computing
-
Condor high throughput computing. 2006. http://www.cs.wise.edu/condor/
-
(2006)
-
-
-
16
-
-
34249288542
-
Legion, a worldwide virtual computer
-
Legion Research Group of the University of Virginia
-
Legion Research Group of the University of Virginia. Legion, a worldwide virtual computer. 2005. http://legion.virginia.edu/
-
(2005)
-
-
-
17
-
-
34249306077
-
Globus project: Globus toolkit
-
Globus project: Globus toolkit. 2006. http://www.globus.org/
-
(2006)
-
-
-
20
-
-
30644473909
-
Adaptive trust negotiation and access control
-
New York: ACM Press
-
Ryutov T, Zhou L, Neuman C, Leithead T, Seamons K. Adaptive trust negotiation and access control. In: Proc. of the 10th Symp. on Access Control Models and Technologies (SACMAT 2005). New York: ACM Press, 2005. 139-146.
-
(2005)
Proc. of the 10th Symp. on Access Control Models and Technologies (SACMAT 2005)
, pp. 139-146
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Leithead, T.4
Seamons, K.5
-
21
-
-
11844265607
-
Towards an access control system for mobile peer-to-peer collaborative environments
-
IEEE Computer Society
-
Fenkam P, Dustdar S, Kirda E, Reif G, Gall H. Towards an access control system for mobile peer-to-peer collaborative environments. In: Proc. of the IEEE 11th Int'l Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002). IEEE Computer Society, 2002. 95-102.
-
(2002)
Proc. of the IEEE 11th Int'l Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002)
, pp. 95-102
-
-
Fenkam, P.1
Dustdar, S.2
Kirda, E.3
Reif, G.4
Gall, H.5
-
24
-
-
0242624675
-
A reputation-based trust model for peer-to-peer ecommerce communities
-
New York: ACM Press
-
Xing L, Liu L. A reputation-based trust model for peer-to-peer ecommerce communities. In: Proc. of the ACM Conf. on Electronic Commerce. New York: ACM Press, 2003. 228-229.
-
(2003)
Proc. of the ACM Conf. on Electronic Commerce
, pp. 228-229
-
-
Xing, L.1
Liu, L.2
-
31
-
-
24944496397
-
DoS-Resistant access control protocol with identity confidentiality for wireless networks
-
IEEE Press
-
Wan ZG, Zhu B, Deng RH, Bao F, Ananda AL. DoS-Resistant access control protocol with identity confidentiality for wireless networks. In: Proc. of the 6th IEEE Wireless Communications and Networking Conf. IEEE Press, 2005. 1521-1526.
-
(2005)
Proc. of the 6th IEEE Wireless Communications and Networking Conf.
, pp. 1521-1526
-
-
Wan, Z.G.1
Zhu, B.2
Deng, R.H.3
Bao, F.4
Ananda, A.L.5
-
33
-
-
20444411497
-
Research on trustworthy networks
-
Chinese source
-
Lin C, Peng XH. Research on trustworthy networks. Chinese Journal of Computers, 2005,28(5):751-758 (in Chinese with English abstract).
-
(2005)
Chinese Journal of Computers
, vol.28
, Issue.5
, pp. 751-758
-
-
Lin, C.1
Peng, X.H.2
-
34
-
-
0141862713
-
The meanings of trust
-
Technical Report, TR94-04, University of Minnesota
-
Mcknight D, Chervany N. The meanings of trust. Technical Report, TR94-04, University of Minnesota, 1996.
-
(1996)
-
-
Mcknight, D.1
Chervany, N.2
-
35
-
-
85113133621
-
CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks
-
Portoroz
-
Michiardi P, Molva R. CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks. In: Proc. of the 6th IFIP Conf. on Communications and Multimedia Security. Portoroz, 2002. http://portal.acm.org/citation.cfm-id=647802.737297
-
(2002)
Proc. of the 6th IFIP Conf. on Communications and Multimedia Security
-
-
Michiardi, P.1
Molva, R.2
-
41
-
-
33646831908
-
TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks
-
New York: ACM Press
-
Srivatsa M, Xiong L, Liu L. TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks. In: Proc. of the 14th World Wide Web Conf. New York: ACM Press, 2005. 422-431.
-
(2005)
Proc. of the 14th World Wide Web Conf.
, pp. 422-431
-
-
Srivatsa, M.1
Xiong, L.2
Liu, L.3
-
43
-
-
77953066525
-
Choosing reputable servents in a P2P network
-
New York: ACM Press
-
Cornelli F, Damiani E, Vimercati SDCD, Paraboschi S, Samarati S. Choosing reputable servents in a P2P network. In: Proc. of the 11th World Wide Web Conf. New York: ACM Press, 2002. 376-386.
-
(2002)
Proc. of the 11th World Wide Web Conf.
, pp. 376-286
-
-
Cornelli, F.1
Damiani, E.2
Vimercati, S.D.C.D.3
Paraboschi, S.4
Samarati, S.5
|