-
3
-
-
84956993736
-
-
AHN, G.-J. AND SANDHU, R. 2000. Role-based authorization constraints specification. ACM Transactions on Information and System Security 3, 4 (Nov.), 207-226.
-
AHN, G.-J. AND SANDHU, R. 2000. Role-based authorization constraints specification. ACM Transactions on Information and System Security 3, 4 (Nov.), 207-226.
-
-
-
-
4
-
-
84949747356
-
An authorization model for workflows
-
Proceedings of the Fourth European Symposium on Research in Computer Security. Springer-Verlag London, UK
-
ATLURI, V. AND HUANG, W.-K. 1996. An authorization model for workflows. In Proceedings of the Fourth European Symposium on Research in Computer Security. Springer-Verlag LNCS Volume 1146, London, UK, 44-64.
-
(1996)
LNCS
, vol.1146
, pp. 44-64
-
-
ATLURI, V.1
HUANG, W.-K.2
-
5
-
-
84865788031
-
-
BACON, J., MOODY, K., AND YAO, W. 2002. A model of OASIS role-based access control and its support for active security. ACM Transactions on Information and System Security 5, 4 (Nov.), 492-540.
-
BACON, J., MOODY, K., AND YAO, W. 2002. A model of OASIS role-based access control and its support for active security. ACM Transactions on Information and System Security 5, 4 (Nov.), 492-540.
-
-
-
-
6
-
-
34249667420
-
-
BERTINO, E., FERRARI, E., AND ATLURI, V. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security 2, 1 (Feb.), 65-104.
-
BERTINO, E., FERRARI, E., AND ATLURI, V. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security 2, 1 (Feb.), 65-104.
-
-
-
-
7
-
-
84944792110
-
-
BERTINO, E., BONATTI, P. A., AND FERRARI, E. 2001. TRBAC: A temporal role-based access control model. ACM Transactions on Information and System Security 4, 3 (Aug.), 191-223.
-
BERTINO, E., BONATTI, P. A., AND FERRARI, E. 2001. TRBAC: A temporal role-based access control model. ACM Transactions on Information and System Security 4, 3 (Aug.), 191-223.
-
-
-
-
8
-
-
23244445557
-
X-GTRBAC: An XML-based policy specification framework and architecture for enterprise-wide access control
-
May
-
BHATTI, R., GHAFOOR, A., BERTINO, E., AND JOSHI, J. 2005. X-GTRBAC: An XML-based policy specification framework and architecture for enterprise-wide access control. ACM Transactions on Information and System Security 8, 2 (May), 187-227.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.2
, pp. 187-227
-
-
BHATTI, R.1
GHAFOOR, A.2
BERTINO, E.3
JOSHI, J.4
-
9
-
-
84976749912
-
The specification of process synchronization by path expressions
-
Operating Systems, International Symposium, Rocquencourt, Springer Verlag, London, UK
-
CAMPBELL, R. H. AND HABERMANN, A. N. 1974. The specification of process synchronization by path expressions. In Operating Systems, International Symposium, Rocquencourt. Lecture Notes in Computer Science vol.16, Springer Verlag, London, UK.
-
(1974)
Lecture Notes in Computer Science
, vol.16
-
-
CAMPBELL, R.H.1
HABERMANN, A.N.2
-
10
-
-
0030401694
-
DCWPL: A programming language for describing collaborative work
-
ACM, New York
-
CORTS, M. AND MISHRA, P. 1996. DCWPL: A programming language for describing collaborative work. In. Proceedings of CSCW'96. ACM, New York. 21-29.
-
(1996)
Proceedings of CSCW'96
, pp. 21-29
-
-
CORTS, M.1
MISHRA, P.2
-
13
-
-
3142510989
-
Administrative scope: A foundation for role-based administrative models
-
May
-
CRAMPTON, J. AND LOIZOU, G. 2003. Administrative scope: A foundation for role-based administrative models. ACM Transactions on Information and System. Security 6, 2 (May), 201-231.
-
(2003)
ACM Transactions on Information and System. Security
, vol.6
, Issue.2
, pp. 201-231
-
-
CRAMPTON, J.1
LOIZOU, G.2
-
14
-
-
34249713934
-
User-role based security for collaborative computing environments
-
Summer
-
DEMURJIAN, S., TING, T., AND THURAISINGHAM, B. 1993. User-role based security for collaborative computing environments. Multimedia Review 4, 2 (Summer), 40-47.
-
(1993)
Multimedia Review
, vol.4
, Issue.2
, pp. 40-47
-
-
DEMURJIAN, S.1
TING, T.2
THURAISINGHAM, B.3
-
20
-
-
77952749389
-
SecureFlow: A secure web-enabled workflow management system
-
ACM, New York
-
HUANG, W.-K. AND ATLURI, V. 1999. SecureFlow: A secure web-enabled workflow management system. In ACM Workshop on Role-Based Access Control. ACM, New York. 83-94.
-
(1999)
ACM Workshop on Role-Based Access Control
, pp. 83-94
-
-
HUANG, W.-K.1
ATLURI, V.2
-
22
-
-
0030677524
-
A logical language for expressing authorizations
-
IEEE Computer Society Press, Los Alamitos, CA
-
JAJODIA, S., SAMARATI, P., AND SUBRAHMANIAN, V. S. 1997. A logical language for expressing authorizations. In IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA. 31-42.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 31-42
-
-
JAJODIA, S.1
SAMARATI, P.2
SUBRAHMANIAN, V.S.3
-
23
-
-
0011470804
-
Verifying business processes using Spin
-
JANSSEN, W., MATEESCU, R., MAUW, S., AND SPRINGINTVELD, J. 1998. Verifying business processes using Spin. In Proceedings of 4th International SPIN Workshop.
-
(1998)
Proceedings of 4th International SPIN Workshop
-
-
JANSSEN, W.1
MATEESCU, R.2
MAUW, S.3
SPRINGINTVELD, J.4
-
24
-
-
85137098783
-
-
KOCH, M., MANCINI, L. V., AND PARISI-PHESICCE, F. 2002. A graph-based formalism for RBAC. ACM Transactions on Information and System Security 5, 3 (Aug.), 332-365.
-
KOCH, M., MANCINI, L. V., AND PARISI-PHESICCE, F. 2002. A graph-based formalism for RBAC. ACM Transactions on Information and System Security 5, 3 (Aug.), 332-365.
-
-
-
-
26
-
-
0032258996
-
COCA: Collaborative objects coordination architecture
-
ACM, New York
-
LI, D. AND MUNTZ, R. 1998. COCA: Collaborative objects coordination architecture. In Proceedings of CSCW'98. ACM, New York. 179-188.
-
(1998)
Proceedings of CSCW'98
, pp. 179-188
-
-
LI, D.1
MUNTZ, R.2
-
27
-
-
0036085965
-
Design of a role-based trust management framework
-
IEEE Computer Society Press, Los Alamitos, CA
-
LI, N., MITCHELL, J. C., AND WINSBOROUGH, W. H. 2002. Design of a role-based trust management framework. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos, CA. 114-130.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
LI, N.1
MITCHELL, J.C.2
WINSBOROUGH, W.H.3
-
28
-
-
0038825043
-
Beyond proof-of-compliance: Safety and availability analysis in trust management
-
IEEE Computer Society Press, Los Alamitos, CA
-
LI, N., WINSBOROUGH, W. H., AND MITCHELL, J. 2003. Beyond proof-of-compliance: Safety and availability analysis in trust management. In Proceedings of the 2003 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA. 123-139.
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 123-139
-
-
LI, N.1
WINSBOROUGH, W.H.2
MITCHELL, J.3
-
29
-
-
0031382488
-
Reconciling role-based management and role-based access control
-
ACM, New York
-
LUPU, E. C. AND SLOMAN, M. 1997. Reconciling role-based management and role-based access control. In ACM Workshop on Role-based Access Control. ACM, New York. 135-141.
-
(1997)
ACM Workshop on Role-based Access Control
, pp. 135-141
-
-
LUPU, E.C.1
SLOMAN, M.2
-
30
-
-
84893561028
-
Using SPIN to verify security protocols
-
Proceedings of 9th Int. SPIN Workshop on Model Checking of Software
-
MAGGI, P. AND SISTO, R. 2002. Using SPIN to verify security protocols. In Proceedings of 9th Int. SPIN Workshop on Model Checking of Software, LNCS 2318. 187-204.
-
(2002)
LNCS
, vol.2318
, pp. 187-204
-
-
MAGGI, P.1
SISTO, R.2
-
32
-
-
34249739906
-
-
NYANCHAMA, M. AND OSBORN, S. 1999. The role graph model and conflict of interest. ACM Transaction on Information System Security 2, 1 (Feb.), 3-33.
-
NYANCHAMA, M. AND OSBORN, S. 1999. The role graph model and conflict of interest. ACM Transaction on Information System Security 2, 1 (Feb.), 3-33.
-
-
-
-
35
-
-
0342748752
-
Securing causal relationships in distributed systems
-
REITER, M. AND GONG, L. 1995. Securing causal relationships in distributed systems. The Computer Journal 38, 8, 633-642.
-
(1995)
The Computer Journal
, vol.38
, Issue.8
, pp. 633-642
-
-
REITER, M.1
GONG, L.2
-
36
-
-
0017723679
-
Towards autonomous descriptions of synchronization modules
-
North-Holland, Amsterdam
-
ROBERTS, P. AND VERJUS, J.-P. 1977. Towards autonomous descriptions of synchronization modules. In Proceedings of IFIP Congress. North-Holland, Amsterdam. 981-986.
-
(1977)
Proceedings of IFIP Congress
, pp. 981-986
-
-
ROBERTS, P.1
VERJUS, J.-P.2
-
39
-
-
34249728058
-
-
SANDHU, R., BHAMIDIPATI, V., AND MUNAWER, Q. 1999. The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security 2, 1 (Feb.), 105-135.
-
SANDHU, R., BHAMIDIPATI, V., AND MUNAWER, Q. 1999. The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security 2, 1 (Feb.), 105-135.
-
-
-
-
40
-
-
0030086382
-
-
SANDHU, R., COYNE, E., FEINSTEIN, H., AND YOUMAN, C. 1996. Role-based access control models. IEEE Computer 29, 2 (Feb.), 38-47.
-
SANDHU, R., COYNE, E., FEINSTEIN, H., AND YOUMAN, C. 1996. Role-based access control models. IEEE Computer 29, 2 (Feb.), 38-47.
-
-
-
-
41
-
-
0033652039
-
The NIST model for role-based access control: Towards a unified standard
-
ACM, New York
-
SANDHU, R., FERRAIOLO, D., AND KUHN, R. 2000. The NIST model for role-based access control: towards a unified standard. In Proceedings of the Fifth ACM Workshop on Role-Based Access Control. ACM, New York. 47-63.
-
(2000)
Proceedings of the Fifth ACM Workshop on Role-Based Access Control
, pp. 47-63
-
-
SANDHU, R.1
FERRAIOLO, D.2
KUHN, R.3
-
42
-
-
0030644642
-
Separation of duty in role-based environments
-
IEEE Computer Society Press, Los Alamitos, CA
-
SIMON, R. AND ZURKO, M. 1997. Separation of duty in role-based environments. In 10th Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos, CA. 183-194.
-
(1997)
10th Computer Security Foundations Workshop
, pp. 183-194
-
-
SIMON, R.1
ZURKO, M.2
-
43
-
-
0031387996
-
Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments
-
ACM, New York
-
THOMAS, R. K. 1997. Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments. In ACM Workshop on Role-based Access Control. ACM, New York. 13-19.
-
(1997)
ACM Workshop on Role-based Access Control
, pp. 13-19
-
-
THOMAS, R.K.1
-
44
-
-
0036375158
-
Design of a policy-driven middleware for secure distributed collaboration
-
IEEE Computer Society Press, Los Alamitos, CA
-
TRIPATHI, A., AHMED, T., KUMAR, R., AND JAMAN, S. 2002. Design of a policy-driven middleware for secure distributed collaboration. In Proceedings of International Conference on Distributed Computing Systems 2002. IEEE Computer Society Press, Los Alamitos, CA. 393-400.
-
(2002)
Proceedings of International Conference on Distributed Computing Systems 2002
, pp. 393-400
-
-
TRIPATHI, A.1
AHMED, T.2
KUMAR, R.3
JAMAN, S.4
-
45
-
-
84942235302
-
Specification of secure distributed collaboration systems
-
IEEE Computer Society Press, Los Alamitos, CA
-
TRIPATHI, A., AHMED, T., AND KUMAR, R. 2003. Specification of secure distributed collaboration systems. In IEEE International Symposium on Autonomous Distributed Systems. IEEE Computer Society Press, Los Alamitos, CA. 149-156.
-
(2003)
IEEE International Symposium on Autonomous Distributed Systems
, pp. 149-156
-
-
TRIPATHI, A.1
AHMED, T.2
KUMAR, R.3
-
46
-
-
0030672129
-
A general theory of security properties
-
IEEE Computer Society Press, Los Alamitos, CA
-
ZAKINTHINOS, A. AND LEE, E. 1997. A general theory of security properties. In IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA. 94-102.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 94-102
-
-
ZAKINTHINOS, A.1
LEE, E.2
|