-
1
-
-
0029697680
-
A security policy model for clinical information systems
-
R.J. Anderson. A security policy model for clinical information systems. In IEEE Symposium on Security and Privacy, pages 30-43, 1996.
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 30-43
-
-
Anderson, R.J.1
-
3
-
-
84957006898
-
Access control and trust in the use of widely distributed services
-
Middleware '01, IFIP/ACM International Conference on Distributed Systems Platforms, of, Springer, Nov
-
J. Bacon, K. Moody, and W. Yao. Access control and trust in the use of widely distributed services. In Middleware '01, IFIP/ACM International Conference on Distributed Systems Platforms, volume 2218 of LNCS, pages 295-310. Springer, Nov. 2001.
-
(2001)
LNCS
, vol.2218
, pp. 295-310
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
4
-
-
33644505205
-
OASIS Role-based Access Control For Electronic Health Records
-
IEEE, Feb
-
D. M. Eyers, J. Bacon, and K. Moody. OASIS Role-based Access Control For Electronic Health Records. In IEEE Proceedings on Software, 153(1), pages 16-23. IEEE, Feb. 2006.
-
(2006)
IEEE Proceedings on Software, 153(1)
, pp. 16-23
-
-
Eyers, D.M.1
Bacon, J.2
Moody, K.3
-
5
-
-
84865788031
-
A model of OASIS role-based access control and its support for active security
-
Nov
-
J. Bacon, K. Moody, and W. Yao. A model of OASIS role-based access control and its support for active security. ACM Transactions on Information and System Security (TISSEC), 5(4):492-540, Nov. 2002.
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, Issue.4
, pp. 492-540
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
6
-
-
84992227458
-
The NIST Model for Role Based Access Control
-
Aug
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. The NIST Model for Role Based Access Control. ACM Transactions on Information and System Security (TISSEC), 4(3):224-274, Aug. 2001.
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
8
-
-
27944460461
-
-
K. Krukow and A. Twigg. Distributed approximation of fixed-points in trust structures. In Proceedings of the Twenty-Fifth International Conference on Distributed Computing Systems (ICDCS'05), pages 805-814. IEEE Computer Society, June 2005. Also published as BRICS Tech Report, RS-05-6.
-
K. Krukow and A. Twigg. Distributed approximation of fixed-points in trust structures. In Proceedings of the Twenty-Fifth International Conference on Distributed Computing Systems (ICDCS'05), pages 805-814. IEEE Computer Society, June 2005. Also published as BRICS Tech Report, RS-05-6.
-
-
-
-
13
-
-
0030086382
-
Role-based access control models
-
R. Sandhu, E. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.L.3
Youman, C.E.4
-
14
-
-
0003487308
-
-
John Wiley & Sons, Inc, New York, NY, USA
-
B. Schneier. Secrets & Lies: Digital Security in a Networked World. John Wiley & Sons, Inc., New York, NY, USA, 2000.
-
(2000)
Secrets & Lies: Digital Security in a Networked World
-
-
Schneier, B.1
-
15
-
-
78649710925
-
Trust for transparent, ubiquitous collaboration
-
Dallas-Ft. Worth, TX, USA, Mar
-
B. Shand, N. Dimmock, and J. Bacon. Trust for transparent, ubiquitous collaboration. In First IEEE Annual Conference on Pervasive Computing and Communications (PerCom 2003), pages 153-160, Dallas-Ft. Worth, TX, USA, Mar. 2003.
-
(2003)
First IEEE Annual Conference on Pervasive Computing and Communications (PerCom 2003)
, pp. 153-160
-
-
Shand, B.1
Dimmock, N.2
Bacon, J.3
|