-
1
-
-
34548187259
-
-
Anderson, A., Lockhart, H.: SAML 2.0 profile of XACML. http://docs.oasis-open.org/ (2004).
-
Anderson, A., Lockhart, H.: SAML 2.0 profile of XACML. http://docs.oasis-open.org/ (2004).
-
-
-
-
2
-
-
34548153781
-
-
Busch, S., Muschall, B., Pemul, G., Priebe, T.: Authrule: A Generic Rule-Based Authorization Module. In: Proc. of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (IFIP 11.3), Sofia Antipolis, France (2006).
-
Busch, S., Muschall, B., Pemul, G., Priebe, T.: Authrule: A Generic Rule-Based Authorization Module. In: Proc. of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (IFIP 11.3), Sofia Antipolis, France (2006).
-
-
-
-
5
-
-
0035575945
-
The PAPI system: Point of access to providers of information
-
Castro-Rojo, R., Lopez, D. R.: The PAPI system: point of access to providers of information. Computer Networks 37 6, Pages 703-710 (2001).
-
(2001)
Computer Networks
, vol.37
, Issue.6
, pp. 703-710
-
-
Castro-Rojo, R.1
Lopez, D.R.2
-
6
-
-
26844534244
-
Privacy Enhanced Technologies: Methods, Markets, Misuse
-
Proc. 2nd Internat Conference on Trust, Privacy, and Security in Digital Business TrustBus, Goteborg, Denmark
-
Federrath, F.: Privacy Enhanced Technologies: Methods, Markets, Misuse. Proc. 2nd Internat Conference on Trust, Privacy, and Security in Digital Business (TrustBus), Goteborg, Denmark, 2005. LNCS, Volume 3592, Pages 1-9 (2005).
-
(2005)
LNCS
, vol.3592
, pp. 1-9
-
-
Federrath, F.1
-
7
-
-
33646534622
-
Trust, Privacy and Security in E-Business: Requirements and Solutions
-
Proc. 10th Panhellenic Conference on Informatics PCI, Volas, Greece
-
Katsikas, S. K., Lopez, J., Pernul, G.: Trust, Privacy and Security in E-Business: Requirements and Solutions. Proc. 10th Panhellenic Conference on Informatics (PCI), Volas, Greece, 2005. LNCS, Volume 3746, Pages 548-558 (2005).
-
(2005)
LNCS
, vol.3746
, pp. 548-558
-
-
Katsikas, S.K.1
Lopez, J.2
Pernul, G.3
-
8
-
-
84976834054
-
Authentication in Distributed Systems: Theory and Practice
-
Lampson, B., Abadi, M., Burrows, M., and Wobber, E.: Authentication in Distributed Systems: Theory and Practice. ACM Transaction on Computer Systems, Vol. 10, No. 4, Pages 265-310, (1992).
-
(1992)
ACM Transaction on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
9
-
-
33746295685
-
A Network Access Control Approach Based on the AAA Architecture and Authorization Attributes
-
Workshop
-
Lopez, G., Gomez, A.F., Marin, R., Canovas, O.: A Network Access Control Approach Based on the AAA Architecture and Authorization Attributes. In. Proc of the 19th IEEE Internat. Parallel and Distributed Processing Symposium (IPDPS'05)-Workshop, Pages 287-295 (2005).
-
(2005)
Proc of the 19th IEEE Internat. Parallel and Distributed Processing Symposium (IPDPS'05)
, pp. 287-295
-
-
Lopez, G.1
Gomez, A.F.2
Marin, R.3
Canovas, O.4
-
10
-
-
8344266879
-
Authentication and Authorization Infrastructures (AAIs): A Comparative Survey
-
Lopez, J., Oppliger, R., Pernul, G.: Authentication and Authorization Infrastructures (AAIs): A Comparative Survey. Computers & Security 23 7, Pages 578-590 (2004).
-
(2004)
Computers & Security
, vol.23
, Issue.7
, pp. 578-590
-
-
Lopez, J.1
Oppliger, R.2
Pernul, G.3
-
11
-
-
34548145837
-
-
Microsoft: Microsoft.NET Passport Review Guide. http://download. microsoft.com/download/a/f/4/af49b391-086e-4aa2-a84b-ef6d916b2f08/ passport_reviewguide.doc (2004).
-
(2004)
Microsoft: Microsoft.NET Passport Review Guide
-
-
-
12
-
-
34548170266
-
-
OASIS extensible Access Control Markup Language TC: extensible Access Control Markup Language (XACML). http://www.oasis-open.org/committees/ (2006).
-
OASIS extensible Access Control Markup Language TC: extensible Access Control Markup Language (XACML). http://www.oasis-open.org/committees/ (2006).
-
-
-
-
14
-
-
84892902868
-
-
Priebe, T., Fernandez, E.B., Mehlau, J.I., Pemul, G.: A Pattern System for Access Control. Proc. of the 18th Annual IFIP WG 11.3 Working Conference on Data and Application Security (DBSec 2004), Sitges, Spain (2004).
-
Priebe, T., Fernandez, E.B., Mehlau, J.I., Pemul, G.: A Pattern System for Access Control. Proc. of the 18th Annual IFIP WG 11.3 Working Conference on Data and Application Security (DBSec 2004), Sitges, Spain (2004).
-
-
-
-
15
-
-
33750085639
-
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce. 1st Internat
-
IEEE Computer Society
-
Schläger, C., Nowey, T., Montenegro, M.: A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce. 1st Internat. Conference on Availability, Reliability and Security (ARES) 2006, IEEE Computer Society, Pages 709-716 (2006).
-
(2006)
Conference on Availability, Reliability and Security (ARES)
, pp. 709-716
-
-
Schläger, C.1
Nowey, T.2
Montenegro, M.3
-
16
-
-
33750036384
-
Towards a Risk Management Perspective on AAIs. Proc. 3rd Internat
-
Conference on Trust, Privacy & Security in Digital Business TrustBus, Krakow, Poland
-
Schläger, C., Nowey, T.: Towards a Risk Management Perspective on AAIs. Proc. 3rd Internat. Conference on Trust, Privacy & Security in Digital Business (TrustBus), Krakow, Poland, 2006. LNCS, Volume 4083, Pages 41-50 (2006).
-
(2006)
LNCS
, vol.4083
, pp. 41-50
-
-
Schläger, C.1
Nowey, T.2
-
17
-
-
26844573387
-
Authentication and Authorisation Infrastructures in b2c e-Commerce. Proc. of the 6th Internat
-
Conference on Electronic Commerce and Web Technologies EC-Web, Goteborg, Denmark
-
Schläger, C., Pemul, G.: Authentication and Authorisation Infrastructures in b2c e-Commerce. Proc. of the 6th Internat. Conference on Electronic Commerce and Web Technologies (EC-Web), Goteborg, Denmark, 2005. LNCS, Volume 3590, Pages 306-315 (2005).
-
(2005)
LNCS
, vol.3590
, pp. 306-315
-
-
Schläger, C.1
Pemul, G.2
-
18
-
-
33750066953
-
Attribute-based Authentication and Authorisation Infrastructures for E-Commerce Providers. Proc. of the 7th Internat
-
Conference on Electronic Commerce and Web Technologies EC-Web, Krakow, Poland
-
Schläger, C., Sojer, M., Muschall, B., Pemul, G.: Attribute-based Authentication and Authorisation Infrastructures for E-Commerce Providers. Proc. of the 7th Internat. Conference on Electronic Commerce and Web Technologies (EC-Web), Krakow, Poland, 2006. LNCS, Volume 4082, Pages 132-141 (2006).
-
(2006)
LNCS
, vol.4082
, pp. 132-141
-
-
Schläger, C.1
Sojer, M.2
Muschall, B.3
Pemul, G.4
-
20
-
-
33749080076
-
Attribute Based Access Control (ABAC) for Web Services. Internat
-
IEEE Computer Society
-
Yuan, E., Tong, J.: Attribute Based Access Control (ABAC) for Web Services. Internat. Conference on Web Services (ICWS) 2005, IEEE Computer Society, Pages 561-569 (2005).
-
(2005)
Conference on Web Services (ICWS)
, pp. 561-569
-
-
Yuan, E.1
Tong, J.2
|