-
2
-
-
84902477419
-
Supporting delegation in secure workflow management systems
-
Atluri, V., Bertino, E., Ferrari, E., Mazzoleni, P.: Supporting delegation in secure workflow management systems. In: IFIP WG 11.3 Conf. Data and App. Security. (2003) 199-212
-
(2003)
IFIP WG 11.3 Conf. Data and App. Security
, pp. 199-212
-
-
Atluri, V.1
Bertino, E.2
Ferrari, E.3
Mazzoleni, P.4
-
3
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Info, and Sys. Security 2 (1999) 65-104
-
(1999)
ACM Trans. Info, and Sys. Security
, vol.2
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
4
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
Herzberg, A., Mass, Y., Mihaeli, J., Naor, D., Ravid, Y.: Access control meets public key infrastructure, or: Assigning roles to strangers. In: IEEE Symp. Sec. and Priv. (S&P). (2000) 2-14
-
(2000)
IEEE Symp. Sec. and Priv. (S&P)
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
Naor, D.4
Ravid, Y.5
-
5
-
-
3042584122
-
Flexible access control policy specification with constraint logic programming
-
Barker, S., Stuckey, P.J.: Flexible access control policy specification with constraint logic programming. ACM Trans. Info, and Sys. Security 6 (2003) 501-546
-
(2003)
ACM Trans. Info, and Sys. Security
, vol.6
, pp. 501-546
-
-
Barker, S.1
Stuckey, P.J.2
-
7
-
-
35048858359
-
Towards reuse in agent oriented information systems: The importance of being purposive
-
International workshop on Agent-Oriented Information systems (AOIS-2003) held in conjunction with AAMAS 2003, Springer-Verlag
-
Goss, S., Heinze, C., Papasimeon, M., Pearce, A., Sterling, L.: Towards reuse in agent oriented information systems: the importance of being purposive. In: International workshop on Agent-Oriented Information systems (AOIS-2003) held in conjunction with AAMAS 2003, to appear in Lecture Notes in Computer Science, Springer-Verlag (2003) 30-37
-
(2003)
Lecture Notes in Computer Science
, pp. 30-37
-
-
Goss, S.1
Heinze, C.2
Papasimeon, M.3
Pearce, A.4
Sterling, L.5
-
9
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H., Youman, C.: Role-based access control models. IEEE Computer 29 (1996) 38-47
-
(1996)
IEEE Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.3
Youman, C.4
-
10
-
-
84956993736
-
Role-based authorization constraints specification
-
Ahn, G.J., Sandhu, R.: Role-based authorization constraints specification. ACM Trans. Info, and Sys. Security 3 (2000) 207-226
-
(2000)
ACM Trans. Info, and Sys. Security
, vol.3
, pp. 207-226
-
-
Ahn, G.J.1
Sandhu, R.2
-
12
-
-
84865788031
-
A model of oasis role-based access control and its support for active security
-
Yao, W., Moody, K., Bacon, J.: A model of oasis role-based access control and its support for active security. ACM Trans. Info, and Sys. Security 5 (2002) 492-540
-
(2002)
ACM Trans. Info, and Sys. Security
, vol.5
, pp. 492-540
-
-
Yao, W.1
Moody, K.2
Bacon, J.3
|