-
1
-
-
35248822896
-
-
Itu-t recommendation x.509 2005, iso/iec 9594-8: 2001, information technology, open systems interconnection, public-key and attribute certificate framework
-
Itu-t recommendation x.509 (2005), iso/iec 9594-8: 2001, information technology, open systems interconnection, public-key and attribute certificate framework.
-
-
-
-
2
-
-
84865788031
-
A model of oasis role-based access control and its support for active security
-
J. Bacon, K. Moody, and W. Yao. A model of oasis role-based access control and its support for active security. ACM Transactions on Information and System Security, 5(4):492-540, 2002.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.4
, pp. 492-540
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
3
-
-
35248852684
-
-
E. Barka and R. Sandhu. A role-based delegation model and some extensions. In In Proceedings of the 23th National Information Systems Security Conference (NISSC 2000), Baltimore, USA, 2000.
-
E. Barka and R. Sandhu. A role-based delegation model and some extensions. In In Proceedings of the 23th National Information Systems Security Conference (NISSC 2000), Baltimore, USA, 2000.
-
-
-
-
7
-
-
0003618065
-
-
September
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. Rfc 2693 - spki certificate theory, September 1999.
-
(1999)
Rfc 2693 - spki certificate theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
8
-
-
84992227458
-
Proposed nist standard for role-based access control
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed nist standard for role-based access control. ACM Transactions on Information and System Security, 4(3):224-274, 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
9
-
-
0003253784
-
A delegation based model for distributed trust
-
L. Kagal, T. Finin, and Y. Peng. A delegation based model for distributed trust. In Proceedings of the IJCAI01 Workshop on Autonomy, Delegation and Control: Interacting with Autonomous Agent, Seattle, pages 73-80, 2001.
-
(2001)
Proceedings of the IJCAI01 Workshop on Autonomy, Delegation and Control: Interacting with Autonomous Agent, Seattle
, pp. 73-80
-
-
Kagal, L.1
Finin, T.2
Peng, Y.3
-
11
-
-
30644480988
-
A fine-grained, controllable, userto-user delegation method in rbac
-
Stockholm, Sweden, ACM
-
J. Wainer and A. Kumar. A fine-grained, controllable, userto-user delegation method in rbac. In SACMAT'05, pages 59-66, Stockholm, Sweden, 2005. ACM.
-
(2005)
SACMAT'05
, pp. 59-66
-
-
Wainer, J.1
Kumar, A.2
-
12
-
-
33644684766
-
An attribute-based delegation model and its extension
-
February
-
C. Ye, Z. Wu, and Y. Fu. An attribute-based delegation model and its extension. Journal of Research and Practice in Information Technology, 38(1):3-17, February 2006.
-
(2006)
Journal of Research and Practice in Information Technology
, vol.38
, Issue.1
, pp. 3-17
-
-
Ye, C.1
Wu, Z.2
Fu, Y.3
-
13
-
-
77952903906
-
-
G. Yin, H.-m. Wang, D.-x. Shi, Y. Jia, and M. Teng. A rule-based framework for role-based constrained delegation. ACM International Conference Proceeding Series, Proceedings of the 3rd international conference on Information security, Shanghai, China, 85:186-191, 2004.
-
G. Yin, H.-m. Wang, D.-x. Shi, Y. Jia, and M. Teng. A rule-based framework for role-based constrained delegation. ACM International Conference Proceeding Series, Proceedings of the 3rd international conference on Information security, Shanghai, China, 85:186-191, 2004.
-
-
-
-
14
-
-
0035790650
-
A rule-based framework for role-based delegation
-
L. Zhang, G. J. Ahn, and B. T. Chu. A rule-based framework for role-based delegation. ACM SACMAT'01 Chantilly, Virginia, USA, 2001.
-
(2001)
ACM SACMAT'01 Chantilly, Virginia, USA
-
-
Zhang, L.1
Ahn, G.J.2
Chu, B.T.3
-
15
-
-
3042684910
-
A rule-based framework for role-based delegation and revocation
-
L. Zhang, G. J. Ahn, and B. T. Chu. A rule-based framework for role-based delegation and revocation. ACM Transactions on Information and System Security, 6(3):404-441, 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.3
, pp. 404-441
-
-
Zhang, L.1
Ahn, G.J.2
Chu, B.T.3
|