-
1
-
-
84982994153
-
Distributed access-rights management with delegation certificate
-
Vitek, J, ed, Secure Internet Programming, Springer, Heidelberg
-
Aura, T.: Distributed access-rights management with delegation certificate. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol. 1603, pp. 211-235. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1603
, pp. 211-235
-
-
Aura, T.1
-
4
-
-
51349159940
-
Security Briefs: A First Look at InfoCard
-
Brown, K.: Security Briefs: A First Look at InfoCard. MSDN Magazine 21 (2006)
-
(2006)
MSDN Magazine
, vol.21
-
-
Brown, K.1
-
7
-
-
34547484089
-
-
Microsoft Corporation, Available:, 4th September
-
Chappell, D.: Introducing Windows CardSpace, Microsoft Corporation, Available: http://msdn.microsoft.com/windowsvista/default.aspx?pull=/library/en- us/dnlong/html/IntroInfoCard.asp (4th September 2006)
-
(2006)
Introducing Windows CardSpace
-
-
Chappell, D.1
-
8
-
-
33750232667
-
Delegation in Role-Based Access Control
-
Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
-
Crampton, J., Khambhammettu, H.: Delegation in Role-Based Access Control. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 174-191. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4189
, pp. 174-191
-
-
Crampton, J.1
Khambhammettu, H.2
-
10
-
-
33748044645
-
Fine-grained role-based delegation in presence of the hybrid role hierarchy
-
Lake Tahoe, California, USA, pp
-
Joshi, J.B.D., Bertino, E.: Fine-grained role-based delegation in presence of the hybrid role hierarchy. In: Proceedings of the 7th ACM symposium on Access control models and technologies, Lake Tahoe, California, USA, pp. 81-90 (2006)
-
(2006)
Proceedings of the 7th ACM symposium on Access control models and technologies
, pp. 81-90
-
-
Joshi, J.B.D.1
Bertino, E.2
-
11
-
-
84994391858
-
Role-based access control on the web
-
Park, J.S., Sandhu, R., Ahn, G.J.: Role-based access control on the web. ACM Transactions on Information and System Security (TISSEC) 1(4) (2001)
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.1
, Issue.4
-
-
Park, J.S.1
Sandhu, R.2
Ahn, G.J.3
-
12
-
-
37249088146
-
-
Available:, 16th February
-
Sandhu, R.:Role Usage and Activation Hierarchies (2005), Available: http://www.list.gmu.edu/it862/it862s05/Role_Activation.Hierarchies.ppt (16th February 2007)
-
(2005)
Role Usage and Activation Hierarchies
-
-
Sandhu, R.1
-
14
-
-
0025489261
-
Federated database systems for managing distributed, heterogeneous, and autonomous databases
-
Sheth, A.P., Larson, J.: Federated database systems for managing distributed, heterogeneous, and autonomous databases. ACM Computing Surveys (CSUR) 22(3), 183-236 (1990)
-
(1990)
ACM Computing Surveys (CSUR)
, vol.22
, Issue.3
, pp. 183-236
-
-
Sheth, A.P.1
Larson, J.2
-
15
-
-
2442547465
-
Ensuring information assurance in federated identity management
-
Shin, D., Ahn, G.J., Shenoy, P.: Ensuring information assurance in federated identity management. In: Proceedings of the 2004 IEEE International Conference on Performance, Computing, and Communications, pp. 821-826 (2004)
-
(2004)
Proceedings of the 2004 IEEE International Conference on Performance, Computing, and Communications
, pp. 821-826
-
-
Shin, D.1
Ahn, G.J.2
Shenoy, P.3
-
16
-
-
37249071097
-
-
Thompson, P., Champagne, D., Kemp, J., Aarts, R., Bone, N., Castellanos-Zamora, D., Crom, J.M., Kannappan, L., Lindsay-Stewart, A., Maeda, K., Meyerstein, M., Nochimowski, A., Gonzalez, A., Poignet, A., Serret, X., Vanderbeek, J., Vittu, J., Walter, A., Sergent, J., Madsen, P., Cahill, C., Linn, J., Landau, S., Sibieta, P.: Liberty ID-FF Implementation Guidelines - Version 1.2, Available: https://www.projectliberty.org/specs/liberty-idff- guidelines-v1.2.pdf (4th September 2006)
-
Thompson, P., Champagne, D., Kemp, J., Aarts, R., Bone, N., Castellanos-Zamora, D., Crom, J.M., Kannappan, L., Lindsay-Stewart, A., Maeda, K., Meyerstein, M., Nochimowski, A., Gonzalez, A., Poignet, A., Serret, X., Vanderbeek, J., Vittu, J., Walter, A., Sergent, J., Madsen, P., Cahill, C., Linn, J., Landau, S., Sibieta, P.: Liberty ID-FF Implementation Guidelines - Version 1.2, Available: https://www.projectliberty.org/specs/liberty-idff- guidelines-v1.2.pdf (4th September 2006)
-
-
-
-
17
-
-
84951714031
-
Authorization in enterprise-wide distributed system: A practical design and application
-
Varadharajan, V., Crall, C., Pato, J.: Authorization in enterprise-wide distributed system: a practical design and application. In: Proceedings of the 14th Annual Computer Security Applications Conference, pp. 178-189 (1998)
-
(1998)
Proceedings of the 14th Annual Computer Security Applications Conference
, pp. 178-189
-
-
Varadharajan, V.1
Crall, C.2
Pato, J.3
-
18
-
-
84870216678
-
Access control in federated systems
-
CA, USA, pp
-
Vimercati, S.D.C.D., Samarati, P.: Access control in federated systems. In: Proceedings of the Workshop on New security paradigms, Lake Arrowhead, CA, USA, pp. 87-99 (1996)
-
(1996)
Proceedings of the Workshop on New security paradigms, Lake Arrowhead
, pp. 87-99
-
-
Vimercati, S.D.C.D.1
Samarati, P.2
|