-
1
-
-
0033645572
-
TRBAC: A temporal role-based access control model
-
ACM Press, New York, NY, USA
-
Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: a temporal role-based access control model. In: RBAC '00: Proceedings of the fifth ACM workshop on Role-based access control, pp. 21-30. ACM Press, New York, NY, USA (2000)
-
(2000)
RBAC '00: Proceedings of the fifth ACM workshop on Role-based access control
, pp. 21-30
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
2
-
-
30644474741
-
-
ACM Press, New York, NY, USA
-
Bertino, E., Catania, B., Damiani, M.L., Perlasca, P.: GEO-RBAC: a spatially aware RBAC In: SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies, pp. 29-37. ACM Press, New York, NY, USA (2005)
-
(2005)
GEO-RBAC: A spatially aware RBAC In: SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies
, pp. 29-37
-
-
Bertino, E.1
Catania, B.2
Damiani, M.L.3
Perlasca, P.4
-
3
-
-
33744789667
-
-
Chandran, S.M., Joshi, J.B.D.: LoT-RBAC: A Location and Time-Based RBAC Model. In: WISE, pp. 361-375 (2005)
-
Chandran, S.M., Joshi, J.B.D.: LoT-RBAC: A Location and Time-Based RBAC Model. In: WISE, pp. 361-375 (2005)
-
-
-
-
4
-
-
84948995473
-
A Context-Aware Security Architecture for Emerging Applications
-
Las Vegas, NV, USA, pp, December
-
Covington, M.J., Fogla, P., Zhan, Z., Ahamad, M.: A Context-Aware Security Architecture for Emerging Applications. In: Proceedings of the Annual Computer Security Applications Conference, Las Vegas, NV, USA, pp. 249-260 (December 2002)
-
(2002)
Proceedings of the Annual Computer Security Applications Conference
, pp. 249-260
-
-
Covington, M.J.1
Fogla, P.2
Zhan, Z.3
Ahamad, M.4
-
5
-
-
0035791053
-
Securing Context-Aware Applications Using Environment Roles
-
Chantilly, VA, USA May
-
Covington, M.J., Long, W., Srinivasan, S., Dey, A., Ahamad, M., Abowd, G.: Securing Context-Aware Applications Using Environment Roles. In: Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, pp. 10-20. Chantilly, VA, USA (May 2001)
-
(2001)
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies
, pp. 10-20
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dey, A.4
Ahamad, M.5
Abowd, G.6
-
6
-
-
84992227458
-
Proposed NIST Standard for Role-Based Access Control
-
August
-
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and Systems Security 4(3) (August 2001)
-
(2001)
ACM Transactions on Information and Systems Security
, vol.4
, Issue.3
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
7
-
-
4143078106
-
Implementing Access Control to People Location Information
-
Yorktown Heights, California, USA June
-
Hengartner, U., Steenkiste, P.: Implementing Access Control to People Location Information. In: Proceeding of the SACMAT'04 Yorktown Heights, California, USA (June 2004)
-
(2004)
Proceeding of the SACMAT'04
-
-
Hengartner, U.1
Steenkiste, P.2
-
8
-
-
17444406680
-
A Generalized Temporal Role-Based Access Control Model
-
Joshi, J.B.D., Bertino, E., Latif, U., Ghafoor, A.: A Generalized Temporal Role-Based Access Control Model. IEEE Transactions on Knowledge and Data Engineering 17(1), 4-23 (2005)
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.B.D.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
9
-
-
37849026104
-
Security Consideration for a Distributed Location Service
-
London, UK
-
Leonhardt, U., Magee, J.: Security Consideration for a Distributed Location Service. Imperial College of Science, Technology and Medicine, London, UK (1997)
-
(1997)
Imperial College of Science, Technology and Medicine
-
-
Leonhardt, U.1
Magee, J.2
-
10
-
-
32444439291
-
Towards a Location-Based Mandatory Access Control Model
-
February
-
Ray, I., Kumar, M.: Towards a Location-Based Mandatory Access Control Model. Computers & Security 25(1) (February 2006)
-
(2006)
Computers & Security
, vol.25
, Issue.1
-
-
Ray, I.1
Kumar, M.2
-
11
-
-
85015437589
-
-
Ray, I., Kumar, M., Yu, L.: LRBAC: A Location-Aware Role-Based Access Control Model. In: Proceedings of the 2nd International Conference on Information Systems Security, Kolkata, India, pp. 147-161 (December 2006)
-
Ray, I., Kumar, M., Yu, L.: LRBAC: A Location-Aware Role-Based Access Control Model. In: Proceedings of the 2nd International Conference on Information Systems Security, Kolkata, India, pp. 147-161 (December 2006)
-
-
-
-
12
-
-
84948983013
-
Access Control for Active Spaces
-
Las Vegas, NV, USA, pp, December
-
Sampemane, G., Naldurg, P., Campbell, R.H.: Access Control for Active Spaces. In: Proceedings of the Annual Computer Security Applications Conference, Las Vegas, NV, USA, pp. 343-352 (December 2002)
-
(2002)
Proceedings of the Annual Computer Security Applications Conference
, pp. 343-352
-
-
Sampemane, G.1
Naldurg, P.2
Campbell, R.H.3
-
13
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38-47 (1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
14
-
-
0030644642
-
Separation of duty in role-based environments
-
Washington, DC, USA, pp, IEEE Computer Society Press, Los Alamitos
-
Simon, R., Zurko, M.E.: Separation of duty in role-based environments. In: CSFW '97: Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97), Washington, DC, USA, pp. 183-194. IEEE Computer Society Press, Los Alamitos (1997)
-
(1997)
CSFW '97: Proceedings of the 10th Computer Security Foundations Workshop (CSFW '97)
, pp. 183-194
-
-
Simon, R.1
Zurko, M.E.2
-
15
-
-
35048891150
-
-
Yu, H., Lim, E.-P.: LTAM: A Location-Temporal Authorization Model. In: Jonker, W., Petković, M. (eds.) SDM 2004. LNCS, 3178, pp. 172-186. Springer, Heidelberg (2004)
-
Yu, H., Lim, E.-P.: LTAM: A Location-Temporal Authorization Model. In: Jonker, W., Petković, M. (eds.) SDM 2004. LNCS, vol. 3178, pp. 172-186. Springer, Heidelberg (2004)
-
-
-
|