-
2
-
-
0037303408
-
The PERMIS X.509 role based privilege management infrastructure
-
Chadwick, D.W., Otenko, A.: The PERMIS X.509 role based privilege management infrastructure. Future Generation Computer Systems 19(2), 277-289 (2003)
-
(2003)
Future Generation Computer Systems
, vol.19
, Issue.2
, pp. 277-289
-
-
Chadwick, D.W.1
Otenko, A.2
-
3
-
-
33847092871
-
GEO-RBAC: A spatially aware RBAC
-
Damiani, M.L., Bertino, E., Catania, B., Perlasca, P.: GEO-RBAC: A spatially aware RBAC ACM Trans. on Information and System Security 10(1), 2 (2007)
-
(2007)
ACM Trans. on Information and System Security
, vol.10
, Issue.1
, pp. 2
-
-
Damiani, M.L.1
Bertino, E.2
Catania, B.3
Perlasca, P.4
-
5
-
-
33745120496
-
-
IEEE, Los Alamitos
-
Di, W., Jian, L., Yabo, D., Miaoliang, Z.: Using semantic web technologies to specify constraints of RBAC In: 6th Int. Conf. on Parallel and Distributed Computing Applications and Technologies (PDCAT), pp. 543-545. IEEE, Los Alamitos (2005)
-
(2005)
Using semantic web technologies to specify constraints of RBAC In: 6th Int. Conf. on Parallel and Distributed Computing Applications and Technologies (PDCAT)
, pp. 543-545
-
-
Di, W.1
Jian, L.2
Yabo, D.3
Miaoliang, Z.4
-
6
-
-
84884603367
-
Putting OWL in order: Patterns for sequences in OWL
-
Workshop
-
Drummond, N., Rector, A., Stevens, R., Moulton, G., Horridge, M., Wang, H.H., Seidenberg, J.: Putting OWL in order: Patterns for sequences in OWL. In: OWL: Experiences and Directions (OWLED) ISWC Workshop (2006)
-
(2006)
OWL: Experiences and Directions (OWLED) ISWC
-
-
Drummond, N.1
Rector, A.2
Stevens, R.3
Moulton, G.4
Horridge, M.5
Wang, H.H.6
Seidenberg, J.7
-
7
-
-
84860548736
-
The even more irresistible SROIQ
-
Horrocks, I., Kutz, O., Sattler, U.: The even more irresistible SROIQ. In: 10th International Conference on Principles of Knowledge Representation and Reasoning (KR), pp. 57-67 (2006)
-
(2006)
10th International Conference on Principles of Knowledge Representation and Reasoning (KR)
, pp. 57-67
-
-
Horrocks, I.1
Kutz, O.2
Sattler, U.3
-
8
-
-
33845456768
-
Self-describing delegation networks for the Web
-
IEEE, Los Alamitos
-
Kagal, L., Berners-Lee, T., Connolly, D., Weitzner, D.: Self-describing delegation networks for the Web. In: 7th IEEE Int. Workshop on Policies for Distributed Systems and Networks (POLICY), pp. 205-214. IEEE, Los Alamitos (2006)
-
(2006)
7th IEEE Int. Workshop on Policies for Distributed Systems and Networks (POLICY)
, pp. 205-214
-
-
Kagal, L.1
Berners-Lee, T.2
Connolly, D.3
Weitzner, D.4
-
9
-
-
33750703611
-
Using Semantic Web technologies for policy management on the Web
-
AAAI Press
-
Kagal, L., Berners-Lee, T., Connolly, D., Weitzner, D.J.: Using Semantic Web technologies for policy management on the Web. In: 21st National Conference on Artificial Intelligence (AAAI), AAAI Press (2006)
-
(2006)
21st National Conference on Artificial Intelligence (AAAI)
-
-
Kagal, L.1
Berners-Lee, T.2
Connolly, D.3
Weitzner, D.J.4
-
10
-
-
0035754510
-
Design and implementation of a flexible RBACservice in an object-oriented scripting language
-
CCS, pp
-
Neumann, G., Strembeck, M.: Design and implementation of a flexible RBACservice in an object-oriented scripting language. In: 8th ACM Conference on Computer and Communications Security (CCS), pp. 58-67 (2001)
-
(2001)
8th ACM Conference on Computer and Communications Security
, pp. 58-67
-
-
Neumann, G.1
Strembeck, M.2
-
12
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, CE.: Role-based access control models. Computer 29(2), 38-47 (1996)
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
13
-
-
38349025457
-
-
Scavo, T., Cantor, S.: Shibboleth Architecture, Technical Overview, Working Draft 02. Technical report, Internet2 Consortium (June 2005)
-
Scavo, T., Cantor, S.: Shibboleth Architecture, Technical Overview, Working Draft 02. Technical report, Internet2 Consortium (June 2005)
-
-
-
-
14
-
-
33845212068
-
-
Seidenberg, J., Rector, A.L.: Representing transitive propagation in OWL. In: Embley, D.W., Olivé, A., Ram, S. (eds.) ER 2006. LNCS, 4215, pp. 255-266. Springer, Heidelberg (2006)
-
Seidenberg, J., Rector, A.L.: Representing transitive propagation in OWL. In: Embley, D.W., Olivé, A., Ram, S. (eds.) ER 2006. LNCS, vol. 4215, pp. 255-266. Springer, Heidelberg (2006)
-
-
-
-
15
-
-
4444246080
-
An integrated approach to engineer and enforce context constraints in RBAC environments
-
Strembeck, M., Neumann, G.: An integrated approach to engineer and enforce context constraints in RBAC environments. ACM Trans. on Information and System Security 7(3), 392-427 (2004)
-
(2004)
ACM Trans. on Information and System Security
, vol.7
, Issue.3
, pp. 392-427
-
-
Strembeck, M.1
Neumann, G.2
-
16
-
-
24344501341
-
Access control in collaborative systems
-
Tolone, W., Ahn, G.-J., Pai, T., Hong, S.-P.: Access control in collaborative systems. ACM Computing Surveys 37(1), 29-41 (2005)
-
(2005)
ACM Computing Surveys
, vol.37
, Issue.1
, pp. 29-41
-
-
Tolone, W.1
Ahn, G.-J.2
Pai, T.3
Hong, S.-P.4
-
17
-
-
33845427407
-
A semantic context-aware access control framework for secure collaborations in pervasive computing environments
-
Toninelli, A., Montanari, R., Kagal, L., Lassila, O.: A semantic context-aware access control framework for secure collaborations in pervasive computing environments. In: 5th International Semantic Web Conference, pp. 473-486 (2006)
-
(2006)
5th International Semantic Web Conference
, pp. 473-486
-
-
Toninelli, A.1
Montanari, R.2
Kagal, L.3
Lassila, O.4
-
18
-
-
4344696700
-
KAoS policy management for semantic web services
-
Uszok, A., Bradshaw, J.M., Johnson, M., Jeffers, R., Tate, A., Dalton, J., Aitken, S.: KAoS policy management for semantic web services. IEEE Intelligent Systems 19(4), 32-41 (2004)
-
(2004)
IEEE Intelligent Systems
, vol.19
, Issue.4
, pp. 32-41
-
-
Uszok, A.1
Bradshaw, J.M.2
Johnson, M.3
Jeffers, R.4
Tate, A.5
Dalton, J.6
Aitken, S.7
-
19
-
-
20444479906
-
A logic-based framework for attribute based access control
-
ACM Press, New York
-
Wang, L., Wijesekera, D., Jajodia, S.: A logic-based framework for attribute based access control. In: ACM Workshop on Formal Methods in Security Engineering (FMSE), pp. 45-55. ACM Press, New York (2004)
-
(2004)
ACM Workshop on Formal Methods in Security Engineering (FMSE)
, pp. 45-55
-
-
Wang, L.1
Wijesekera, D.2
Jajodia, S.3
-
20
-
-
38349062253
-
Integrating and Exchanging XML Data Using Ontologies
-
Spaccapietra, S, Aberer, K, Cudré-Mauroux, P, eds, Journal on Data Semantics VI, Springer, Heidelberg
-
Xiao, H., Cruz, I.F.: Integrating and Exchanging XML Data Using Ontologies. In: Spaccapietra, S., Aberer, K., Cudré-Mauroux, P. (eds.) Journal on Data Semantics VI. LNCS, vol. 4090, pp. 67-89. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4090
, pp. 67-89
-
-
Xiao, H.1
Cruz, I.F.2
|