-
1
-
-
39149091940
-
-
BARKLEY, J., CINCOTTA, A., FERRAIOLO, D., GAVRILA, S., AND KUHN, D. R. 1997. Role based access control for the world wide web. In Proceedings of 20th National Information System Security Conference. NIST/NSA.
-
BARKLEY, J., CINCOTTA, A., FERRAIOLO, D., GAVRILA, S., AND KUHN, D. R. 1997. Role based access control for the world wide web. In Proceedings of 20th National Information System Security Conference. NIST/NSA.
-
-
-
-
2
-
-
39149144231
-
-
BERTINO, E. AND FERRARI, E. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System, Security 2, 1 (Feb.), 65-104.
-
BERTINO, E. AND FERRARI, E. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System, Security 2, 1 (Feb.), 65-104.
-
-
-
-
3
-
-
84944792110
-
-
BERTINO, E., BONATTI, P. A., AND FERRARI, E. 2001. Trbac: A temporal role-based access control model. ACM Transactions on Information and System Security 4, 3 (Aug.), 191-233.
-
BERTINO, E., BONATTI, P. A., AND FERRARI, E. 2001. Trbac: A temporal role-based access control model. ACM Transactions on Information and System Security 4, 3 (Aug.), 191-233.
-
-
-
-
4
-
-
0038223799
-
Secure mediation: Requirements and design
-
Chalkidiki, Greece
-
BISKUP, J., FLEGEL, U., AND KARABULUT, Y. 1998. Secure mediation: Requirements and design. In Proceedings of 12th Annual IFIP WG 11.3 Working Conference on Database Security. Chalkidiki, Greece.
-
(1998)
Proceedings of 12th Annual IFIP WG 11.3 Working Conference on Database Security
-
-
BISKUP, J.1
FLEGEL, U.2
KARABULUT, Y.3
-
5
-
-
3142510989
-
Administrative scope: A foundation for role-based administrative models
-
CRAMPTON, J. AND LOIZOU, G. 2003. Administrative scope: A foundation for role-based administrative models. ACM Transactions on Information System Security 6, 2, 201-231.
-
(2003)
ACM Transactions on Information System Security
, vol.6
, Issue.2
, pp. 201-231
-
-
CRAMPTON, J.1
LOIZOU, G.2
-
6
-
-
0000985630
-
An examination of federal and commercial access control policy needs
-
Baltimore, MD
-
FERRAIOLO, D. F., GILBERT, D. M., AND LYNCH, N. 1993. An examination of federal and commercial access control policy needs. In Proceedings of NISTNCSC National Computer Security Conference. Baltimore, MD.
-
(1993)
Proceedings of NISTNCSC National Computer Security Conference
-
-
FERRAIOLO, D.F.1
GILBERT, D.M.2
LYNCH, N.3
-
10
-
-
0000206310
-
-
JOSHI, J. B. D., AREF, W., GHAFOOR, A., AND SPAFFORD, E. H. 2001a. Security models for web-based applications. Communications of the ACM 44, 2 (Feb.), 38-72.
-
JOSHI, J. B. D., AREF, W., GHAFOOR, A., AND SPAFFORD, E. H. 2001a. Security models for web-based applications. Communications of the ACM 44, 2 (Feb.), 38-72.
-
-
-
-
11
-
-
0035251598
-
-
JOSHI, J. B. D., GHAFOOR, A., AREF, W., AND SPAFFORD, E. H. 2001b. Digital government security infrastructure design challenges. IEEE Computer 34, 2 (Feb.), 66-72.
-
JOSHI, J. B. D., GHAFOOR, A., AREF, W., AND SPAFFORD, E. H. 2001b. Digital government security infrastructure design challenges. IEEE Computer 34, 2 (Feb.), 66-72.
-
-
-
-
12
-
-
0242625215
-
Temporal hierarchies and inheritance semantics for gtrbac
-
ACM Press, New York
-
JOSHI, J. B. D., BERTINO, E., AND GHAFOOR, A. 2002. Temporal hierarchies and inheritance semantics for gtrbac. In SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies. ACM Press, New York. 74-83.
-
(2002)
SACMAT '02: Proceedings of the seventh ACM symposium on Access control models and technologies
, pp. 74-83
-
-
JOSHI, J.B.D.1
BERTINO, E.2
GHAFOOR, A.3
-
13
-
-
24344502331
-
Analysis of expressiveness and design issues for a temporal role based access control model
-
JOSHI, J. B. D., BERTINO, E., LATIF, U., AND GHAFOOR, A. 2005a. Analysis of expressiveness and design issues for a temporal role based access control model. IEEE Transactions on Dependable and Secure Computing 2, 2, 157-175.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.2
, pp. 157-175
-
-
JOSHI, J.B.D.1
BERTINO, E.2
LATIF, U.3
GHAFOOR, A.4
-
14
-
-
17444406680
-
-
JOSHI, J. B. D., BERTINO, E., LATIF, U., AND GHAFOOR, A. 2005b. Generalized temporal role based access control model. IEEE Transactions on Knowledge and Data Engineering 17, 1 (Jan.), 4-23.
-
JOSHI, J. B. D., BERTINO, E., LATIF, U., AND GHAFOOR, A. 2005b. Generalized temporal role based access control model. IEEE Transactions on Knowledge and Data Engineering 17, 1 (Jan.), 4-23.
-
-
-
-
15
-
-
85008430937
-
A graph-based formalism for rbac
-
KOCH, M., MANCINI, L., AND PARISI-PRESICCE, F. 2002. A graph-based formalism for rbac. ACM Transactions on Information and System Security 5, 3, 332-365.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.3
, pp. 332-365
-
-
KOCH, M.1
MANCINI, L.2
PARISI-PRESICCE, F.3
-
20
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
OSBORN, S., SANDHU, R., AND MUNAWER, Q. 2000. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security 3, 2, 85-106.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
OSBORN, S.1
SANDHU, R.2
MUNAWER, Q.3
-
21
-
-
84994391858
-
-
PARK, J. S., SANDHU, R., AND AHN, G. J. 2001. Role-based access control on the web. ACM Transactions on Information and System Security 4, 1 (Feb.), 37-71.
-
PARK, J. S., SANDHU, R., AND AHN, G. J. 2001. Role-based access control on the web. ACM Transactions on Information and System Security 4, 1 (Feb.), 37-71.
-
-
-
-
22
-
-
50249183308
-
Role hierarchies and constraints for lattice-based access controls
-
SANDHU, R. 1996. Role hierarchies and constraints for lattice-based access controls. Computer Security - Esorics'96, LNCSN 1146, 65-79.
-
(1996)
Computer Security - Esorics'96, LNCSN 1146
, pp. 65-79
-
-
SANDHU, R.1
-
24
-
-
0030086382
-
Role-based access control models
-
SANDHU, R., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Computer 29, 2, 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
SANDHU, R.1
COYNE, E.J.2
FEINSTEIN, H.L.3
YOUMAN, C.E.4
-
25
-
-
0001549660
-
The arbac97 model for role-based administration of roles
-
SANDHU, R., BHAMIDIPANI, V., AND MUNAWER, Q. 1999. The arbac97 model for role-based administration of roles. ACM Transactions on Information and System Security 1, 2, 105-135.
-
(1999)
ACM Transactions on Information and System Security
, vol.1
, Issue.2
, pp. 105-135
-
-
SANDHU, R.1
BHAMIDIPANI, V.2
MUNAWER, Q.3
|