-
2
-
-
0030087035
-
A temporal access control mechanism for database systems
-
Elisa Bertino, Claudio Bettini, Elena Ferrari, and Pierangela Samarati. A temporal access control mechanism for database systems. Knowledge and Data Engineering, 8(1):67-80, 1996.
-
(1996)
Knowledge and Data Engineering
, vol.8
, Issue.1
, pp. 67-80
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
3
-
-
0032153903
-
An access control model supporting periodicity constraints and temporal reasoning
-
September
-
Elisa Bertino, Claudio Bettini, Elena Ferrari, and Pierangela Samarati. An access control model supporting periodicity constraints and temporal reasoning. ACM Transactions on Database Systems, 23(3);231-285, September 1998.
-
(1998)
ACM Transactions on Database Systems
, vol.23
, Issue.3
, pp. 231-285
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
4
-
-
0013305179
-
Generalized role-based access control for securing future applications
-
Baltimore, MD, October
-
M. Covington, M. Moyer, and M. Ahamad. Generalized role-based access control for securing future applications. In 23rd National Information Systems Security Conference, Baltimore, MD, October 2000.
-
(2000)
23rd National Information Systems Security Conference
-
-
Covington, M.1
Moyer, M.2
Ahamad, M.3
-
5
-
-
0035791053
-
Securing context-aware applications using environment roles
-
Ravi Sandhu and Trent Jaeger, editors, ACM Press
-
Michael J. Covington, Wende Long, Srividhya Srinivasan, Anind K. Dev, Mustaque Ahamad, and Gregory D. Abowd. Securing context-aware applications using environment roles. In Ravi Sandhu and Trent Jaeger, editors, Proceedings of the sixth ACM symposium on Access control models and technologies, pages 10-20. ACM Press, 2001.
-
(2001)
Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
, pp. 10-20
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dev, A.K.4
Ahamad, M.5
Abowd, G.D.6
-
6
-
-
4143123391
-
Rijndael for AES
-
NIST, editor, Gaithersburg, MD, USA. National Institute for Standards and Technology
-
Joan Daemen and Vincent Rijmen. Rijndael for AES. In NIST, editor, The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, NY, USA, pages 343-347, Gaithersburg, MD, USA, 2000. National Institute for Standards and Technology.
-
(2000)
The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, NY, USA
, pp. 343-347
-
-
Daemen, J.1
Rijmen, V.2
-
7
-
-
0010337637
-
-
IPTS Seville, February. European Commission - Information Society Directorate-General. ISBN 92-894-0735-2
-
K. Ductal, M. Bogdanowisz, F. Scapolo, J. Leijten, and J.-C. Burgelman, editors. Scenarios for Ambient Intelligence in 2010, IPTS Seville, February 2001. European Commission - Information Society Directorate-General. ISBN 92-894-0735-2.
-
(2001)
Scenarios for Ambient Intelligence in 2010
-
-
Ductal, K.1
Bogdanowisz, M.2
Scapolo, F.3
Leijten, J.4
Burgelman, J.-C.5
-
8
-
-
84874800178
-
A public-key cryptosystem and a signature scheme bases on discrete logarithms
-
T. ElGamal. A public-key cryptosystem and a signature scheme bases on discrete logarithms. IEEE Transactions on Information Theory, IT 31(4):469-472, 1985.
-
(1985)
IEEE Transactions on Information Theory, IT
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
10
-
-
84992227458
-
-
August
-
David F. Ferraiolo, Ravi Sandhu, Serban Gavrila, D. Richard Kuhn, and Ramaswamy Chandramouli. A proposed standard for role-based access control. 4(3):224-274, August 2001.
-
(2001)
A Proposed Standard for Role-based Access Control
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
11
-
-
0018780030
-
The analysis of distributed systems by means of predicate/transition-nets
-
G. Kahn, editor, Berlin - Heidelberg - New York. Springer Verlag
-
H. J. Genrich and K. Lautenbach. The analysis of distributed systems by means of predicate/transition-nets. In G. Kahn, editor, Semantic of Concurrent Computation, volume 70 of Lecture Notes in Computer Science, pages 123-146, Berlin - Heidelberg - New York, 1979. Springer Verlag.
-
(1979)
Semantic of Concurrent Computation, Volume 70 of Lecture Notes in Computer Science
, vol.70
, pp. 123-146
-
-
Genrich, H.J.1
Lautenbach, K.2
-
12
-
-
0026103655
-
A unified high-level petri net model for time-critical systems
-
feb
-
C. Ghezzi, D. Mandrioli, S. Morasca, and Mauro Pezzè. A unified high-level petri net model for time-critical systems. IEEE Transactions on Software Engineering, 17(2):160-172, feb 1991.
-
(1991)
IEEE Transactions on Software Engineering
, vol.17
, Issue.2
, pp. 160-172
-
-
Ghezzi, C.1
Mandrioli, D.2
Morasca, S.3
Pezzè, M.4
-
13
-
-
0030677524
-
A logical language for expressing authorizations
-
Oakland, CA, May
-
Sushil Jajodia, Pierangela Samarati, and V. S. Subrahmanian. A logical language for expressing authorizations. In Proceedings of the IEEE Symp. on Research in Security and Privacy, pages 31-42, Oakland, CA, May 1997.
-
(1997)
Proceedings of the IEEE Symp. on Research in Security and Privacy
, pp. 31-42
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
-
14
-
-
0031162048
-
A unified framework for enforcing multiple access control policies security
-
New York, May 13-15. ACM Press
-
Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, and Eliza Bertino. A Unified Framework for Enforcing Multiple Access Control Policies Security. In Proceedings of the ACM SIGMOD International Conference on Management of Data, volume 26,2 of SIGMOD Record, pages 474-485, New York, May 13-15 1997. ACM Press.
-
(1997)
Proceedings of the ACM SIGMOD International Conference on Management of Data, Volume 26,2 of SIGMOD Record
, vol.26
, pp. 474-485
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
Bertino, E.4
-
15
-
-
0242456740
-
Dependencies and separation of duty constraints in gtrbac
-
Elena Ferrari and David Ferraiolo, editors, ACM Press
-
James B. D. Joshi, Basit Shafiq, Arif Ghafoor, and Elisa Bertino. Dependencies and separation of duty constraints in gtrbac. In Elena Ferrari and David Ferraiolo, editors, Proceedings of the eighth ACM symposium on Access control models and technologies, pages 51-64. ACM Press, 2003.
-
(2003)
Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies
, pp. 51-64
-
-
Joshi, J.B.D.1
Shafiq, B.2
Ghafoor, A.3
Bertino, E.4
-
16
-
-
0242625198
-
An approach to engineer and enforce context constraints in an rbac environment
-
Elena Ferrari and David Ferraiolo, editors. . ACM Press
-
Gustaf Neumann and Mark Strembeck. An approach to engineer and enforce context constraints in an rbac environment. In Elena Ferrari and David Ferraiolo, editors. Proceedings of the eighth ACM symposium on Access control models and technologies, pages 65-79. ACM Press, 2003.
-
(2003)
Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies
, pp. 65-79
-
-
Neumann, G.1
Strembeck, M.2
-
17
-
-
0242491000
-
A model for role administration using organization structure
-
Ravi Sandhu and Elisa Bertino, editors, Monterey, CA, USA, June 3-4 . ACM SIGSAC, ACM Press
-
Sejong Oh and Ravi Sandhu. A model for role administration using organization structure. In Ravi Sandhu and Elisa Bertino, editors, Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT), pages 155-162, Monterey, CA, USA, June 3-4 2002. ACM SIGSAC, ACM Press.
-
(2002)
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 155-162
-
-
Oh, S.1
Sandhu, R.2
-
18
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb.
-
Ronald L. Rivest, A. Shamir, and L.M Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, Feb. 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
19
-
-
0003851399
-
-
J. Wiley & Sons, Inc, 2. edition
-
Bruce Schneier. Applied Cryptography: protocols, algorithms, and source code in C. J. Wiley & Sons, Inc, 2. edition, 1996.
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
20
-
-
0042181282
-
-
July, 21
-
The U.S. Department of Commerce. Safe Harbor Privacy Principles, July, 21 2000. http://www.export.gov/safeharbor/ SHPRINCIPLESFINAL.htm.
-
(2000)
Safe Harbor Privacy Principles
-
-
-
21
-
-
0242655853
-
Infinitive behaviour of petri nets
-
R. Valk. Infinitive behaviour of petri nets. Theoretical Computer Science, 25:311-341, 1983.
-
(1983)
Theoretical Computer Science
, vol.25
, pp. 311-341
-
-
Valk, R.1
-
22
-
-
0035790746
-
Modular authorization
-
Ravi Sandhu and Trent Jaeger, editors, Chantilly, Virginia, May 3-4 . ACM, ACM Press
-
Horst F. Wedde and Mario Lischka. Modular Authorization. In Ravi Sandhu and Trent Jaeger, editors, Proceedings of the sixth ACM Symposium on Access Control Models and Technologies (SACMAT), pages 97-105, Chantilly, Virginia, May 3-4 2001. ACM, ACM Press.
-
(2001)
Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 97-105
-
-
Wedde, H.F.1
Lischka, M.2
-
23
-
-
4143062615
-
Composing heterogenous access policies between organizations
-
Lisbon/ Portuagal, June, 3-6 . International Association for Development of the Information Society
-
Horst F. Wedde and Mario Lischka. Composing Heterogenous Access Policies between Organizations. In Proceedings of the IADIS International Conference e-Society 2003, Lisbon/ Portuagal, June, 3-6 2003. International Association for Development of the Information Society.
-
(2003)
Proceedings of the IADIS International Conference E-Society 2003
-
-
Wedde, H.F.1
Lischka, M.2
-
24
-
-
0242625205
-
Cooperative role-based administration
-
Elena Ferrari and David Ferraiolo, editors, Como, Italy, June, 2-3 . ACM, ACM Press
-
Horst F. Wedde and Mario Lischka. Cooperative Role-Based Administration. In Elena Ferrari and David Ferraiolo, editors, Proceedings of the eigth ACM Symposium on Access Control Models and Technologies (SACMAT), Como, Italy, June, 2-3 2003. ACM, ACM Press.
-
(2003)
Proceedings of the Eigth ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
Wedde, H.F.1
Lischka, M.2
|