-
1
-
-
0036510173
-
A content-based authorization model for digital libraries
-
ADAM, N., ATLURI, V., BERTINO, E., AND FERRARI, E. 2002. A content-based authorization model for digital libraries. IEEE Trans. Knowledge Data Eng. 14, 2 (Mar/Apr).
-
(2002)
IEEE Trans. Knowledge Data Eng.
, vol.14
, Issue.2 MAR-APR
-
-
Adam, N.1
Atluri, V.2
Bertino, E.3
Ferrari, E.4
-
2
-
-
84956993736
-
Role-based authorization constraints specification
-
AHN, G. AND SANDHU, R. 2000. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3, 4 (Nov.).
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.4 NOV.
-
-
Ahn, G.1
Sandhu, R.2
-
4
-
-
0002198395
-
Towards a theory of declarative knowledge
-
J- Minker, ed. Morgan Kaufmann Publishers
-
APT, K., BLAIR, H., AND WALKER, A. 1988. Towards a theory of declarative knowledge. In Foundations of Deductive Databases and Logic Programming, J- Minker, ed. Morgan Kaufmann Publishers.
-
(1988)
Foundations of Deductive Databases and Logic Programming
-
-
Apt, K.1
Blair, H.2
Walker, A.3
-
5
-
-
0008724838
-
An authorization model for temporal and derived data: Securing information portals
-
ATLUKI, V. AND GAL, A. 2002. An authorization model for temporal and derived data: Securing information portals. ACM Trans. Inf. Syst. Secur. 5, 1 (Feb.).
-
(2002)
ACM Trans. Inf. Syst. Secur.
, vol.5
, Issue.1 FEB.
-
-
Atluki, V.1
Gal, A.2
-
6
-
-
84944039217
-
Translating role-based access control policy within context
-
Lecture Notes in Computer Science, 1995, Springer Verlag
-
BACON, J., LLOYD, M., AND MOODY, K. 2001. Translating role-based access control policy within context. In Proceedings of the 2nd International Workshop on Policies for Distributed Systems and Networks (POLICY). Lecture Notes in Computer Science, 1995, Springer Verlag.
-
(2001)
Proceedings of the 2nd International Workshop on Policies for Distributed Systems and Networks (POLICY)
-
-
Bacon, J.1
Lloyd, M.2
Moody, K.3
-
9
-
-
84944792110
-
TRBAC: A temporal role-based access control model
-
BERTINO, E., BONATTI, P., AND FERRARI, E. 2001. TRBAC: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4, 3 (Aug.).
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3 AUG.
-
-
Bertino, E.1
Bonatti, P.2
Ferrari, E.3
-
10
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
BERTINO, E., FERRARI, E., AND ATLURI, V. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2, 1 (Feb.).
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1 FEB.
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
12
-
-
0003551091
-
-
W3 Consortium Recommendation
-
BRAY, T., PAOLI, J., SPERBERG-MCQUEEN, C., MALER, E., AND YERGEAU, F. 2004. Extensible Markup Language (XML) version 1.0, 3rd edition. Available at http://www.w3.org/TR/REC-xml/. W3 Consortium Recommendation.
-
(2004)
Extensible Markup Language (XML) Version 1.0, 3rd Edition
-
-
Bray, T.1
Paoli, J.2
Sperberg-Mcqueen, C.3
Maler, E.4
Yergeau, F.5
-
14
-
-
0242456748
-
Models for coalition-based access control (CBAC)
-
COHEN, E., THOMAS, R., WINSBOROUGH, W., AND SHANDS, D. 2002. Models for coalition-based access control (CBAC). In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT).
-
(2002)
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
Cohen, E.1
Thomas, R.2
Winsborough, W.3
Shands, D.4
-
15
-
-
0035791053
-
Securing context-aware applications using environment roles
-
COVINGTON, M., LONG, W., SRINIVASAN, S., DEY, A., AHAMAD, M., AND ABOWD, G. 2001. Securing context-aware applications using environment roles. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT).
-
(2001)
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
Covington, M.1
Long, W.2
Srinivasan, S.3
Dey, A.4
Ahamad, M.5
Abowd, G.6
-
16
-
-
0016949746
-
A lattice model of secure information flow
-
DENNING, D. 1976. A lattice model of secure information flow. Commun. ACM 19, 5 (May).
-
(1976)
Commun. ACM
, vol.19
, Issue.5 MAY
-
-
Denning, D.1
-
19
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate Intranet
-
FERRAIOLO, D., BARKLEY, J., AND KUHN, D. 1999. A role-based access control model and reference implementation within a corporate Intranet. ACM Trans. Inf. Syst. Secur. 2, 1 (Feb.).
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1 FEB.
-
-
Ferraiolo, D.1
Barkley, J.2
Kuhn, D.3
-
20
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
FERRAIOLO, D., SANDHU, R., GAVRILA, S., KUHN, D., AND CHANDRAMOULI, R. 2001. Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4, 3 (Aug.).
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3 AUG.
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
21
-
-
0003880013
-
-
Addison-Wesley
-
GAMMA, E., HELM, R., JOHNSON, R., AND VLISSIDES, J. 1995. Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley.
-
(1995)
Design Patterns: Elements of Reusable Object-Oriented Software
-
-
Gamma, E.1
Helm, R.2
Johnson, R.3
Vlissides, J.4
-
22
-
-
0035790754
-
Flexible team-based access control using contexts
-
GEORGIADIS, C., MAVRIDIS, I., PANGALOS, G., AND THOMAS, R. 2001. Flexible team-based access control using contexts. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT).
-
(2001)
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
Georgiadis, C.1
Mavridis, I.2
Pangalos, G.3
Thomas, R.4
-
26
-
-
85013593271
-
Flexible control of downloaded executable content
-
JAEGER, T., PRAKASH, A., LIEDTKE, J., AND ISLAM, N. 1999. Flexible control of downloaded executable content. ACM Trans. Inf. Syst. Secur. 2, 2 (May).
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.2 MAY
-
-
Jaeger, T.1
Prakash, A.2
Liedtke, J.3
Islam, N.4
-
27
-
-
0001619596
-
Flexible support for multiple access control policies
-
JAJODIA, S., SAMARATI, P., SAPINO, M., AND SUBRAHMANIAN, V. 2001. Flexible support for multiple access control policies. ACM Trans. Datab. Syst. 26, 2 (June).
-
(2001)
ACM Trans. Datab. Syst.
, vol.26
, Issue.2 JUNE
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.3
Subrahmanian, V.4
-
28
-
-
54649083214
-
Scenario management: An interdisciplinary approach
-
JARKE, M., BUI, X., AND CARROLL, J. 1998. Scenario management: An interdisciplinary approach. Requirements Engineering Journal 3, 3/4.
-
(1998)
Requirements Engineering Journal
, vol.3
, Issue.3-4
-
-
Jarke, M.1
Bui, X.2
Carroll, J.3
-
29
-
-
77952407814
-
Organization based access control
-
KALAM, A. E., BAIDA, R. E., BALBIANI, P., BENFESHAT, S., CUPPENS, F., DESWARTE, Y., MIÈGE, A., SAUREL, C., AND TROUESSIN, G. 2003. Organization based access control. In Proceedings of the 4th International Workshop on Policies for Distributed Systems and Networks (POLICY).
-
(2003)
Proceedings of the 4th International Workshop on Policies for Distributed Systems and Networks (POLICY)
-
-
Kalam, A.E.1
Baida, R.E.2
Balbiani, P.3
Benfeshat, S.4
Cuppens, F.5
Deswarte, Y.6
Miège, A.7
Saurel, C.8
Trouessin, G.9
-
31
-
-
0036187194
-
Web E-speak: Facilitating web-based E-services
-
KIM, W., GRAUPNER, S., SAHAI, A., LENKOV, D., CHUDASAMA, C., WHEDBEE, S., LUO, Y., DESAI, B., MULLINGS, H., AND WONNG, P. 2002. Web E-speak: Facilitating web-based E-services. IEEE Multimedia 9, 1.
-
(2002)
IEEE Multimedia
, vol.9
, Issue.1
-
-
Kim, W.1
Graupner, S.2
Sahai, A.3
Lenkov, D.4
Chudasama, C.5
Whedbee, S.6
Luo, Y.7
Desai, B.8
Mullings, H.9
Wonng, P.10
-
32
-
-
0033646048
-
Amodel of accountability, confidentiality and override for healthcare and other applications
-
LONGSTAFF, J., LOCKRER, M., CAPPER, G., AND THICK, M. 2000. Amodel of accountability, confidentiality and override for healthcare and other applications. In Proceedings of the 5th ACM Workshop on Role-Based Access Control.
-
(2000)
Proceedings of the 5th ACM Workshop on Role-based Access Control
-
-
Longstaff, J.1
Lockrer, M.2
Capper, G.3
Thick, M.4
-
34
-
-
2342502819
-
Preserving privacy in environments with location-based applications
-
MYLES, G., FRIDAY, A., AND DAVIES, N. 2003. Preserving privacy in environments with location-based applications. IEEE Pervasive Comput. 2, 1 (Jan.-Mar.).
-
(2003)
IEEE Pervasive Comput.
, vol.2
, Issue.1 JAN.-MAR.
-
-
Myles, G.1
Friday, A.2
Davies, N.3
-
38
-
-
8444251196
-
Realization of a context-dependent access control mechanism on a commercial platform
-
NITSCHE, U., HOLBEIN, R., MORGER, O., AND TEUFEL, S. 1998. Realization of a context-dependent access control mechanism on a commercial platform. In Proceedings of the 14th International Information Security Conference (IFIP/SEC).
-
(1998)
Proceedings of the 14th International Information Security Conference (IFIP/SEC)
-
-
Nitsche, U.1
Holbein, R.2
Morger, O.3
Teufel, S.4
-
42
-
-
0030086382
-
Role-based access control models
-
SANDHU, R., COYNE, E., FEINSTEIN, H., AND YOUMAN, C. 1996. Role-based access control models. IEEE Comput. 29, 2 (Feb.).
-
(1996)
IEEE Comput.
, vol.29
, Issue.2 FEB.
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
43
-
-
0033337366
-
There is more to context than location
-
SCHMIDT, A., BEIGL, M., AND GELLERSEN, H. 1999. There is more to context than location. Comput. Graphics 23, 6 (Dec.).
-
(1999)
Comput. Graphics
, vol.23
, Issue.6 DEC.
-
-
Schmidt, A.1
Beigl, M.2
Gellersen, H.3
-
45
-
-
0031387996
-
Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments
-
THOMAS, R. 1997. Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments. In Proceedings of the ACM Workshop on Role Based Access Control.
-
(1997)
Proceedings of the ACM Workshop on Role Based Access Control
-
-
Thomas, R.1
-
46
-
-
0002841051
-
Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management
-
THOMAS, R. AND SANDHU, R. 1997. Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. In Proceedings of the IFIP WG11.3 Conference on Database Security.
-
(1997)
Proceedings of the IFIP WG11.3 Conference on Database Security
-
-
Thomas, R.1
Sandhu, R.2
-
48
-
-
0034291619
-
Handling obstacles in goal-oriented requirements engineering
-
VAN LAMSWEERDE, A. AND LETIER, E. 2000. Handling obstacles in goal-oriented requirements engineering. IEEE Trans. Softw. Eng. 26, 10 (Oct.).
-
(2000)
IEEE Trans. Softw. Eng.
, vol.26
, Issue.10 OCT.
-
-
Van Lamsweerde, A.1
Letier, E.2
-
49
-
-
0032620331
-
Team-and-role-based organizational context and access control for cooperative hypermedia environments
-
WANG, W. 1999. Team-and-role-based organizational context and access control for cooperative hypermedia environments. In Proceedings of the ACM Conference on Hypertext and Hypermedia.
-
(1999)
Proceedings of the ACM Conference on Hypertext and Hypermedia
-
-
Wang, W.1
-
50
-
-
0038389318
-
They know where you are
-
WARRIOR, J., MCHENRY, E., AND MCGEE, K. 2003. They know where you are. IEEE Spectrum 40, 7 (July).
-
(2003)
IEEE Spectrum
, vol.40
, Issue.7 JULY
-
-
Warrior, J.1
Mchenry, E.2
Mcgee, K.3
-
51
-
-
0001853125
-
The computer for the 21st Century
-
WEISER, M. 1991. The computer for the 21st Century. Sci. Am. 265, 3 (Sep.).
-
(1991)
Sci. Am.
, vol.265
, Issue.3 SEP.
-
-
Weiser, M.1
-
52
-
-
84976653144
-
Some computer science issues in ubiquitous computing
-
WEISER, M. 1993. Some computer science issues in ubiquitous computing. Commun. ACM 36, 7 (July).
-
(1993)
Commun. ACM
, vol.36
, Issue.7 JULY
-
-
Weiser, M.1
-
53
-
-
0242709331
-
A context-related authorization and access control method based on RBAC: A case study from the health care domain
-
WILIKENS, M., FERITI, S., SANNA, A., AND MASERA, M. 2002. A context-related authorization and access control method based on RBAC: A case study from the health care domain. In Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT).
-
(2002)
Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
Wilikens, M.1
Feriti, S.2
Sanna, A.3
Masera, M.4
-
54
-
-
34748863820
-
Context-dependent access control for web-based collaboration environments with role-based approach
-
Lecture Notes in Computer Science, Springer Verlag
-
WOLF, R. AND SCHNEIDER, M. 2003. Context-dependent access control for web-based collaboration environments with role-based approach. In Proceedings of the 2nd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security. Lecture Notes in Computer Science, vol. 2776, Springer Verlag.
-
(2003)
Proceedings of the 2nd International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security
, vol.2776
-
-
Wolf, R.1
Schneider, M.2
|