-
1
-
-
46749116762
-
-
eXtensible Access Control Markup Language (XACML) Version 2. Standard, OASIS, February 2005
-
eXtensible Access Control Markup Language (XACML) Version 2. Standard, OASIS, February 2005.
-
-
-
-
2
-
-
46749086620
-
-
Web Services Security: Key Industry Standards and Emerging Specifications Used for Securing Web Services. White Paper, Computer Associates, January 2005.
-
Web Services Security: Key Industry Standards and Emerging Specifications Used for Securing Web Services. White Paper, Computer Associates, January 2005.
-
-
-
-
3
-
-
46749137865
-
-
D. Fensel and C. Bussler. The Web Service Modeling Framework WSMF. Submitted for Electronic Commerce Research and Applications, 2002.
-
D. Fensel and C. Bussler. The Web Service Modeling Framework WSMF. Submitted for Electronic Commerce Research and Applications, 2002.
-
-
-
-
4
-
-
33646516652
-
Ws-AC: A Fine Grained Access Control System for Web Services
-
September
-
E. Bertino, A. C. Squicciarini, I. Paloscia, and L. Martino. Ws-AC: A Fine Grained Access Control System for Web Services. World Wide Web, 9(2):143-171, September 2005.
-
(2005)
World Wide Web
, vol.9
, Issue.2
, pp. 143-171
-
-
Bertino, E.1
Squicciarini, A.C.2
Paloscia, I.3
Martino, L.4
-
5
-
-
1942532238
-
XML-Based Specification for Web Services Document Security
-
April
-
R. Bhatti, E. Bertino, A. Ghafoor, and J. B. Joshi. XML-Based Specification for Web Services Document Security. IEEE Computer Society, 37(4):41-49, April 2004.
-
(2004)
IEEE Computer Society
, vol.37
, Issue.4
, pp. 41-49
-
-
Bhatti, R.1
Bertino, E.2
Ghafoor, A.3
Joshi, J.B.4
-
6
-
-
85025819125
-
-
F. Cuppens, N. Cuppens-Boulahia, and C. Coma. 020: Virtual Private Organizations to Manage Security Policy Interoperability. In ICISS, pages 101-115, 2006.
-
F. Cuppens, N. Cuppens-Boulahia, and C. Coma. 020: Virtual Private Organizations to Manage Security Policy Interoperability. In ICISS, pages 101-115, 2006.
-
-
-
-
7
-
-
0035342199
-
Cover story management
-
F. Cuppens and A. Gabillon. Cover story management. Data Knowl. Eng., 37(2):177-201, 2001.
-
(2001)
Data Knowl. Eng
, vol.37
, Issue.2
, pp. 177-201
-
-
Cuppens, F.1
Gabillon, A.2
-
9
-
-
46749138251
-
-
V. D. Gligor, H. Khurana, R. K. Koleva, V. G. Bharadwaj, and J. S. Baras. On the Negotiation of Access Control Policies. Lecture Notes In Computer Science, 2001.
-
(2001)
On the Negotiation of Access Control Policies. Lecture Notes In Computer Science
-
-
Gligor, V.D.1
Khurana, H.2
Koleva, R.K.3
Bharadwaj, V.G.4
Baras, J.S.5
-
10
-
-
0037392527
-
Standards for XML and Web services security
-
April
-
Martin Naedele. Standards for XML and Web services security. Computer, 36(4):96-98, April 2003.
-
(2003)
Computer
, vol.36
, Issue.4
, pp. 96-98
-
-
Naedele, M.1
-
12
-
-
79956107600
-
Trust Negotiation as an Authorization Service forWeb Services
-
April
-
L. Olson, M. Winslett, G. Tonti, N. Seeley, A. Uszok, and J. Bradshaw. Trust Negotiation as an Authorization Service forWeb Services. 22nd International Conference on Data Engineering Workshops (ICDEW'06), April 2006.
-
(2006)
22nd International Conference on Data Engineering Workshops (ICDEW'06)
-
-
Olson, L.1
Winslett, M.2
Tonti, G.3
Seeley, N.4
Uszok, A.5
Bradshaw, J.6
-
13
-
-
30644473909
-
Adaptive trust negotiation and access control
-
T. Ryutov, L. Zhou, C. Neuman, T. Leithead, and K. Seamons. Adaptive trust negotiation and access control. Tenth ACM symposium on Access control models and technologies, pages 139-146, 2005.
-
(2005)
Tenth ACM symposium on Access control models and technologies
, pp. 139-146
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Leithead, T.4
Seamons, K.5
-
14
-
-
85056545124
-
Limiting the Disclosure of Access Control Policies During Automated Trust Negotiation
-
San Diego, CA, April
-
K. Seamons, M. Winslett, and T. Yu. Limiting the Disclosure of Access Control Policies During Automated Trust Negotiation. In Network and Distributed System Security Symposium, San Diego, CA, April 2001.
-
(2001)
Network and Distributed System Security Symposium
-
-
Seamons, K.1
Winslett, M.2
Yu, T.3
-
15
-
-
60849099714
-
-
K. Seamons, M. Winslett, T. Yu, T. Chan, E. Child, M. Halcrow, A. Hess, J. Holt, J. Jacobson, R. Jarvis, A. Patty, B. Smith, T. Sundelin, and L. Yu. Trust Negotiation in Dynamic Coalitions. DARPA Information Survivability Conference and Exposition (DISCEX'03), 2:240-245, April 2003.
-
K. Seamons, M. Winslett, T. Yu, T. Chan, E. Child, M. Halcrow, A. Hess, J. Holt, J. Jacobson, R. Jarvis, A. Patty, B. Smith, T. Sundelin, and L. Yu. Trust Negotiation in Dynamic Coalitions. DARPA Information Survivability Conference and Exposition (DISCEX'03), 2:240-245, April 2003.
-
-
-
-
17
-
-
0036871183
-
Negotiating trust in the Web
-
November
-
M. Winslett, T. Yu, K. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu. Negotiating trust in the Web. Internet Computing, IEEE, 6(6):30-37, November 2002.
-
(2002)
Internet Computing, IEEE
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
18
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
February
-
T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security (TISSEC), 6(1):1-42, February 2003.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
19
-
-
34047244882
-
Attribute based access control (ABAC): A new access control approach for service oriented architectures
-
April
-
E. Yuan and J. Tong. Attribute based access control (ABAC): a new access control approach for service oriented architectures. Ottawa New Challenges for Access Control Workshop, April 2005.
-
(2005)
Ottawa New Challenges for Access Control Workshop
-
-
Yuan, E.1
Tong, J.2
|