-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A calculus for access control in distributed systems. In ACM TOPLAS, 15(4), pp 706-734, 1993.
-
(1993)
ACM TOPLAS
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
2
-
-
67650206456
-
Access control based on execution history
-
M. Abadi and C. Fournet. Access control based on execution history. In ISOC NDSS, 2003.
-
(2003)
ISOC NDSS
-
-
Abadi, M.1
Fournet, C.2
-
3
-
-
4544279898
-
-
D. Box, F. Curbera, M. Hondo, C. Kaler, D. Langworthy, A. Nadalin, J. N. Nagaratnam, M. Nottingham, C. V. Riegen, and J. Shewchuk. Web services policy framework. http://www.ibm.com/developerworks/library/ws-polfram/.
-
Web services policy framework
-
-
Box, D.1
Curbera, F.2
Hondo, M.3
Kaler, C.4
Langworthy, D.5
Nadalin, A.6
Nagaratnam, J.N.7
Nottingham, M.8
Riegen, C.V.9
Shewchuk, J.10
-
4
-
-
4544335903
-
-
D. Box, M. Hondo, C. Kaler, H. Maruyama, A. Nadalin, J. N. Nagaratnam, P. patrick, C. V. Riegen, and J. Shewchuk. Web services policy assertions language. http://www.ibm.com/developerworks/library/ws-polas/.
-
Web services policy assertions language
-
-
Box, D.1
Hondo, M.2
Kaler, C.3
Maruyama, H.4
Nadalin, A.5
Nagaratnam, J.N.6
patrick, P.7
Riegen, C.V.8
Shewchuk, J.9
-
7
-
-
46849111179
-
Automating DAML-S services composition using SHOP2
-
DAML
-
DAML. Automating DAML-S services composition using SHOP2. In 2nd ISWC, 2002.
-
(2002)
2nd ISWC
-
-
-
8
-
-
33749060324
-
-
G. Della-Libera, P. Hallam-Baker, M. Hondo, T. Janczuk, C. Kaler, H. Maruyama, J. N. Nagaratnam, A. Nash, R. Philpott, H. Prafullchandra, J. Shewchuk, and E. W. Zolfonoon. Web services security policy language. http://www.verisign.com/wss/WS-SecurityPolicy.pdf.
-
Web services security policy language
-
-
Della-Libera, G.1
Hallam-Baker, P.2
Hondo, M.3
Janczuk, T.4
Kaler, C.5
Maruyama, H.6
Nagaratnam, J.N.7
Nash, A.8
Philpott, R.9
Prafullchandra, H.10
Shewchuk, J.11
Zolfonoon, E.W.12
-
10
-
-
3543121920
-
Access control by tracking shallow execution history
-
P. W. L. Fong. Access control by tracking shallow execution history. In IEEE Symposium on Security and Privacy, pp. 43-55, 2004.
-
(2004)
IEEE Symposium on Security and Privacy
, pp. 43-55
-
-
Fong, P.W.L.1
-
11
-
-
84888249425
-
Synthesizing monitors for safety properties
-
8th TACAS
-
K. Havelund and G. Rosu. Synthesizing monitors for safety properties. In 8th TACAS, Vol 2280 LNCS, pp 342-356, 2002.
-
(2002)
LNCS
, vol.2280
, pp. 342-356
-
-
Havelund, K.1
Rosu, G.2
-
13
-
-
33745725093
-
A framework for concrete reputation-systems with applications to history based access control
-
K. Krakow, M. Nielsen, and V. Sassone. A framework for concrete reputation-systems with applications to history based access control. In 12th ACM CCS, 2005.
-
(2005)
12th ACM CCS
-
-
Krakow, K.1
Nielsen, M.2
Sassone, V.3
-
16
-
-
20444458407
-
Supporting policy-driven behavior in web services: Experiences and issues
-
N. Mukhi and P. Plebani. Supporting policy-driven behavior in web services: Experiences and issues. In ICSOC, 2004.
-
(2004)
ICSOC
-
-
Mukhi, N.1
Plebani, P.2
-
20
-
-
0030086382
-
Role-based access control models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. In IEEE Computer, Vol. 29, No. 2, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
21
-
-
0242540392
-
An access control language for web services
-
E. G. Sirer and K. Wang. An access control language for web services. In 7th ACM SACMAT, 2002.
-
(2002)
7th ACM SACMAT
-
-
Sirer, E.G.1
Wang, K.2
-
22
-
-
19944392604
-
Augmenting semantic web service description with compositional specification
-
M. Solanki, A. Cau, and H. Zedan. Augmenting semantic web service description with compositional specification. In 13th WWW Conference, 2004.
-
(2004)
13th WWW Conference
-
-
Solanki, M.1
Cau, A.2
Zedan, H.3
|