-
1
-
-
46149103695
-
Toward an on-demand restricted delegation mechanism for grids
-
IEEE Press, Sep
-
M. Ahsant, J. Basney, O. Mulmo, A. J. Lee, and L. Johnsson, 'Toward an on-demand restricted delegation mechanism for grids." in Proceedings of the 7th IEEE/ACM International Conference on Grid Computing. IEEE Press, Sep. 2006, pp. 152-159.
-
(2006)
Proceedings of the 7th IEEE/ACM International Conference on Grid Computing
, pp. 152-159
-
-
Ahsant, M.1
Basney, J.2
Mulmo, O.3
Lee, A.J.4
Johnsson, L.5
-
2
-
-
46149101734
-
Grid delegation protocol
-
Oxford, UK, July
-
M. Ahsant, J. Basney, and O. Mulmo, "Grid delegation protocol." in Proceedings of the Workshop on Grid Security Practice and Experience, vol. YCS-2004-380. Oxford, UK, July 2004, pp. 81-91.
-
(2004)
Proceedings of the Workshop on Grid Security Practice and Experience
, vol.YCS-2004-380
, pp. 81-91
-
-
Ahsant, M.1
Basney, J.2
Mulmo, O.3
-
3
-
-
70349721047
-
-
projects/ogsa-wg
-
N. Nagaratnam, P. Janson, J. Dayka, A. Nadalin, F. Siebenlist, V. Welch, I. Foster, , and S. Tuecke, "The security architecture for open grid services, open grid services security architecture." http://forge. gridforum.org/projects/ogsa-wg, 2006.
-
(2006)
The security architecture for open grid services, open grid services security architecture
-
-
Nagaratnam, N.1
Janson, P.2
Dayka, J.3
Nadalin, A.4
Siebenlist, F.5
Welch, V.6
Foster, I.7
Tuecke, S.8
-
4
-
-
47249161837
-
Delegation issuing service for x.509
-
USA: NIST Technical Publication, IR 7224, April
-
D. W. Chadwick, "Delegation issuing service for x.509," in Proceedings of the 4th Annual PKI R&D Workshop. USA: NIST Technical Publication, IR 7224, April 2005, pp. 66-77.
-
(2005)
Proceedings of the 4th Annual PKI R&D Workshop
, pp. 66-77
-
-
Chadwick, D.W.1
-
5
-
-
84988603769
-
Towards a task-based paradigm for flexible and adaptable access control in distributed applications
-
New York, NY, USA: ACM Press
-
R. K. Thomas and R. S. Sandhu, "Towards a task-based paradigm for flexible and adaptable access control in distributed applications," in NSPW '92-93: Proceedings on the 1992-1993 workshop on New security paradigms. New York, NY, USA: ACM Press, 1993, pp. 138-142.
-
(1993)
NSPW '92-93: Proceedings on the 1992-1993 workshop on New security paradigms
, pp. 138-142
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
6
-
-
0003400251
-
-
MITRE Corporation, Bedford, MA, Tech. Rep, March
-
D. Bell and L. L. Padula, "Secure computer systems: Unified exposition and multics interpretation," MITRE Corporation, Bedford, MA, Tech. Rep., March 1976.
-
(1976)
Secure computer systems: Unified exposition and multics interpretation
-
-
Bell, D.1
Padula, L.L.2
-
7
-
-
0031118725
-
Access control for large collections
-
H. M. Gladney, "Access control for large collections," ACM Trans. Inf. Syst., vol. 15, no. 2, pp. 154-194, 1997.
-
(1997)
ACM Trans. Inf. Syst
, vol.15
, Issue.2
, pp. 154-194
-
-
Gladney, H.M.1
-
8
-
-
0016984825
-
Protection in operating systems
-
M. A. Harrison, W. L. Ruzzo, and J. D. Ullman, "Protection in operating systems," Commun. ACM, vol. 19, no. 8, pp. 461-471, 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
11
-
-
33744977269
-
A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments,
-
Ph.D. dissertation, University of Maryland Baltimore County, Baltimore MD 21250, September
-
L. Kagal, "A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments," Ph.D. dissertation, University of Maryland Baltimore County, Baltimore MD 21250, September 2004.
-
(2004)
-
-
Kagal, L.1
-
12
-
-
47249160525
-
-
IBM, Microsoft, RSA andVeriSign, May, Online, Available
-
WS-Trust, "Web service trust language." IBM, Microsoft, RSA andVeriSign, May 2004. [Online], Available: http://www-106.ibm.com/ developerworks/webservices/library/specification/ws-trust/
-
(2004)
Web service trust language
-
-
Trust, W.1
-
13
-
-
47249148252
-
-
S. Tuecke, V. Welch, D. Engen, L. Pearlman, and M. Thompson, Internet x.509 public key infrastructure (pki) proxy certificate profile. RFC 3820 (Proposed Standard), jun 2004. [Online], Available: http://www.ietf.org/rfc/rfc3820.txt
-
S. Tuecke, V. Welch, D. Engen, L. Pearlman, and M. Thompson, "Internet x.509 public key infrastructure (pki) proxy certificate profile." RFC 3820 (Proposed Standard), jun 2004. [Online], Available: http://www.ietf.org/rfc/rfc3820.txt
-
-
-
-
14
-
-
14544268675
-
Explicit trust delegation: Security for dynamic grids
-
D. F.Snelling, S. van den Berghe, and V. Qian, "Explicit trust delegation: Security for dynamic grids." FUJITSU Sci.Tech.Journal, vol. 40, pp. 282-294, 2004.
-
(2004)
FUJITSU Sci.Tech.Journal
, vol.40
, pp. 282-294
-
-
Snelling, D.F.1
van den Berghe, S.2
Qian, V.3
-
15
-
-
47249142223
-
-
V. Welch, I. Foster, K. C. M. O., P. L., T. S., G. J., and M. S. S. F., X.509 proxy certificate for dynamic delegation. in Proceedings of the 3rd Annual PKI Workshop, Gaithersburg MD, USA, April 2004, pp. 20-25.
-
V. Welch, I. Foster, K. C. M. O., P. L., T. S., G. J., and M. S. S. F., "X.509 proxy certificate for dynamic delegation." in Proceedings of the 3rd Annual PKI Workshop, Gaithersburg MD, USA, April 2004, pp. 20-25.
-
-
-
-
16
-
-
84887853842
-
A community authorization service for group collaboration
-
Washington, DC, USA: IEEE Computer Society
-
L. Pearlman, V. Welch, I. Foster, C. Kesselman, and S. Tuecke, "A community authorization service for group collaboration," in POLICY '02: Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02). Washington, DC, USA: IEEE Computer Society, 2002, p. 50.
-
(2002)
POLICY '02: Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
, pp. 50
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
-
17
-
-
3142653204
-
Voms, an authorization system for virtual organizations
-
R. Alfieri, R. Cecchini, V. Ciaschini, L. dell'Agnello, A. Frohner, A. Gianoli, K. Lorentey, and F. Spataro, "Voms, an authorization system for virtual organizations." in European Across Grids Conference, 2003, pp. 33-40.
-
(2003)
European Across Grids Conference
, pp. 33-40
-
-
Alfieri, R.1
Cecchini, R.2
Ciaschini, V.3
dell'Agnello, L.4
Frohner, A.5
Gianoli, A.6
Lorentey, K.7
Spataro, F.8
-
18
-
-
2942654406
-
Certificate-based authorization policy in a pki environment
-
M. R. Thompson, A. Essiari, and S. Mudumbai, "Certificate-based authorization policy in a pki environment," ACM Trans. Inf. Syst. Secur., vol. 6, no. 4, pp. 566-588, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.4
, pp. 566-588
-
-
Thompson, M.R.1
Essiari, A.2
Mudumbai, S.3
-
19
-
-
0037362986
-
Role-based access control with x.509 attribute certificates
-
D. W. Chadwick, A. Otenko, and E. Ball, "Role-based access control with x.509 attribute certificates," IEEE Internet Computing, vol. 7, no. 2, pp. 62-69, 2003.
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.2
, pp. 62-69
-
-
Chadwick, D.W.1
Otenko, A.2
Ball, E.3
-
20
-
-
84944456655
-
The prima system for privilege management, authorization and enforcement in grid environments
-
Washington, DC, USA: IEEE Computer Society
-
M. Lorch, D. B. Adams, D. Kafura, M. S. R. Koneni, A. Rathi, and S. Shah, "The prima system for privilege management, authorization and enforcement in grid environments," in GRID '03: Proceedings of the Fourth International Workshop on Grid Computing. Washington, DC, USA: IEEE Computer Society, 2003, p. 109.
-
(2003)
GRID '03: Proceedings of the Fourth International Workshop on Grid Computing
, pp. 109
-
-
Lorch, M.1
Adams, D.B.2
Kafura, D.3
Koneni, M.S.R.4
Rathi, A.5
Shah, S.6
-
21
-
-
47249095581
-
-
O. TC, extensible access control markup language (xacml) version 2.0, February 2005, Online, Available
-
O. TC, "extensible access control markup language (xacml) version 2.0," February 2005. [Online]. Available: http://docs.oasis-open.org/xacml/ 2.0/
-
-
-
-
22
-
-
0029424749
-
Rationale for the rbac96 family of access control models
-
New York, NY, USA: ACM Press
-
R. Sandhu, "Rationale for the rbac96 family of access control models," in RBAC '95: Proceedings of the first ACM Workshop on Role-based access control. New York, NY, USA: ACM Press, 1996, p. 9.
-
(1996)
RBAC '95: Proceedings of the first ACM Workshop on Role-based access control
, pp. 9
-
-
Sandhu, R.1
-
23
-
-
0031387996
-
Team-based access control (tmac): A primitive for applying role-based access controls in collaborative environments
-
New York, NY, USA: ACM Press
-
R. K. Thomas, "Team-based access control (tmac): a primitive for applying role-based access controls in collaborative environments," in RBAC '97: Proceedings of the second ACM workshop on Role-based access control. New York, NY, USA: ACM Press, 1997, pp. 13-19.
-
(1997)
RBAC '97: Proceedings of the second ACM workshop on Role-based access control
, pp. 13-19
-
-
Thomas, R.K.1
-
24
-
-
0035790754
-
Flexible team-based access control using contexts
-
C. K. Georgiadis, I. Mavridis, G. Pangalos, and R. K. Thomas, "Flexible team-based access control using contexts." in SACMAT, 2001, pp. 21-27.
-
(2001)
SACMAT
, pp. 21-27
-
-
Georgiadis, C.K.1
Mavridis, I.2
Pangalos, G.3
Thomas, R.K.4
-
25
-
-
0002841051
-
Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management
-
London, UK, UK: Chapman & Hall, Ltd
-
R. K. Thomas and R. S. Sandhu, "Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management," in Proceedings of the IFIP TCII WGI 1.3 Eleventh International Conference on Database Securty XI. London, UK, UK: Chapman & Hall, Ltd., 1998, pp. 166-181.
-
(1998)
Proceedings of the IFIP TCII WGI 1.3 Eleventh International Conference on Database Securty XI
, pp. 166-181
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
26
-
-
0035790651
-
A model of oasis role-based access control and its support for active security
-
New York, NY, USA: ACM Press
-
W. Yao, K. Moody, and J. Bacon, "A model of oasis role-based access control and its support for active security," in SACMAT '01: Proceedings of the sixth ACM symposium on Access control models and technologies. New York, NY, USA: ACM Press, 2001, pp. 171-181.
-
(2001)
SACMAT '01: Proceedings of the sixth ACM symposium on Access control models and technologies
, pp. 171-181
-
-
Yao, W.1
Moody, K.2
Bacon, J.3
-
27
-
-
1642345187
-
Automated trust negotiation over the internet
-
in The, Orlando, FL, July
-
T. Yu, M. Winslett, and K.E.Seamons, "Automated trust negotiation over the internet." in The 6th World Multiconference on Systemics. Cybernetics and Informatics, Orlando, FL, July 2002.
-
(2002)
6th World Multiconference on Systemics. Cybernetics and Informatics
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|