-
1
-
-
0032027597
-
Modeling and analysis of workflows using petri nets
-
Adam N., Atluri V. and Huang W.-K. (1998). Modeling and analysis of workflows using petri nets. J Int. Inf. Syst. 10(2): 131-158
-
(1998)
J Int. Inf. Syst.
, vol.10
, Issue.2
, pp. 131-158
-
-
Adam, N.1
Atluri, V.2
Huang, W.-K.3
-
2
-
-
84956993736
-
Role-based authorization constraints specification
-
Ahn G.-J. and Sandhu R. (2000). Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3(4): 207-226
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.4
, pp. 207-226
-
-
Ahn, G.-J.1
Sandhu, R.2
-
4
-
-
84948950552
-
A model for attribute-based uSer-role assignment
-
In: Las Vegas, Nevada, December
-
Al-Kahtani, M.A., Sandhu, R.: A model for attribute-based uSer-role assignment. In: 18th Annual Computer Security Applications Conference (ACSAC'02), Las Vegas, Nevada, December 2002
-
(2002)
18th Annual Computer Security Applications Conference (ACSAC'02)
-
-
Al-Kahtani, M.A.1
Sandhu, R.2
-
5
-
-
84949747356
-
An authorization model for workflows
-
In: LNCS
-
Atluri, V., Huang, W.-K.: An authorization model for workflows. In: ESORICS'96, vol. 1146. LNCS (1996)
-
(1996)
ESORICS'96
, vol.1146
-
-
Atluri, V.1
Huang, W.-K.2
-
6
-
-
4944223328
-
Cassandra: Flexible trust management, applied to eelctronic health records
-
In: Pacific Grove, CA, June
-
BeckeF, M., Sewell, P.: Cassandra: flexible trust management, applied to eelctronic health records. In: The Computer Security Foundations Workshop (CSFW), Pacific Grove, CA, June 2004
-
(2004)
The Computer Security Foundations Workshop (CSFW)
-
-
Becker, M.1
Sewell, P.2
-
7
-
-
0003400251
-
Secure computer systems: Unified exposition and multics interpretation
-
Technical Report ESD-TR-75-306, MTR-2997, Rev. 1, MITRE Corporation, Bedfort, MA, March
-
Bell, D.E., La PaduUa, L.J.: Secure computer systems: unified exposition and multics interpretation. Technical Report ESD-TR-75-306, MTR-2997, Rev. 1, MITRE Corporation, Bedfort, MA, March 1976
-
(1976)
-
-
Bell, D.E.1
La Padula, L.J.2
-
9
-
-
30644474741
-
GEO-RBAC: A spatially aware RBAC
-
In: Chantilly, VA, USA, May
-
Bertino, E., Catania, E., Damiani, M., Persasca, P.: GEO-RBAC: A spatially aware RBAC. In: 10th ACM Symposium on Access Control Models and Technologies (SACMAT 2005), Chantilly, VA, USA, May 2001
-
(2001)
10th ACM Symposium on Access Control Models and Technologies (SACMAT 2005)
-
-
Bertino, E.1
Catania, E.2
Damiani, M.3
Persasca, P.4
-
10
-
-
0002848811
-
An Authorization Model for Supporting the Specification and Enforcement of Authorization Constraints in Workflow Management Systems
-
Bertino E., Ferrari E. and Atluri V. (1999). An Authorization Model for Supporting the Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Trans. Inf. Syst. Secur. 2(1): 65-104
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
11
-
-
0002937996
-
A context-sensitive access control model and prototype implementation
-
In: Beijing, China, August
-
Cholewka, D.G., Botha, R.A., Eloff, J.H.P.: A context-sensitive access control model and prototype implementation. In: IFIP TC 11 16th Annual Working Conference on Information Security, Beijing, China, August 2000
-
(2000)
IFIP TC 11 16th Annual Working Conference on Information Security
-
-
Cholewka, D.G.1
Botha, R.A.2
Eloff, J.H.P.3
-
14
-
-
0035791053
-
Securing context-aware applications using environment roles
-
In: Chantilly, Virginia, USA, May
-
Covington, M.J., Long, W., Srinivasan, S., Dey, A., Ahamad, M., Abowd, G.: Securing context-aware applications using environment roles. In: 6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001), Chantilly, Virginia, USA, May 2001
-
(2001)
6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001)
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dey, A.4
Ahamad, M.5
Abowd, G.6
-
15
-
-
0141876269
-
Generalized role-based access control for securing future applications
-
In: Baltimore, MD, USA, October
-
Covington, M.J., Moyer, M.J., Ahamad, M.: Generalized role-based access control for securing future applications. In: Proceedings of the 23rd National Information Systems Security Conference, (NISSC), Baltimore, MD, USA, October 2000
-
(2000)
Proceedings of the 23rd National Information Systems Security Conference, (NISSC)
-
-
Covington, M.J.1
Moyer, M.J.2
Ahamad, M.3
-
16
-
-
34347273369
-
High-level conflict management strategies in advanced access control models
-
July
-
Cuppens, F., Cuppens-Boulahia, N., Ben Ghorbel M.: High-level conflict management strategies in advanced access control models. Electronic Notes in Theoretical Computer Science (ENTCS), 186, July 2007
-
(2007)
Electronic Notes in Theoretical Computer Science (ENTCS)
, vol.186
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Ben Ghorbel, M.3
-
17
-
-
33746441974
-
Inheritance hierarchies in the Or-BAC Model and Application in a network environnement
-
In: Turku, Finlande, July
-
Cuppens, F., Cuppens-Boulahia, N., Miège, A.: Inheritance hierarchies in the Or-BAC Model and Application in a network environnement. In: 2nd Foundation of Computer Security Workshop, Turku, Finlande, July (2004)
-
(2004)
2nd Foundation of Computer Security Workshop
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Miège, A.3
-
18
-
-
28144457207
-
Nomad: A Security Model with Non Atomic Actions and Deadlines
-
In: Aix en Provence, France
-
Cuppens, F., Cuppens-Boulahia, N., Sans, T.: Nomad: A Security Model with Non Atomic Actions and Deadlines. In: The computer security foundations workshop (CSFW), Aix en Provence, France (2005)
-
(2005)
The Computer Security Foundations Workshop (CSFW)
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Sans, T.3
-
20
-
-
0001809810
-
The Ponder Policy Specification Language
-
In: Bristol, UK, January
-
Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language. In: International Workshop, Policies for Distributed Systems and Neworks (Policy 2001), Bristol, UK, January (2001)
-
(2001)
International Workshop, Policies for Distributed Systems and Neworks (Policy 2001)
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
21
-
-
63249104009
-
Using contextual security policies for threat response
-
Debar, H., Thomas, Y., Cuppens-Boulahia, N., Cuppens, F.: Using contextual security policies for threat response. In: Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA) (2006)
-
(2006)
Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)
-
-
Debar, H.1
Thomas, Y.2
Cuppens-Boulahia, N.3
Cuppens, F.4
-
24
-
-
0012039788
-
Context and role based hybrid access control for collaborative environments
-
In: Reykjavik, Iceland, October
-
Georgiadis, C., Mavridis, I., Pangalos, G.: Context and role based hybrid access control for collaborative environments. In: Proceedings of the Fifth Nordic Workshop on Secure IT Systems - Encouraging Co-operation (NORDSEC 2000), Reykjavik, Iceland, October 2000
-
(2000)
Proceedings of the Fifth Nordic Workshop on Secure IT Systems - Encouraging Co-operation (NORDSEC 2000)
-
-
Georgiadis, C.1
Mavridis, I.2
Pangalos, G.3
-
25
-
-
0035790754
-
Flexible team-based access control using contexts
-
In: Chantilly, VA, USA, May
-
Georgiadis, C.K., Mavridis, I., Pangalos, G., Thomas R.K.: Flexible team-based access control using contexts. In: 6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001), Chantilly, VA, USA, May (2001)
-
(2001)
6th ACM Symposium on Access Control Models and Technologies (SACMAT 2001)
-
-
Georgiadis, C.K.1
Mavridis, I.2
Pangalos, G.3
Thomas, R.K.4
-
27
-
-
4143096907
-
Spatial role-based access control model for wireless networks
-
In: October
-
Hansen, F., Oleshchuk, V.: Spatial role-based access control model for wireless networks. In: IEEE 58th Vehicular Technology Conference, VTC 2003-Fall, vol. 3, October (2003)
-
(2003)
IEEE 58th Vehicular Technology Conference, VTC 2003-Fall
, vol.3
-
-
Hansen, F.1
Oleshchuk, V.2
-
28
-
-
0016984825
-
Protection in operating systems
-
Harrison M., Ruzzo W. and Ullman J. (1976). Protection in operating systems. CACM 19(8): 461-471
-
(1976)
CACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.1
Ruzzo, W.2
Ullman, J.3
-
29
-
-
47649109405
-
Realization of a context-dependent access control mechanism on a commercial platform
-
In: Vienna-Budapest, Austria-Hungary, August 31-September 4
-
Holbein, R., Morger, O., Nitsche, U., Teufel, S.: Realization of a context-dependent access control mechanism on a commercial platform. In: IFIP 14th International Conference on Information Security (IFIP/ Sec'98), Vienna-Budapest, Austria-Hungary, August 31-September 4 1998
-
(1998)
IFIP 14th International Conference on Information Security (IFIP/Sec'98)
-
-
Holbein, R.1
Morger, O.2
Nitsche, U.3
Teufel, S.4
-
30
-
-
0011795795
-
Provisional authorizations
-
In: Ghosh, A. (eds) Kluwer, Norwell
-
Jajodia S., Kudo M. and Subrahmanian V.S. (2001). Provisional authorizations. In: Ghosh, A. (eds) E-commerce Security and Privacy, pp 133-159. Kluwer, Norwell
-
(2001)
E-commerce Security and Privacy
, pp. 133-159
-
-
Jajodia, S.1
Kudo, M.2
Subrahmanian, V.S.3
-
31
-
-
0030677524
-
A logical language for expressing authorizations
-
In: Oakland, CA, USA
-
Jajodia, S., Samarati, P., Subrahmanian, V.S.: A logical language for expressing authorizations. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 31-42, Oakland, CA, USA (1997)
-
(1997)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 31-42
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
-
32
-
-
24344502331
-
Analysis of expressiveness and design issues for a temporal role based access control model
-
Joshi J.B.D., Bertino E. and Ghafoor A. (2005). Analysis of expressiveness and design issues for a temporal role based access control model. IEEE Trans. Dependable Secur. Comput. 2(2): 157-175
-
(2005)
IEEE Trans. Dependable Secur. Comput.
, vol.2
, Issue.2
, pp. 157-175
-
-
Joshi, J.B.D.1
Bertino, E.2
Ghafoor, A.3
-
34
-
-
77952407814
-
Organization based access control
-
In: Lake Como, Italy, June
-
Kalam, A.A.E., El Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miège, A., Saurel, C., Trouessin, G.: Organization based access control. In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Como, Italy, June (2003)
-
(2003)
8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003)
-
-
Kalam, A.A.E.1
El Baida, R.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miège, A.7
Saurel, C.8
Trouessin, G.9
-
41
-
-
33845527315
-
A flexible and distributed architecture to enforce dynamic access control
-
In: Karlstad, Sweden, May
-
Sans, T., Cuppens, F., Cuppens-Boulahia, N.: A flexible and distributed architecture to enforce dynamic access control. In: 21st IFIP TC-11 International Information Security Conference (SEC 2006), Karlstad, Sweden, May 2006
-
(2006)
21st IFIP TC-11 International Information Security Conference (SEC 2006)
-
-
Sans, T.1
Cuppens, F.2
Cuppens-Boulahia, N.3
-
42
-
-
4444246080
-
An integrated approach to engineer and enforce context constraints in RBAC environements
-
Strembeck M. and Neumann G. (2004). An integrated approach to engineer and enforce context constraints in RBAC environements. ACM Trans. Inf. Sys. Secur. 7(3): 392-427
-
(2004)
ACM Trans. Inf. Sys. Secur.
, vol.7
, Issue.3
, pp. 392-427
-
-
Strembeck, M.1
Neumann, G.2
-
43
-
-
0031387996
-
TMAC: A primitive for applying RBAC in collaborative environment
-
In: FairFax, VA
-
Thomas, R.K.: TMAC: A primitive for applying RBAC in collaborative environment. In: 2nd ACM, Workshop on RBAC, pp. 13-19. FairFax, VA (1997)
-
(1997)
2nd ACM, Workshop on RBAC
, pp. 13-19
-
-
Thomas, R.K.1
-
44
-
-
0242453160
-
Memoing evaluation for constraint extensions of datalog
-
Toman D. (1997). Memoing evaluation for constraint extensions of datalog. Constraints 2(3/4): 337-359
-
(1997)
Constraints
, vol.2
, Issue.3-4
, pp. 337-359
-
-
Toman, D.1
-
46
-
-
4143110148
-
Role-based access control in Ambient and remote Space
-
In: Yorktown Heights, New York, USA, June
-
Wedde, H., Lischka, M.: Role-based access control in Ambient and remote Space. In: 9th ACM Symposium on Access Control Models and Technologies (SACMAT 2004), Yorktown Heights, New York, USA, June 2004
-
(2004)
9th ACM Symposium on Access Control Models and Technologies (SACMAT 2004)
-
-
Wedde, H.1
Lischka, M.2
|