-
1
-
-
0242709333
-
Information sharing and security in dynamic collaborations
-
CE. Phillips, Jr., T.C. Ting, S.A. Demurjian. Information sharing and security in dynamic collaborations, Proc. of the seventh ACM symposium on Access control models and technologies, pp. 87-96, 2002.
-
(2002)
Proc. of the seventh ACM symposium on Access control models and technologies
, pp. 87-96
-
-
Phillips Jr., C.E.1
Ting, T.C.2
Demurjian, S.A.3
-
2
-
-
10444254086
-
-
H. Khurana, V.D. Gligor. A Model for Access Negotiations in Dynamic Collaborations. Proc. of the 13th IEEE WETICE, pp. 205-210, 2004.
-
H. Khurana, V.D. Gligor. A Model for Access Negotiations in Dynamic Collaborations. Proc. of the 13th IEEE WETICE, pp. 205-210, 2004.
-
-
-
-
3
-
-
0036376894
-
dRBAC: Distributed Role-Based Access Control for Dynamic Collaboration Environments
-
E. Freudenthal, T. Pesin, E. Keenan, L. Port, and V. Karamcheti. dRBAC: Distributed Role-Based Access Control for Dynamic Collaboration Environments, Proc. of the ICDCS, pp. 411-420, 2002.
-
(2002)
Proc. of the ICDCS
, pp. 411-420
-
-
Freudenthal, E.1
Pesin, T.2
Keenan, E.3
Port, L.4
Karamcheti, V.5
-
5
-
-
0030086382
-
Role-based access control models
-
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and CE. Youman. Role-based access control models. IEEE Computer, 20(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.20
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
7
-
-
84942433458
-
Negotiating Trust in Dynamic Collaborations
-
K.E. Seamons, T. Chan, E. Child, M. Halcrow, A. Hess, J. Holt, J. Jacobson, R. Jarvis, A. Patty, B. Smith, T. Sundelin, L. Yu. TrustBuilder: Negotiating Trust in Dynamic Collaborations. Proc. of the DARPA Information Survivability Conference and Exposition. 2003.
-
(2003)
Proc. of the DARPA Information Survivability Conference and Exposition
-
-
Seamons, K.E.1
Chan, T.2
Child, E.3
Halcrow, M.4
Hess, A.5
Holt, J.6
Jacobson, J.7
Jarvis, R.8
Patty, A.9
Smith, B.10
Sundelin, T.11
TrustBuilder, L.Y.12
-
8
-
-
48049114897
-
Towards Information Assurance for Dynamic Collaborations
-
United States Military Academy, West Point, NY June
-
C.E. Phillips, Jr., S.A. Demurjian, and T.C. Ting. Towards Information Assurance for Dynamic Collaborations. Proc. of the 2002 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY June 2002.
-
(2002)
Proc. of the 2002 IEEE Workshop on Information Assurance
-
-
Phillips Jr., C.E.1
Demurjian, S.A.2
Ting, T.C.3
-
9
-
-
48049098067
-
Administering Access Control in Dynamic Collaborations
-
LISA, pp
-
R. Bobba, S. Gavrila, V. Gligor, H. Khurana, and R. Koleva. Administering Access Control in Dynamic Collaborations, Proc. of the 19th USENIX Large Installationg System Administration Conference (LISA), pp. 249-261, 2005.
-
(2005)
Proc. of the 19th USENIX Large Installationg System Administration Conference
, pp. 249-261
-
-
Bobba, R.1
Gavrila, S.2
Gligor, V.3
Khurana, H.4
Koleva, R.5
-
10
-
-
46449094830
-
Enterprise Collaborative Contexts and their Provisioning for Secure Managed Extranets
-
J. Chan, G. Rogers, D. Agahari, D. Moreland and J. Zic. Enterprise Collaborative Contexts and their Provisioning for Secure Managed Extranets. Proc. of the 15th IEEE WETICE, pp. 313-318, 2006.
-
(2006)
Proc. of the 15th IEEE WETICE
, pp. 313-318
-
-
Chan, J.1
Rogers, G.2
Agahari, D.3
Moreland, D.4
Zic, J.5
-
11
-
-
0035699610
-
-
PAST
-
P. Druschel and A. Rowstron, PAST: A large-scale, persistent peer-to-peer storage utility, HotOS VIII, pp. 75-80, 2001.
-
(2001)
A large-scale, persistent peer-to-peer storage utility, HotOS VIII
, pp. 75-80
-
-
Druschel, P.1
Rowstron, A.2
-
12
-
-
57349142855
-
Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems
-
Middleware, pp
-
A. Rowstron and P. Druschel, Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), pp. 329-350, 2001.
-
(2001)
IFIP/ACM International Conference on Distributed Systems Platforms
, pp. 329-350
-
-
Rowstron, A.1
Druschel, P.2
-
14
-
-
48049114502
-
-
IETF Authentication, AAA Working Group
-
IETF Authentication, Authorization and Accounting (AAA) Working Group, http://www.ietf.org/html.charters/aaacharter.html
-
Authorization and Accounting
-
-
-
15
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
S. Osborn, R. Sandhu and Q. Munawer. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security. Vol. 3 (2): 85-106, 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
16
-
-
0033893174
-
Secure Group Communication Using Key Graphs
-
C.K. Wong, M.G. Gouda, and S.S. Lam. Secure Group Communication Using Key Graphs. IEEE/ACM Trans-actions on Networking, 8(1):16-30, 2000.
-
(2000)
IEEE/ACM Trans-actions on Networking
, vol.8
, Issue.1
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.G.2
Lam, S.S.3
|