-
2
-
-
84956993736
-
Role-based authorization constraints specification,"
-
Ahn, Gail-Joon and Ravi Sandhu, "Role-based authorization constraints specification," ACM Transactions of Information System Security, Vol. 3, Num. 4, pp. 207-226, 2000
-
(2000)
ACM Transactions of Information System Security
, vol.3
, Issue.4
, pp. 207-226
-
-
Ahn, Gail-Joon1
Sandhu, Ravi2
-
3
-
-
33846702464
-
"Towards automated negotiation of access control policies,"
-
IEEE Computer Society, Washington, DC
-
Bharadwaj, Vijay G., and John S. Baras, "Towards automated negotiation of access control policies," POLICY ?03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, p. 111, IEEE Computer Society, Washington, DC, 2003
-
(2003)
POLICY ?03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
, pp. 111
-
-
Bharadwaj, Vijay G.1
Baras, John S.2
-
4
-
-
0007783431
-
"Keynote: Trust management for public-key infrastructures (position paper),"
-
Springer-Verlag, London
-
Blaze, Matt, Joan Feigenbaum, and Angelos D. Keromytis, "Keynote: Trust management for public-key infrastructures (position paper)," Proceedings of the 6th International Workshop on Security Protocols, pp. 59-63, Springer-Verlag, London, 1999
-
(1999)
Proceedings of the 6th International Workshop on Security Protocols
, pp. 59-63
-
-
Blaze, Matt1
Feigenbaum, Joan2
Keromytis, Angelos D.3
-
5
-
-
84958639277
-
Efficient generation of shared RSA keys,"
-
Boneh, Dan, and Matthew Franklin, "Efficient generation of shared RSA keys," Lecture Notes in Computer Science, Vol. 1294, 1997
-
(1997)
Lecture Notes in Computer Science
, vol.1294
-
-
Boneh, Dan1
Franklin, Matthew2
-
6
-
-
0002262722
-
"Role-based access control (rbac): Features and motivations,"
-
Springer-Verlag, New Orleans, LA
-
Ferraiolo, David, Janet Cugini, and Richard Kuhn, "Role-based access control (rbac): Features and motivations," Proceedings of 11th Annual Computer Security Application Conference, pp. 241-248, Springer-Verlag, New Orleans, LA, 1995
-
(1995)
Proceedings of 11th Annual Computer Security Application Conference
, pp. 241-248
-
-
Ferraiolo, David1
Cugini, Janet2
Kuhn, Richard3
-
7
-
-
0036376894
-
"drbac: Distributed role-based access control for dynamic coalition environments,"
-
Vienna, Austria
-
Freudenthal, Eric, Tracy Pesin, Lawrence Port, Edward Keenan, and Vijay Karamcheti, "drbac: Distributed role-based access control for dynamic coalition environments," Proceedings of International Conference on Distributed Computing Systems, pp. 411-420, Vienna, Austria, 2002
-
(2002)
Proceedings of International Conference on Distributed Computing Systems
, pp. 411-420
-
-
Freudenthal, Eric1
Pesin, Tracy2
Port, Lawrence3
Keenan, Edward4
Karamcheti, Vijay5
-
8
-
-
0031682433
-
On the formal definition of separationof-duty policies and their composition
-
Oakland, CA
-
Gligor, Virgil, Serban Gavrila, and David Ferraiolo, "On the formal definition of separationof-duty policies and their composition," RSP: 19th IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, 1998
-
(1998)
RSP: 19th IEEE Computer Society Symposium on Research in Security and Privacy
-
-
Gligor, Virgil1
Gavrila, Serban2
Ferraiolo, David3
-
9
-
-
85094326515
-
"Application-oriented security policies and their composition (position paper),"
-
Springer-Verlag, London, UK
-
Gligor, Virgil D. and Serban I. Gavrila, "Application-oriented security policies and their composition (position paper)," Proceedings of the 6th International Workshop on Security Protocols, pp. 67-74, Springer-Verlag, London, UK, 1999
-
(1999)
Proceedings of the 6th International Workshop on Security Protocols
, pp. 67-74
-
-
Gligor, Virgil D.1
Gavrila, Serban I.2
-
10
-
-
84958746737
-
"On the negotiation of access control policies,"
-
Springer-Verlag, London, UK
-
Gligor, Virgil D., Himanshu Khurana, Radostina K. Koleva, Vijay G. Bharadwaj, and John S. Baras, "On the negotiation of access control policies," Revised Papers from the 9th International Workshop on Security Protocols, pp. 188-201, Springer-Verlag, London, UK, 2002
-
(2002)
Revised Papers from the 9th International Workshop on Security Protocols
, pp. 188-201
-
-
Gligor, Virgil D.1
Khurana, Himanshu2
Koleva, Radostina K.3
Bharadwaj, Vijay G.4
Baras, John S.5
-
11
-
-
0033724294
-
"Access control meets public key infrastructure, or: Assigning roles to strangers,"
-
IEEE Computer Society, Washington, DC
-
Herzberg, Amir, Yosi Mass, Joris Michaeli, Yiftach Ravid, and Dalit Naor, "Access control meets public key infrastructure, or: Assigning roles to strangers," SP ?00: Proceedings of the 2000 IEEE Symposium on Security and Privacy, p. 2, IEEE Computer Society, Washington, DC, 2000
-
(2000)
SP ?00: Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 2
-
-
Herzberg, Amir1
Mass, Yosi2
Michaeli, Joris3
Ravid, Yiftach4
Naor, Dalit5
-
12
-
-
85094324592
-
-
https://www.cwid.js.mil/public/cwid05fr/START-HERE.html
-
-
-
-
13
-
-
85094316526
-
-
http://www.bouncycastle.org/
-
-
-
-
14
-
-
85094326352
-
-
http://www.cnds.jhu.edu/research/group/secure-spread/
-
-
-
-
15
-
-
84942419353
-
"Integrated security services for dynamic coalitions,"
-
Khurana, Himanshu, Serban Gavrila, Rakesh Bobba, Radostina Koleva, Anuja Sonalker, Emilian Dinu, Virgil Gligor, and John Baras, "Integrated security services for dynamic coalitions," An extended exposition abstract in Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX III), 2003
-
(2003)
An extended exposition abstract in Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX III)
-
-
Khurana, Himanshu1
Gavrila, Serban2
Bobba, Rakesh3
Koleva, Radostina4
Sonalker, Anuja5
Dinu, Emilian6
Gligor, Virgil7
Baras, John8
-
16
-
-
0036375159
-
"Reasoning about joint administration of access policies for coalition resources,"
-
IEEE Computer Society, Washington, DC
-
Khurana, Himanshu, Virgil Gligor, and John Linn, "Reasoning about joint administration of access policies for coalition resources," ICDCS ?02: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS?02), p. 429, IEEE Computer Society, Washington, DC, 2002
-
(2002)
ICDCS ?02: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS?02)
, pp. 429
-
-
Khurana, Himanshu1
Gligor, Virgil2
Linn, John3
-
17
-
-
10444254086
-
"A model for access negotiations in dynamic coalitions,"
-
IEEE Computer Society, Washington, DC
-
Khurana, Himanshu and Virgil D. Gligor, "A model for access negotiations in dynamic coalitions," WETICE ?04: Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE?04), pp. 205-210, IEEE Computer Society, Washington, DC, 2004
-
(2004)
WETICE ?04: Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE?04)
, pp. 205-210
-
-
Khurana, Himanshu1
Gligor, Virgil D.2
-
18
-
-
33644505148
-
"Sels: A secure e-mail list service,"
-
ACM Press, New York, NY
-
Khurana, Himanshu, Adam Slagell, and Rafael Bonilla, "Sels: A secure e-mail list service," SAC ?05: Proceedings of the 2005 ACM symposium on Applied computing, p. 306-313, ACM Press, New York, NY, 2005
-
(2005)
SAC ?05: Proceedings of the 2005 ACM symposium on Applied computing
, pp. 306-313
-
-
Khurana, Himanshu1
Slagell, Adam2
Bonilla, Rafael3
-
19
-
-
84948440714
-
"Design of a role-based trustmanagement framework,"
-
IEEE Computer Society, Washington, DC
-
Li, Ninghui, John C. Mitchell, and William H. Winsborough, "Design of a role-based trustmanagement framework," SP ?02: Proceedings of the 2002 IEEE Symposium on Security and Privacy, p. 114, IEEE Computer Society, Washington, DC, 2002
-
(2002)
SP ?02: Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 114
-
-
Li, Ninghui1
Mitchell, John C.2
Winsborough, William H.3
-
20
-
-
85094318739
-
"Core specification: extensible access control markup language (xacml) version 2.0
-
OASIS Specification Document
-
Moses, Tim, "Core specification: extensible access control markup language (xacml) version 2.0," OASIS Specification Document, http://docs. oasis-open.org/xacml/access-control-xacml-2-0-core-spec-cd-04.pdf , 2004
-
(2004)
-
-
Moses, Tim1
-
21
-
-
85094317495
-
Information sharing and security in dynamic coalitions,"
-
Phillips, Charles E., Steven A. Demurjian, and T. C. Ting, "Information sharing and security in dynamic coalitions," Proceedings of IEEE Information Assurance Workshop, 2002
-
(2002)
Proceedings of IEEE Information Assurance Workshop
-
-
Phillips, Charles E.1
Demurjian, Steven A.2
Ting, T. C.3
-
22
-
-
0242709333
-
"Information sharing and security in dynamic coalitions,"
-
ACM Press, New York, NY
-
Phillips, Charles E., T. C. Ting, and Steven A. Demurjian, "Information sharing and security in dynamic coalitions," SACMAT ?02: Proceedings of the seventh ACM symposium on Access control models and technologies, p. 87-96, ACM Press, New York, NY, 2002
-
(2002)
SACMAT ?02: Proceedings of the seventh ACM symposium on Access control models and technologies
, pp. 87-96
-
-
Phillips, Charles E.1
Ting, T. C.2
Demurjian, Steven A.3
-
23
-
-
67650041248
-
Secure virtual enclaves: Supporting coalition use of distributed application technologies
-
Shands, Deborah, Richard Yee, Jay Jacobs, and E. John Sebes, "Secure virtual enclaves: Supporting coalition use of distributed application technologies," Proceedings of the Network and Distributed System Security Symposium (NDSS), 2000
-
(2000)
Proceedings of the Network and Distributed System Security Symposium (NDSS)
-
-
Shands, Deborah1
Yee, Richard2
Jacobs, Jay3
John Sebes, E.4
-
24
-
-
84942416755
-
Yalta: A dynamic pki and secure tuplespaces for distributed coalitions
-
Washington, DC
-
Smith, T. J., G. T. Byrd, W. Xiaoyong, X. Hongjie, K. Thangavelu, R. Wang, and A. Shah, "Yalta: A dynamic pki and secure tuplespaces for distributed coalitions," Proceedings of 3rd DARPA Information Survivability Conference and Exposition, Washington, DC, 2003
-
(2003)
Proceedings of 3rd DARPA Information Survivability Conference and Exposition
-
-
Smith, T. J.1
Byrd, G. T.2
Xiaoyong, W.3
Hongjie, X.4
Thangavelu, K.5
Wang, R.6
Shah, A.7
-
25
-
-
0036871183
-
Negotiating trust on the web,"
-
Winslett, Marianne, Ting Yu, Kent E. Seamons, Adam Hess, Jared Jacobson, Ryan Jarvis, Bryan Smith, and Lina Yu, "Negotiating trust on the web," IEEE Internet Computing, Vol. 6, Num. 6, pp. 30-37, 2002
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, Marianne1
Yu, Ting2
Seamons, Kent E.3
Hess, Adam4
Jacobson, Jared5
Jarvis, Ryan6
Smith, Bryan7
Yu, Lina8
-
26
-
-
85084160265
-
Building intrusion tolerant applications,"
-
Washington, DC
-
Wu, Thomas, Michael Malkin, and Dan Boneh, "Building intrusion tolerant applications," Proceedings of the 8th USENIX Security Symposium, pp. 79-91, Washington, DC, 1999
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, pp. 79-91
-
-
Wu, Thomas1
Malkin, Michael2
Boneh, Dan3
|