-
1
-
-
0030086382
-
Role-based access control models
-
Feb
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-based access control models", IEEE Computer, vol. 29, pp. 38-47, Feb. 1996.
-
(1996)
IEEE Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
2
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Aug
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, "Proposed NIST standard for role-based access control", ACM Transactions on Information and System Security, vol. 4, pp. 224-274, Aug. 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
3
-
-
24344501341
-
Access Control in Collaborative Systems
-
March
-
W. Tolone, G. Ahn, T. Pai, "Access Control in Collaborative Systems", ACM Computing Surveys, Vol. 37, No. 1, pp. 29-41, March 2005.
-
(2005)
ACM Computing Surveys
, vol.37
, Issue.1
, pp. 29-41
-
-
Tolone, W.1
Ahn, G.2
Pai, T.3
-
4
-
-
0031387996
-
Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments
-
Virginia, USA, pp, November
-
R. K. Thomas, "Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments", in Proceedings of the Second ACM Workshop on Role-based Access Control, Virginia, USA, pp. 13-19, November 1997.
-
(1997)
Proceedings of the Second ACM Workshop on Role-based Access Control
, pp. 13-19
-
-
Thomas, R.K.1
-
5
-
-
0035790754
-
Flexible Team-Based Access Control Using Contexts
-
Virginia, USA, pp, May
-
C. K. Georgiadis, I. Mavridis, G. Pangalos, R. K. Thomas, "Flexible Team-Based Access Control Using Contexts", in Proceedings of the ACM Symposium on Access Control Models and Technologies, Virginia, USA, pp. 21-27, May 2001.
-
(2001)
Proceedings of the ACM Symposium on Access Control Models and Technologies
, pp. 21-27
-
-
Georgiadis, C.K.1
Mavridis, I.2
Pangalos, G.3
Thomas, R.K.4
-
6
-
-
0032620331
-
Team-and-role-based organizational context and access control for cooperative hypermedia environments
-
Darmstadt, Germany, February
-
W. Wang, Team-and-role-based organizational context and access control for cooperative hypermedia environments, in Proceedings of the tenth ACM Conference on Hypertext and hypermedia, Darmstadt, Germany, February 1999, pp. 37-46.
-
(1999)
Proceedings of the tenth ACM Conference on Hypertext and hypermedia
, pp. 37-46
-
-
Wang, W.1
-
7
-
-
48049108864
-
-
R. K. Thomas, R. Sandhu, Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management, in Proceedings of the IFIP WG 11.3 Workshop on Database Security, Lake Tahoe, California, pp. 166-181, August 1997.
-
R. K. Thomas, R. Sandhu, "Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management", in Proceedings of the IFIP WG 11.3 Workshop on Database Security, Lake Tahoe, California, pp. 166-181, August 1997.
-
-
-
-
8
-
-
0035790711
-
Access control mechanisms for inter-organizational workflow
-
Chantilly, Virginia, United States, P, May
-
Myong H. Kang, Joon S. Park, Judith N. Froscher. Access control mechanisms for inter-organizational workflow. In Proceedings of the sixth ACM symposium on Access control models and technologies, Chantilly, Virginia, United States, P. 66-74, May 2001.
-
(2001)
Proceedings of the sixth ACM symposium on Access control models and technologies
, pp. 66-74
-
-
Kang, M.H.1
Park, J.S.2
Froscher, J.N.3
-
10
-
-
46749131867
-
A Framework for Cross-Institutional Authentication and Authorisation
-
P, Ljubljana, Slovenia, October
-
W. Zhou, V. H. Raja, C. Meinel, M. Ahmad. A Framework for Cross-Institutional Authentication and Authorisation. In Proceedings of the eChallenges e-2005 Conference(e-2005), P. 1259-1266, Ljubljana, Slovenia, October 2005.
-
(2005)
Proceedings of the eChallenges e-2005 Conference(e-2005)
, pp. 1259-1266
-
-
Zhou, W.1
Raja, V.H.2
Meinel, C.3
Ahmad, M.4
-
11
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Feb
-
E. Bertino, E. Ferrari, and V. Atluri, "The specification and enforcement of authorization constraints in workflow management systems", ACM Trans. Inf. Syst. Sec. (TISSEC) 1, 2 (Feb), 1999.
-
(1999)
ACM Trans. Inf. Syst. Sec. (TISSEC)
, vol.1
, pp. 2
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
13
-
-
48049086956
-
-
R. S. Sandhu, V. Bhamidipati, and Q. Munawer, The ARBAC97 model for role-based administration of roles, ACM Trans. Inf. Syst. Sec. 1, 2, Feb. 1999.
-
R. S. Sandhu, V. Bhamidipati, and Q. Munawer, "The ARBAC97 model for role-based administration of roles", ACM Trans. Inf. Syst. Sec. 1, 2, Feb. 1999.
-
-
-
-
14
-
-
4444246080
-
An integrated approach to engineer and enforce context constraints in RBAC environments
-
August
-
M. Strembeck, G Neumann, "An integrated approach to engineer and enforce context constraints in RBAC environments", ACM Transactions on Information and System Security, Volume 7, Issue 3, pp. 392-427. August 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.3
, pp. 392-427
-
-
Strembeck, M.1
Neumann, G.2
|