-
1
-
-
27844607906
-
The Delegation Authorization Model: A Model for the Dynamic Delegation of Authorization Rights in a Secure Workflow Management System
-
Muldersdrift, South Africa, Published electronically
-
Karin Venter, and Martin S Olivier, "The Delegation Authorization Model: A Model for the Dynamic Delegation of Authorization Rights in a Secure Workflow Management System", ISSA2002, Muldersdrift, South Africa, 2002, Published electronically, http://mo.co.za
-
(2002)
ISSA2002
-
-
Venter, K.1
Olivier, M.S.2
-
2
-
-
84949747356
-
An authorization Model for Workflow
-
Rome, Italy
-
V. Atluri, and W.Huang, "An authorization Model for Workflow", In Proceedings of the 5th European symposium on research in computer security, Rome, Italy, 1996, pp 44-64.
-
(1996)
Proceedings of the 5th European symposium on research in computer security
, pp. 44-64
-
-
Atluri, V.1
Huang, W.2
-
4
-
-
84944792110
-
TRBAC: A Temporal Role-Based Access Control Model
-
August
-
E. Bertino, E. Bonatti, and E. Ferrari, "TRBAC: A Temporal Role-Based Access Control Model", ACM Transactions on Information and System Security, Vol.4, No. 3,August 2001, pp 191-223.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 191-223
-
-
Bertino, E.1
Bonatti, E.2
Ferrari, E.3
-
5
-
-
0030086382
-
Role-Based Access Control Models
-
February
-
R.Sandhu, E.Coyne,H. Feinstein, and C. Youman, "Role-Based Access Control Models", IEEE Computer, Vol.29, No. 2, February 1996, pp 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
6
-
-
30644477677
-
Supporting Condition Delegation in Secure Workflow Management Systems
-
Stockholm, Sweden, June 1-3
-
V. Atluri, and J. Warner, "Supporting Condition Delegation in Secure Workflow Management Systems", ACM Symposium on Access Control Models and Technologies (SACMAT'05), Stockholm, Sweden, June 1-3, 2005, pp 49-58
-
(2005)
ACM Symposium on Access Control Models and Technologies (SACMAT'05)
, pp. 49-58
-
-
Atluri, V.1
Warner, J.2
-
7
-
-
33751436350
-
DW-RBAC: A formal security model of delegation and revocation in workflow systems
-
May
-
J. Wainer, A. Kumar, and P. Barthelmess, "DW-RBAC: A formal security model of delegation and revocation in workflow systems", Information Systems, Vol 32, No. 3, May 2007, pp 365-384.
-
(2007)
Information Systems
, vol.32
, Issue.3
, pp. 365-384
-
-
Wainer, J.1
Kumar, A.2
Barthelmess, P.3
-
8
-
-
0003593599
-
-
RFC2693
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. "SPKI Certificate Theory", RFC2693, http://www.ieft.org/rfc/rfc2693. txt, 1999.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
9
-
-
0013244058
-
Framework for Role-based Delegation Model
-
Baltimore, Oct. 16-19
-
Ezedin Brarka and Ravi Sandhu, "Framework for Role-based Delegation Model", Proceedings of 23th National Information Systems Security Conference, Baltimore, Oct. 16-19,2000,pp 101-114
-
(2000)
Proceedings of 23th National Information Systems Security Conference
, pp. 101-114
-
-
Brarka, E.1
Sandhu, R.2
-
10
-
-
33750232667
-
-
Jason Crampton and Hemanth Khambhammettu, Delegation in Role-Based Access Control, ESORICS 2006, Hamburg, 2006, pp 174-191
-
Jason Crampton and Hemanth Khambhammettu, "Delegation in Role-Based Access Control", ESORICS 2006, Hamburg, 2006, pp 174-191
-
-
-
-
11
-
-
30644480988
-
A fine-grained, controllable, user-to-user delegation method in RBAC
-
Stockhlm, Sweden
-
J. Wainer, and A. Kumar, "A fine-grained, controllable, user-to-user delegation method in RBAC", in Proceedings of ACM Symposium on Access Control Models and Technologies(SACMAT 05), Stockhlm, Sweden, 2005,pp 59-66
-
(2005)
Proceedings of ACM Symposium on Access Control Models and Technologies(SACMAT 05)
, pp. 59-66
-
-
Wainer, J.1
Kumar, A.2
-
12
-
-
3042684910
-
A rule-based framework for role-based delegation and revocation
-
L. Zhang, G. Ahn, and B. Chu, "A rule-based framework for role-based delegation and revocation", ACM Trans. Inf. Syst. Secur. 6(3), 2003, pp 404-441
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.3
, pp. 404-441
-
-
Zhang, L.1
Ahn, G.2
Chu, B.3
|