-
6
-
-
11244331795
-
Cassandra: Distributed access control policies with tunable expressiveness
-
June
-
M. Y. Becker and P. Sewell. Cassandra: distributed access control policies with tunable expressiveness. In Policy Workshop, June 2004.
-
(2004)
Policy Workshop
-
-
Becker, M.Y.1
Sewell, P.2
-
11
-
-
0039785347
-
Towards effective evaluation of general logic programs
-
State University of New York at Stony Brook
-
W. Chen and D. S. Warren. Towards effective evaluation of general logic programs. Technical report, State University of New York at Stony Brook, 1993.
-
(1993)
Technical Report
-
-
Chen, W.1
Warren, D.S.2
-
12
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
D. Clarke, J.-E. Elien, C. Ellison, M. Fredette, A. Morcos, and R. L. Rivest. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 9(4):285-322, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
13
-
-
4944266849
-
Doctors express alarm at plans to store patient data without consent (15/07/03)
-
T. Collins. Doctors express alarm at plans to store patient data without consent (15/07/03). Computer Weekly, 2003.
-
(2003)
Computer Weekly
-
-
Collins, T.1
-
14
-
-
32644482875
-
How the national programme came to be the health service's riskiest IT project (16/09/03)
-
T. Collins. How the national programme came to be the health service's riskiest IT project (16/09/03). Computer Weekly, 2003.
-
(2003)
Computer Weekly
-
-
Collins, T.1
-
16
-
-
4944232869
-
Electronic health records: An international perspective
-
A. Cornwall. Electronic health records: an international perspective. Health Issues, 73, 2002.
-
(2002)
Health Issues
, vol.73
-
-
Cornwall, A.1
-
17
-
-
4944257072
-
NHS spree revealed (12/06/03)
-
M. Cross. NHS spree revealed (12/06/03). The Guardian, 2003.
-
(2003)
The Guardian
-
-
Cross, M.1
-
22
-
-
4944230394
-
-
February
-
Foundation for Information Policy Research. NHS confidentiality consultation - FIPR response. February 2003. http://www.cl.cam.ac.uk/users/ rjal4/f iprmedconf.html.
-
(2003)
NHS Confidentiality Consultation - FIPR Response
-
-
-
23
-
-
4944247753
-
Confidentiality and consent: Use cases applicable to shared electronic health record
-
N. Gaunt. Confidentiality and consent: Use cases applicable to shared electronic health record. S&W Devon ERDIP Project, 2003.
-
(2003)
S&W Devon ERDIP Project
-
-
Gaunt, N.1
-
28
-
-
0001619596
-
Flexible support for multiple access control policies
-
S. Jajodia, P. Samarati, M. Sapino, and V. S. Subrahmanian. Flexible support for multiple access control policies. ACM Transactions on Database Systems, 26(2):214-260, 2001.
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.3
Subrahmanian, V.S.4
-
30
-
-
0242456740
-
Dependencies and separation of duty constraints in GTRBAC
-
ACM Press
-
J. B. D. Joshi, B. Shafiq, A. Ghafoor, and E. Bertino. Dependencies and separation of duty constraints in GTRBAC. In Proceedings of the eighth ACM symposium on Access control models and technologies, pages 51-64. ACM Press, 2003.
-
(2003)
Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies
, pp. 51-64
-
-
Joshi, J.B.D.1
Shafiq, B.2
Ghafoor, A.3
Bertino, E.4
-
34
-
-
0031382488
-
Reconciling role-based management and role-based access control
-
E. C. Lupu and M. Sloman. Reconciling role-based management and role-based access control In ACM Workshop on Role-based Access Control, pages 135-141, 1997.
-
(1997)
ACM Workshop on Role-based Access Control
, pp. 135-141
-
-
Lupu, E.C.1
Sloman, M.2
-
39
-
-
4944245251
-
A complex operation for the NHS spine (14/08/03)
-
M. Palmer. A complex operation for the NHS spine (14/08/03). Computer Weekly, 2003.
-
(2003)
Computer Weekly
-
-
Palmer, M.1
-
41
-
-
4944261142
-
GPs voice patient confidentiality concerns (20/05/03)
-
J. Rogers. GPs voice patient confidentiality concerns (20/05/03). Computer Weekly, 2003.
-
(2003)
Computer Weekly
-
-
Rogers, J.1
-
43
-
-
0031341651
-
The ARBAC97 model for role-based administration of roles: Preliminary description and outline
-
R. Sandhu, V. Bhamidipati, E. Coyne, S. Canta, and C. Youman. The ARBAC97 model for role-based administration of roles: Preliminary description and outline. In Proceedings of 2nd ACM Workshop on Role-Based Access Control, pages 41-54, 1997.
-
(1997)
Proceedings of 2nd ACM Workshop on Role-based Access Control
, pp. 41-54
-
-
Sandhu, R.1
Bhamidipati, V.2
Coyne, E.3
Canta, S.4
Youman, C.5
-
45
-
-
0242453160
-
Memoing evaluation for constraint extensions of datalog
-
D. Toman. Memoing evaluation for constraint extensions of datalog. Conjlrainte,2(3/4):337-359, 1997.
-
(1997)
Conjlrainte
, vol.2
, Issue.3-4
, pp. 337-359
-
-
Toman, D.1
-
46
-
-
84939548725
-
Automated trust negotiation
-
W. Winsborough, K. Seamons, and V. Jones. Automated trust negotiation. In DARPA Information Survivability Conference and Exposition, volume 1, pages 88-102, 2000.
-
(2000)
DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 88-102
-
-
Winsborough, W.1
Seamons, K.2
Jones, V.3
-
49
-
-
3042684910
-
A rule-based framework for role-based delegation and revocation
-
L. Zhang, G.-J. Ahn, and B.-T. Chu. A rule-based framework for role-based delegation and revocation. ACM Transactions on Information and System Security, 6(3):404-441,2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.3
, pp. 404-441
-
-
Zhang, L.1
Ahn, G.-J.2
Chu, B.-T.3
|