-
1
-
-
0035251598
-
Digital Government Security Infrastructure Design Challenges
-
J. B. D. Joshi, A. Ghafoor, W. Aref, and E. H. Spafford, "Digital Government Security Infrastructure Design Challenges," IEEE Computer, vol. 34, no. 2, pp. 66-72, 2001.
-
(2001)
IEEE Computer
, vol.34
, Issue.2
, pp. 66-72
-
-
Joshi, J.B.D.1
Ghafoor, A.2
Aref, W.3
Spafford, E.H.4
-
2
-
-
0042348513
-
Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace
-
Macmillan Publishing, August
-
R. Power, "Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace," Que/Macmillan Publishing, August 2000.
-
(2000)
Que
-
-
Power, R.1
-
3
-
-
38049074332
-
An Automated Trust Negotiation Framework Based on Subjective Trust Model
-
Hong Kong, pp
-
P.-P. Lu, B. Li, M.-L. Xing, and L. Li, "An Automated Trust Negotiation Framework Based on Subjective Trust Model," Proceedings of the 6th International Conference on Machine Learning and Cybernetics (ICMLC'07), Hong Kong, pp. 19-22, 2007.
-
(2007)
Proceedings of the 6th International Conference on Machine Learning and Cybernetics (ICMLC'07)
, pp. 19-22
-
-
Lu, P.-P.1
Li, B.2
Xing, M.-L.3
Li, L.4
-
4
-
-
46749150509
-
Trust Realisation in Multidomain Collaborative Environments
-
Melbourne, Australia, pp
-
O. Ajayi, R. Sinnott, and A. Stell, "Trust Realisation in Multidomain Collaborative Environments," Proceedings of the 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS'07), Melbourne, Australia, pp. 906-911, 2007.
-
(2007)
Proceedings of the 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS'07)
, pp. 906-911
-
-
Ajayi, O.1
Sinnott, R.2
Stell, A.3
-
5
-
-
14244257152
-
Design of single sign-on
-
Beijing, China, pp
-
G. Zhao, D. Zheng, and K. Chen, "Design of single sign-on," Proceedings of the 2004 IEEE International Conference on E-Commerce Technology for Dynamic E-Business (CEC-East'04), Beijing, China, pp.253-256. 2004.
-
(2004)
Proceedings of the 2004 IEEE International Conference on E-Commerce Technology for Dynamic E-Business (CEC-East'04)
, pp. 253-256
-
-
Zhao, G.1
Zheng, D.2
Chen, K.3
-
7
-
-
0242625215
-
Temporal Hierarchies and Inheritance Semantics for GTRBAC
-
Monterey, California, USA, pp
-
J. B. D. Joshi, E. Bertino, and A. Ghafoor, "Temporal Hierarchies and Inheritance Semantics for GTRBAC," Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT'02), Monterey, California, USA, pp. 74-83, 2002.
-
(2002)
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT'02)
, pp. 74-83
-
-
Joshi, J.B.D.1
Bertino, E.2
Ghafoor, A.3
-
8
-
-
27544466827
-
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments
-
Sedona, Arizona, USA, pp
-
S. Piromruen, and J. B. D. Joshi, "An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments," Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS'05), Sedona, Arizona, USA, pp. 36-48, 2005.
-
(2005)
Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS'05)
, pp. 36-48
-
-
Piromruen, S.1
Joshi, J.B.D.2
-
9
-
-
17444406680
-
A Generalized Temporal Role-Based Access Control Model
-
J. B. D. Joshi, E. Bertino, and U. Latif, "A Generalized Temporal Role-Based Access Control Model," IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 1, pp. 4-23, 2005.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.B.D.1
Bertino, E.2
Latif, U.3
-
10
-
-
34748916380
-
On interoperable trust negotiation strategies
-
Bologna, Italy, pp
-
S. Baselice, P. A. Bonatti, and M. Faella, "On interoperable trust negotiation strategies," Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07), Bologna, Italy, pp. 39-50, 2007.
-
(2007)
Proceedings of the Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)
, pp. 39-50
-
-
Baselice, S.1
Bonatti, P.A.2
Faella, M.3
-
11
-
-
33748060530
-
Constraint Generation for Separation of Duty
-
Lake Tahoe, California, USA, pp
-
H. Chen, and N. Li, "Constraint Generation for Separation of Duty," Proceedings of the 11th ACM Symposium on Access Control Models and Technologies (SACMAT'06), Lake Tahoe, California, USA, pp. 130-138, 2006.
-
(2006)
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies (SACMAT'06)
, pp. 130-138
-
-
Chen, H.1
Li, N.2
-
12
-
-
85025424440
-
An Algebra for Composing Access Control Policies
-
P. Bonatti, S. D. C. Vimercati, and P. Samarati, "An Algebra for Composing Access Control Policies," ACM Transactions on Information and System Security, vol. 5, no. 1, pp. 1-35, 2002.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.1
Vimercati, S.D.C.2
Samarati, P.3
-
13
-
-
0033884687
-
Providing Security and Interoperation of Heterogeneous Systems
-
S. Dawson, S. Qian, and P. Samarati, "Providing Security and Interoperation of Heterogeneous Systems," Distributed and Parallel Databases, vol. 8, no. 1, pp. 119-145, 2000.
-
(2000)
Distributed and Parallel Databases
, vol.8
, Issue.1
, pp. 119-145
-
-
Dawson, S.1
Qian, S.2
Samarati, P.3
-
14
-
-
0032691796
-
A Logical Framework for Reasoning on Data Access Control Policies
-
99, Mordano, Italy, pp
-
E. Bertino, F. Buccafurri, E. Ferrari, and P. Rullo, "A Logical Framework for Reasoning on Data Access Control Policies," Proceedings of the 12th IEEE Computer Security Foundations Workshop (CSFW'99), Mordano, Italy, pp. 175-189, 1999.
-
(1999)
Proceedings of the 12th IEEE Computer Security Foundations Workshop (CSFW
, pp. 175-189
-
-
Bertino, E.1
Buccafurri, F.2
Ferrari, E.3
Rullo, P.4
-
15
-
-
79957904799
-
Separation of Duty in Role-Based Environments
-
97, Rockport, MA, USA, pp
-
R. T. Simon, and M. E. Zurko, "Separation of Duty in Role-Based Environments," Proceedings of the 10th IEEE Computer Security Foundations Workshop (CSFW'97), Rockport, MA, USA, pp. 183194, 1997.
-
(1997)
Proceedings of the 10th IEEE Computer Security Foundations Workshop (CSFW
, pp. 183194
-
-
Simon, R.T.1
Zurko, M.E.2
-
16
-
-
0033333334
-
Conflicts in Policy-Based Distributed Systems Management
-
E. Lupu, and M. Sloman, "Conflicts in Policy-Based Distributed Systems Management," IEEE Transactions on Software Engineering, vol. 25, no. 6, pp. 852-869, 1999.
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.6
, pp. 852-869
-
-
Lupu, E.1
Sloman, M.2
-
18
-
-
0030086382
-
Role Based Access Control Models
-
R. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role Based Access Control Models," IEEE Computer, vol. 29, no. 2, pp. 38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
19
-
-
0031600970
-
Role Activation Hierarchies
-
Fairfax, VA, USA, pp
-
R. Sandhu, "Role Activation Hierarchies," Proceedings of the 3rd ACM Workshop Role-Based Access Control, Fairfax, VA, USA, pp. 33-40, 1998.
-
(1998)
Proceedings of the 3rd ACM Workshop Role-Based Access Control
, pp. 33-40
-
-
Sandhu, R.1
-
20
-
-
0036387050
-
-
J. B. D. Joshi, E. Bertino, and A. Ghafoor, Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model, Proceedings of the 26th Annual International Computer Software and Applications Conference COMPSAC'02, Oxford, England, pp. 951-956, 2002
-
J. B. D. Joshi, E. Bertino, and A. Ghafoor, "Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model," Proceedings of the 26th Annual International Computer Software and Applications Conference (COMPSAC'02), Oxford, England, pp. 951-956, 2002.
-
-
-
-
21
-
-
44449092200
-
Design and Realization of Efficient Memory Management for Embedded Real-Time Application
-
Chengdu, China, pp
-
Z. Hu, J. Zhang, and X. Luo, "Design and Realization of Efficient Memory Management for Embedded Real-Time Application," Proceedings of the 6th International Conference on ITS Telecommunications (ITST'06), Chengdu, China, pp. 174-177, 2006.
-
(2006)
Proceedings of the 6th International Conference on ITS Telecommunications (ITST'06)
, pp. 174-177
-
-
Hu, Z.1
Zhang, J.2
Luo, X.3
-
22
-
-
33745686200
-
Towards Administration of a Hybrid Role Hierarchy
-
Las Vegas, Nevada, USA, pp
-
S. M. Chandran, and J. B. D. Joshi, "Towards Administration of a Hybrid Role Hierarchy," Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration (IRI'05), Las Vegas, Nevada, USA, pp. 500-505, 2005.
-
(2005)
Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration (IRI'05)
, pp. 500-505
-
-
Chandran, S.M.1
Joshi, J.B.D.2
-
24
-
-
33748076789
-
Supporting Authorization Query and Inter-domain Role Mapping in Presence of Hybrid Role Hierarchy
-
Lake Tahoe, California, USA, pp
-
S. Du, and J. B. D. Joshi, "Supporting Authorization Query and Inter-domain Role Mapping in Presence of Hybrid Role Hierarchy," Proceedings of the 11th ACM Symposium on Access Control, Models and Technologies (SACMAT'06), Lake Tahoe, California, USA, pp. 228-236, 2006.
-
(2006)
Proceedings of the 11th ACM Symposium on Access Control, Models and Technologies (SACMAT'06)
, pp. 228-236
-
-
Du, S.1
Joshi, J.B.D.2
-
25
-
-
28244460211
-
Secure Interoperation in a Multidomain Environment Employing RBAC Policies
-
B. Shafiq, J. B. D. Joshi, and E. Bertino, "Secure Interoperation in a Multidomain Environment Employing RBAC Policies," IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 11, pp. 1557-1577, 2005.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.11
, pp. 1557-1577
-
-
Shafiq, B.1
Joshi, J.B.D.2
Bertino, E.3
-
26
-
-
0242456740
-
Dependencies and Separation of Duty Constraints in GTRBAC
-
Como, Italy, pp
-
J. B. D. Joshi, E. Bertino, B. Shafiq, and A. Ghafoor, "Dependencies and Separation of Duty Constraints in GTRBAC," Proceedings of the 8th ACM Symposium on Access Control, Models and Technologies (SACMAT'03), Como, Italy, pp. 51-64, 2003.
-
(2003)
Proceedings of the 8th ACM Symposium on Access Control, Models and Technologies (SACMAT'03)
, pp. 51-64
-
-
Joshi, J.B.D.1
Bertino, E.2
Shafiq, B.3
Ghafoor, A.4
-
27
-
-
0010032891
-
Computational Issues in Secure Interoperation
-
L. Gong, and X. Qian, "Computational Issues in Secure Interoperation," IEEE Transactions on Software Engineering, vol. 22, no.1, pp. 43-52, 1996.
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.1
, pp. 43-52
-
-
Gong, L.1
Qian, X.2
-
28
-
-
84928693825
-
Merging Heterogeneous Security Orderings
-
96, Rome, Italy, pp
-
P. A. Bonatti, M. L. Sapino, and V. S. Subrahmanian, "Merging Heterogeneous Security Orderings," Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security (ESORICS'96), Rome, Italy, pp. 183-197, 1996.
-
(1996)
Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security (ESORICS
, pp. 183-197
-
-
Bonatti, P.A.1
Sapino, M.L.2
Subrahmanian, V.S.3
-
29
-
-
30644461515
-
SERAT: Secure Role mapping Technique for Decentralized Secure Interoperability
-
Stockholm, Sweden, pp
-
M. Shehab, E. Bertino, and A. Ghafoor, "SERAT: Secure Role mapping Technique for Decentralized Secure Interoperability," Proceedings of the ACM Symposium on Access Control, Models and Technologies (SACMAT'05), Stockholm, Sweden, pp. 159-167, 2005.
-
(2005)
Proceedings of the ACM Symposium on Access Control, Models and Technologies (SACMAT'05)
, pp. 159-167
-
-
Shehab, M.1
Bertino, E.2
Ghafoor, A.3
-
30
-
-
24344502331
-
An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model
-
J. B. D. Joshi, E. Bertino, and A. Ghafoor, "An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model," IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 2, pp. 157-175, 2005.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.2
, pp. 157-175
-
-
Joshi, J.B.D.1
Bertino, E.2
Ghafoor, A.3
-
31
-
-
84944792110
-
TRBAC: A Temporal Role-Based Access Control Model
-
E. Bertino, and P. A. Bonatti, "TRBAC: A Temporal Role-Based Access Control Model," ACM Transactions on Information and System Security, vol. 4, no. 3, pp. 191-223, 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 191-223
-
-
Bertino, E.1
Bonatti, P.A.2
-
32
-
-
33745472982
-
X-GTRBAC Admin: A Decentralized Administration Model for Enterprise-Wide Access Control
-
J. B. D. Joshi, "X-GTRBAC Admin: A Decentralized Administration Model for Enterprise-Wide Access Control," ACM Transactions on Information and System Security, vol. 8, no. 4, pp. 388-423, 2005.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.4
, pp. 388-423
-
-
Joshi, J.B.D.1
|