-
3
-
-
1642402739
-
mmgrid: Distributed Resource Management Infrastructure for Multimedia Applications
-
Basu, S., Adhikari, S., Kumar, R., Yan, Y., Hochmuth, R. and Blaho, B.E., "mmgrid: Distributed Resource Management Infrastructure for Multimedia Applications," 17 th International Parallel and Distributed Processing Symposium, 2003.
-
(2003)
17 th International Parallel and Distributed Processing Symposium
-
-
Basu, S.1
Adhikari, S.2
Kumar, R.3
Yan, Y.4
Hochmuth, R.5
Blaho, B.E.6
-
4
-
-
1942532238
-
XML-Based Specification for Web Services Document Security
-
Bhatti, R., Bertino, E., Ghafoor, A., and Joshi, J. B. D., "XML-Based Specification for Web Services Document Security," IEEE Computer, Vol. 37, 2004, pp. 41-49.
-
(2004)
IEEE Computer
, vol.37
, pp. 41-49
-
-
Bhatti, R.1
Bertino, E.2
Ghafoor, A.3
Joshi, J.B.D.4
-
5
-
-
0038223799
-
Secure Mediation: Requirements and Design
-
Biskup, J., Flegel, U., Karabulut, Y., "Secure Mediation: Requirements and Design," Proceedings of 12th Annual IFIP WG 11.3 on Database Security, 1998.
-
(1998)
Proceedings of 12th Annual IFIP WG 11.3 on Database Security
-
-
Biskup, J.1
Flegel, U.2
Karabulut, Y.3
-
6
-
-
84928693825
-
Merging Heterogeneous Security Orderings
-
Bonatti, P.A., Sapino, M. L., Subrahmanian, V.S., "Merging Heterogeneous Security Orderings," Esorics, 1996, pp. 183-197.
-
(1996)
Esorics
, pp. 183-197
-
-
Bonatti, P.A.1
Sapino, M.L.2
Subrahmanian, V.S.3
-
7
-
-
0042761212
-
A Framework for Ontology Integration
-
SWWS, CA, USA
-
Calvanese, D., Giacomo, G.D. and Lenserini, M., "A Framework for Ontology Integration," Proceedings of the International Semantic Web Working Symposium (SWWS), CA, USA, 2001.
-
(2001)
Proceedings of the International Semantic Web Working Symposium
-
-
Calvanese, D.1
Giacomo, G.D.2
Lenserini, M.3
-
8
-
-
0037673370
-
DRM: Doesn't really mean digital copyright management
-
ACM Press, Washington, DC, USA
-
Camp, L.J., "DRM: doesn't really mean digital copyright management," in Proceedings of the 9th ACM conference on Computer and communications security, ACM Press, Washington, DC, USA, 2002, pp. 78-87.
-
(2002)
Proceedings of the 9th ACM conference on Computer and communications security
, pp. 78-87
-
-
Camp, L.J.1
-
11
-
-
46749127792
-
A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments
-
iTrust-06, Italy
-
Chandran, S.M, Panyim, Korporn, Joshi, J. B. D., "A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments," the Fourth International Conference on Trust Management, (iTrust-06), Italy, 2006.
-
(2006)
the Fourth International Conference on Trust Management
-
-
Chandran, S.M.1
Panyim, K.2
Joshi, J.B.D.3
-
12
-
-
0004116989
-
-
MIT press
-
Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.,"Introduction to Algorithms," MIT press, 1991.
-
(1991)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
13
-
-
33947679958
-
A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks
-
Washington, DC, USA
-
Damiani, E., di Vimercati, S. de C., Paraboschi, S., Samarati, P., Violante, F., "A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks," ACM CCS'02, Washington, DC, USA, 2002.
-
(2002)
ACM CCS'02
-
-
Damiani, E.1
di Vimercati, S.2
de, C.3
Paraboschi, S.4
Samarati, P.5
Violante, F.6
-
14
-
-
0033884687
-
Providing Security and Interoperation of Heterogeneous Systems
-
Dawson, S., Qian, S., Samarati, P., "Providing Security and Interoperation of Heterogeneous Systems," International Journal of Distributed and Parallel Databases, 2000.
-
(2000)
International Journal of Distributed and Parallel Databases
-
-
Dawson, S.1
Qian, S.2
Samarati, P.3
-
15
-
-
77953002211
-
Towards a flexible security framework for peer-to-peer based grid computing
-
ACM Press, Ontario, Canada
-
Detsch, A., Gaspary, L.P., Barcellos, M.P. and Cavalheiro, G.G.H., "Towards a flexible security framework for peer-to-peer based grid computing," Proceedings of the 2nd workshop on Middleware for grid computing, ACM Press, Ontario, Canada, 2004, pp. 52-56.
-
(2004)
Proceedings of the 2nd workshop on Middleware for grid computing
, pp. 52-56
-
-
Detsch, A.1
Gaspary, L.P.2
Barcellos, M.P.3
Cavalheiro, G.G.H.4
-
16
-
-
32844472422
-
Trust in Recommender Systems
-
ACM Press, CA, USA
-
Donovan, John O., Smyth, Barry, "Trust in Recommender Systems," Proceedings of the 10th international conference on Intelligent user interfaces, ACM Press, CA, USA, 2005, pp. 167-174.
-
(2005)
Proceedings of the 10th international conference on Intelligent user interfaces
, pp. 167-174
-
-
Donovan, J.O.1
Smyth, B.2
-
19
-
-
0000985630
-
An Examination of Federal and Commercial Access Control Policy Needs
-
Ferraiolo, D. F., Gilbert, D. M., Lynch, N., "An Examination of Federal and Commercial Access Control Policy Needs," NIST-NCSC, 1993, pp. 107-116.
-
(1993)
NIST-NCSC
, pp. 107-116
-
-
Ferraiolo, D.F.1
Gilbert, D.M.2
Lynch, N.3
-
20
-
-
0010032891
-
Computational Issues in Secure Interoperation
-
Gong, L., Qian, X., "Computational Issues in Secure Interoperation," IEEE Transaction on Software and Engineering, Vol. 22, No. 1, 1996.
-
(1996)
IEEE Transaction on Software and Engineering
, vol.22
, Issue.1
-
-
Gong, L.1
Qian, X.2
-
21
-
-
0016349356
-
Approximation algorithms for combinatorial problems
-
Johnson, D.S., "Approximation algorithms for combinatorial problems," Journal of Computer System Science, 1974, pp.256-278.
-
(1974)
Journal of Computer System Science
, pp. 256-278
-
-
Johnson, D.S.1
-
22
-
-
0000206310
-
Security Models for Web-based Applications
-
Joshi, J.B.D., Aref, W.G., Ghafoor, A., Spafford, E.H., "Security Models for Web-based Applications," Communications of the ACM, 2001, pp. 38-72.
-
(2001)
Communications of the ACM
, pp. 38-72
-
-
Joshi, J.B.D.1
Aref, W.G.2
Ghafoor, A.3
Spafford, E.H.4
-
23
-
-
0035251598
-
Digital Government Security Infrastructure Design Challenges
-
Joshi, J.B.D., Ghafoor, A., Aref, W. G., and Spafford, E. H., "Digital Government Security Infrastructure Design Challenges," IEEE Computer, vol. 34, 2001, pp. 66-72.
-
(2001)
IEEE Computer
, vol.34
, pp. 66-72
-
-
Joshi, J.B.D.1
Ghafoor, A.2
Aref, W.G.3
Spafford, E.H.4
-
25
-
-
11044223672
-
An Access Control Language for Multidomain Environments
-
Joshi, J.B.D., Bhatti, R., Bertino, E., Ghafoor, A., "An Access Control Language for Multidomain Environments," IEEE Internet Computing, 2004.
-
(2004)
IEEE Internet Computing
-
-
Joshi, J.B.D.1
Bhatti, R.2
Bertino, E.3
Ghafoor, A.4
-
26
-
-
17444406680
-
A Generalized Temporal Role Based Access Control Model
-
Joshi, J.B.D., Bertino, E., Latif, U., Ghafoor, A., "A Generalized Temporal Role Based Access Control Model," IEEE Transactions on Knowledge and Data Engineering, Vol 17, No. 1, 2005, pp. 4-23.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.B.D.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
27
-
-
24344502331
-
An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model
-
Joshi, J.B.D., Bertino, E., Ghafoor, A., "An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model," IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 2, 2005.
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.2
-
-
Joshi, J.B.D.1
Bertino, E.2
Ghafoor, A.3
-
28
-
-
50249134725
-
Formal Foundation for Hybrid Hierarchies in GTRBAC
-
accepted
-
Joshi, J. B. D., Bertino, E., Ghafoor, A., "Formal Foundation for Hybrid Hierarchies in GTRBAC," ACM Transactions on Information and System Security, 2006 (accepted).
-
(2006)
ACM Transactions on Information and System Security
-
-
Joshi, J.B.D.1
Bertino, E.2
Ghafoor, A.3
-
29
-
-
50249137587
-
-
Joshi, J.B.D., Du, Siqing, Joshi, Saubhagya R., A Trust Based Access Control Management Framework for a Secure Grid Environment, Security in Distributed, Grid, and Pervasive Computing, 2006 (In Print).
-
Joshi, J.B.D., Du, Siqing, Joshi, Saubhagya R., "A Trust Based Access Control Management Framework for a Secure Grid Environment," Security in Distributed, Grid, and Pervasive Computing, 2006 (In Print).
-
-
-
-
30
-
-
10944261046
-
Negotiating context Information in Context-Aware Systems
-
Nov-Dec
-
Khedr, M., Karmouch, A., "Negotiating context Information in Context-Aware Systems," IEEE Intelligent Systems, Vol. 19, No. 6, Nov-Dec 2004.
-
(2004)
IEEE Intelligent Systems
, vol.19
, Issue.6
-
-
Khedr, M.1
Karmouch, A.2
-
31
-
-
50049121806
-
Globus security model for grid environment
-
Kanaskar, N. V., Topaloglu, Umit, Bayrak, Coskun, "Globus security model for grid environment," Software Engineering Notes Vol. 30, No. 6, 2005.
-
(2005)
Software Engineering Notes
, vol.30
, Issue.6
-
-
Kanaskar, N.V.1
Topaloglu, U.2
Bayrak, C.3
-
32
-
-
84884311106
-
Configuring Role-based Access Control to Enforce Mandatory and Discretionary Access Control Policies
-
Osborn, S., Sandhu, R., Munawer, Q., "Configuring Role-based Access Control to Enforce Mandatory and Discretionary Access Control Policies," ACM Transactions on Information and System Security, 2000, pp. 85-106.
-
(2000)
ACM Transactions on Information and System Security
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
34
-
-
50249183308
-
Computer Security - Esorics'96
-
LNCSN. 1146
-
Sandhu, R., "Role hierarchies and constraints for lattice-based access controls," Computer Security - Esorics'96, LNCSN. 1146, 1996, pp. 65-79.
-
(1996)
, pp. 65-79
-
-
Sandhu, R.1
-
35
-
-
0008759125
-
-
Sen, S., Minimal Cost Set Covering Using Probabilistic Methods, Proceedings of the 1993 ACM/SIGAPP symposium on Applied computing: states of the art and practice. IN, USA, 1993, pp. 157-164.
-
Sen, S., "Minimal Cost Set Covering Using Probabilistic Methods," Proceedings of the 1993 ACM/SIGAPP symposium on Applied computing: states of the art and practice. IN, USA, 1993, pp. 157-164.
-
-
-
-
36
-
-
28244460211
-
Secure Interoperation in a Multi-Domain Environment Employing RBAC Policies
-
Shafiq, B., Joshi, J.B.D., Bertino, E., Ghafoor, A., "Secure Interoperation in a Multi-Domain Environment Employing RBAC Policies," IEEE Transactions in Knowledge and Data Engineering, 2005.
-
(2005)
IEEE Transactions in Knowledge and Data Engineering
-
-
Shafiq, B.1
Joshi, J.B.D.2
Bertino, E.3
Ghafoor, A.4
-
37
-
-
30644461515
-
-
Shehab, M., Bertino, E., Ghafoor, A, SERAT: SEcure Role mApping Technique for Decentralized Secure Interoperability, In Proceedings of the ACM Symposium on Access Control, Models and Technologies, Stockholm, Sweden, 2005.
-
Shehab, M., Bertino, E., Ghafoor, A, "SERAT: SEcure Role mApping Technique for Decentralized Secure Interoperability," In Proceedings of the ACM Symposium on Access Control, Models and Technologies, Stockholm, Sweden, 2005.
-
-
-
-
38
-
-
1142301944
-
Model Driven Trust Negotiation for Web Services
-
Skogsrud, H., Benatallah, B., Casati, F., "Model Driven Trust Negotiation for Web Services," IEEE Internet Computing, 2003, pp. 45-52.
-
(2003)
IEEE Internet Computing
, pp. 45-52
-
-
Skogsrud, H.1
Benatallah, B.2
Casati, F.3
-
39
-
-
50249164677
-
Joint policy management and auditing in virtual organizations
-
Smith, T.J. and Ramakrishnan, L., "Joint policy management and auditing in virtual organizations," Grid Computing, 2003, pp. 117-124.
-
(2003)
Grid Computing
, pp. 117-124
-
-
Smith, T.J.1
Ramakrishnan, L.2
|