-
2
-
-
0003400251
-
Secure Computer System: Unified Exposition and Multics Interpretation
-
Technical Report MTR-2997, The MITRE Corporation
-
D. E. Bell and L. J. LaPadula. Secure Computer System: Unified Exposition and Multics Interpretation. Technical Report MTR-2997, The MITRE Corporation, 1976.
-
(1976)
-
-
Bell, D.E.1
LaPadula, L.J.2
-
3
-
-
0002848811
-
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems
-
E. Bertino, E. Ferrari, and V. Atluri. The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information and System Security, 2(1):65-104, 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
4
-
-
0034810791
-
Separation of Duties for Access Control Enforcement in Workflow Environments
-
R. A. Botha and J. H. Eloff. Separation of Duties for Access Control Enforcement in Workflow Environments. IBM Systems Journal, 40(3):666-682, 2001.
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
, pp. 666-682
-
-
Botha, R.A.1
Eloff, J.H.2
-
7
-
-
1542341270
-
Location-Based Authentication: Grounding Cyberspace for Better Security
-
D. E. Denning and P. F. MacDoran. Location-Based Authentication: Grounding Cyberspace for Better Security. Computer Fraud & Security, 1996(2):12-16, 1996.
-
(1996)
Computer Fraud & Security
, vol.1996
, Issue.2
, pp. 12-16
-
-
Denning, D.E.1
MacDoran, P.F.2
-
14
-
-
52149120362
-
Mobility and Context-Awareness in Workflow Systems
-
Technical report, University of Trondheim, Norway
-
J. O. Nødtvedt. Mobility and Context-Awareness in Workflow Systems. Technical report, University of Trondheim, Norway, 2003.
-
(2003)
-
-
Nødtvedt, J.O.1
-
16
-
-
85015437589
-
-
I. Ray, M. Kumar, and L. Yu. LRBAC: A Location-Aware Role-Based Access Control Model. In Second International Conference on Information Systems Security (ICISS), pages 147-161, Kolkata, India, 2006.
-
I. Ray, M. Kumar, and L. Yu. LRBAC: A Location-Aware Role-Based Access Control Model. In Second International Conference on Information Systems Security (ICISS), pages 147-161, Kolkata, India, 2006.
-
-
-
-
17
-
-
37849009763
-
A Spatio-temporal Role-Based Access Control Model
-
Redondo Beach, CA, USA
-
I. Ray and M. Toahchoodee. A Spatio-temporal Role-Based Access Control Model. In Proceedings of the Conference on Data and Applications Security (DBSec 2007), pages 211-226, Redondo Beach, CA, USA, 2007.
-
(2007)
Proceedings of the Conference on Data and Applications Security (DBSec 2007)
, pp. 211-226
-
-
Ray, I.1
Toahchoodee, M.2
-
18
-
-
84964853055
-
Access Control: Policies, Models, and Mechanisms
-
London, UK, Springer
-
P. Samarati and S. D. C. di Vimercati. Access Control: Policies, Models, and Mechanisms. In FOSAD '00: Revised Versions of Lectures Given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design, pages 137-196, London, UK, 2001. Springer.
-
(2001)
FOSAD '00: Revised Versions of Lectures Given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design
, pp. 137-196
-
-
Samarati, P.1
di Vimercati, S.D.C.2
-
19
-
-
1542317849
-
Secure Verification of Location Claims
-
San Diego, California, USA
-
N. Sastry, U. Shankar, and D. Wagner. Secure Verification of Location Claims. In Proceedings of the 2nd ACM workshop on Wireless security (WiSE '03), pages 1-10, San Diego, California, USA, 2003.
-
(2003)
Proceedings of the 2nd ACM workshop on Wireless security (WiSE '03)
, pp. 1-10
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
20
-
-
0348209180
-
W-RABC - A Workflow Security Model Incorporating Controlled Overriding of Constraints
-
J. Wainer, P. Barthelmess, and A. Kumar. W-RABC - A Workflow Security Model Incorporating Controlled Overriding of Constraints. International Journal of Cooperative Information Systems, 12(4):455-485, 2003.
-
(2003)
International Journal of Cooperative Information Systems
, vol.12
, Issue.4
, pp. 455-485
-
-
Wainer, J.1
Barthelmess, P.2
Kumar, A.3
|