-
1
-
-
46449110897
-
Activity-based Access Control Model to Hospital Information
-
L. X. Hung, S. Lee, Y.-K. Lee, and H. Lee, "Activity-based Access Control Model to Hospital Information," 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007), IEEE Computer Society, pp. 488-496, 2007.
-
(2007)
13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007), IEEE Computer Society
, pp. 488-496
-
-
Hung, L.X.1
Lee, S.2
Lee, Y.-K.3
Lee, H.4
-
2
-
-
46749089048
-
A Purpose-Based Access Control Model
-
N. Yang, H. Barringer, and N. Zhang, "A Purpose-Based Access Control Model," Third International Symposium on Information Assurance and Security (IAS 2007), IEEE Computer Society, pp. 143-148, 2007.
-
(2007)
Third International Symposium on Information Assurance and Security (IAS 2007), IEEE Computer Society
, pp. 143-148
-
-
Yang, N.1
Barringer, H.2
Zhang, N.3
-
3
-
-
47749116044
-
The Dynamic Endpoint-Based Access Control Model on VPN
-
July
-
L. Dong and S. Yu and K. Ouyang, "The Dynamic Endpoint-Based Access Control Model on VPN," International Conference on Networking, Architecture, and Storage-Cover (NAS 2007), IEEE Computer Society, pp. 44-54, July 2007.
-
(2007)
International Conference on Networking, Architecture, and Storage-Cover (NAS 2007), IEEE Computer Society
, pp. 44-54
-
-
Dong, L.1
Yu, S.2
Ouyang, K.3
-
4
-
-
33746738888
-
Access Control Model for Secure XML Documents
-
July
-
S. Jo, Y. Kim, H. Kouh, and W. Yoo, "Access Control Model for Secure XML Documents," Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05), IEEE Computer Society, July 2005.
-
(2005)
Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05), IEEE Computer Society
-
-
Jo, S.1
Kim, Y.2
Kouh, H.3
Yoo, W.4
-
5
-
-
84937420536
-
Securing XML Documents
-
E. Damiani, S. Vimercati, S. Paraboschi, and P. Samarati, "Securing XML Documents," Lecture Notes in Computer Science, vol. 1777, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1777
-
-
Damiani, E.1
Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
6
-
-
33947173191
-
Compact Access Control Labeling for Efficient Secure XML Query Evaluation
-
April
-
H. Zhang, N. Zhang, K. Salem, and D. Zhuo, "Compact Access Control Labeling for Efficient Secure XML Query Evaluation," International Conference on Data Engineering Workshops, April 2005.
-
(2005)
International Conference on Data Engineering Workshops
-
-
Zhang, H.1
Zhang, N.2
Salem, K.3
Zhuo, D.4
-
7
-
-
56749157575
-
-
OASIS, extensible Access Control Markup Language (XACML) Version 2.0, OASIS Standard, February 2005
-
OASIS, "extensible Access Control Markup Language (XACML) Version 2.0," OASIS Standard, February 2005.
-
-
-
-
8
-
-
56749091532
-
-
Service Platform for Innovative Communication Environment SPICE
-
Service Platform for Innovative Communication Environment (SPICE), http://www.ist-spice.org/ 2007-07-01.
-
-
-
-
9
-
-
56749131330
-
-
The Enterprise Sign On Engine ESOE
-
The Enterprise Sign On Engine (ESOE), http://esoeproject.org/ 2007-11-22.
-
-
-
-
10
-
-
56749153753
-
-
Research Activity flow and Middleware Priorities RAMP
-
Research Activity flow and Middleware Priorities (RAMP), http://www.ramp.org.au/ 2007-12-05.
-
-
-
-
14
-
-
33847718052
-
-
RFC 4745, February
-
H. Schulzrinne, H. Tschofenig, J. Morris, J. Cuellar, J. Polk, and J. Rosenberg, "Common Policy: A Document Format for Expressing Privacy Preferences," RFC 4745, February 2007.
-
(2007)
Common Policy: A Document Format for Expressing Privacy Preferences
-
-
Schulzrinne, H.1
Tschofenig, H.2
Morris, J.3
Cuellar, J.4
Polk, J.5
Rosenberg, J.6
-
15
-
-
70349315698
-
Hierarchical resource profile of XACML v2.0
-
OASIS, February
-
OASIS, "Hierarchical resource profile of XACML v2.0," OASIS Standard, February 2005.
-
(2005)
OASIS Standard
-
-
-
16
-
-
70349315698
-
Multiple resource profile of XACML v2.0
-
OASIS, February
-
OASIS, "Multiple resource profile of XACML v2.0," OASIS Standard, February 2005.
-
(2005)
OASIS Standard
-
-
-
17
-
-
51349104092
-
Geolocation Policy: A Document Format for Expressing Privacy Preferences for Location Information, draft-ietf-geopriv-policy-15
-
Work in Progress, March
-
H. Schulzrinne, H. Tschofenig, J. Morris, J. Cuellar, and J. Polk, "Geolocation Policy: A Document Format for Expressing Privacy Preferences for Location Information, draft-ietf-geopriv-policy-15," IETF Draft, Work in Progress, March 2008.
-
(2008)
IETF Draft
-
-
Schulzrinne, H.1
Tschofenig, H.2
Morris, J.3
Cuellar, J.4
Polk, J.5
-
19
-
-
56749153631
-
-
XML Path Language (XPath, Version 2.0, World Wide Web Consortium (W3C) Recommendation, January 2007
-
"XML Path Language (XPath), Version 2.0," World Wide Web Consortium (W3C) Recommendation, January 2007, http://www.w3.org/TR/xpath.
-
-
-
-
20
-
-
22244450793
-
-
RFC 3863, August
-
H. Sugano, S. Fujimoto, G. Klyne, A. Bateman, W. Carr, and J. Peterson, "Presence Information Data Format (PIDF)," RFC 3863, August 2004.
-
(2004)
Presence Information Data Format (PIDF)
-
-
Sugano, H.1
Fujimoto, S.2
Klyne, G.3
Bateman, A.4
Carr, W.5
Peterson, J.6
-
22
-
-
34347240636
-
-
RFC 4480, July
-
H. Schulzrinne, V. Gurbani, P. Kyzivat, and J. Rosenberg, "RPID: Rich Presence Extensions to the Presence Information Data Format (PIDF)," RFC 4480, July 2006.
-
(2006)
RPID: Rich Presence Extensions to the Presence Information Data Format (PIDF)
-
-
Schulzrinne, H.1
Gurbani, V.2
Kyzivat, P.3
Rosenberg, J.4
-
24
-
-
56749157576
-
The Globus Authorization Processing Framework
-
April
-
F. Siebenlist, T. Mori, R. Ananthakrishnan, L. Fang, T. Freeman, K. Kea-hey, S. Meder, O. Mulmo, and T. Sandholm, "The Globus Authorization Processing Framework," New Challenges for Access Control Workshop, April 2005.
-
(2005)
New Challenges for Access Control Workshop
-
-
Siebenlist, F.1
Mori, T.2
Ananthakrishnan, R.3
Fang, L.4
Freeman, T.5
Kea-hey, K.6
Meder, S.7
Mulmo, O.8
Sandholm, T.9
-
25
-
-
33845430041
-
Globus Toolkit: Authorization Processing
-
February
-
F. Siebenlist and T. Mori, "Globus Toolkit: Authorization Processing," GlobusWORLD, February 2005.
-
(2005)
GlobusWORLD
-
-
Siebenlist, F.1
Mori, T.2
-
26
-
-
34748891724
-
Overriding of Access Control in XACML
-
J. Alqatawna, E. Rissanen, and B. Sadighi, "Overriding of Access Control in XACML," IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07), pp. 87-95, 2007.
-
(2007)
IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07)
, pp. 87-95
-
-
Alqatawna, J.1
Rissanen, E.2
Sadighi, B.3
|