-
2
-
-
84892711302
-
Framework for role-based delegation models
-
Washington, DC, USA, p, IEEE Computer Society Press, Los Alamitos
-
Barka, E., Sandhu, R.: Framework for role-based delegation models. In: ACSAC 2000: Proceedings of the 16th Annual Computer Security Applications Conference, Washington, DC, USA, p. .168. IEEE Computer Society Press, Los Alamitos (2000)
-
(2000)
ACSAC 2000: Proceedings of the 16th Annual Computer Security Applications Conference
, pp. 168
-
-
Barka, E.1
Sandhu, R.2
-
4
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security 2(1), 65-104 (1999)
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
5
-
-
30644475116
-
A reference monitor for workflow systems with constrained task execution
-
Stockholm, Sweden, June, 2005
-
Crampton, J.: A reference monitor for workflow systems with constrained task execution. In: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies (SACMAT 2005), Stockholm, Sweden, June 2005, pp. 38-47 (2005)
-
(2005)
Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies (SACMAT
, pp. 38-47
-
-
Crampton, J.1
-
10
-
-
4944250730
-
-
Tan, K.. Crampton. J., Gunter, C.: The consistency of task-based authorization constraints in workflow systems. In: Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW), pp. 155-169 (2004)
-
Tan, K.. Crampton. J., Gunter, C.: The consistency of task-based authorization constraints in workflow systems. In: Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW), pp. 155-169 (2004)
-
-
-
-
11
-
-
30644480988
-
A fine-grained, controllable, user-to-user delegation method in rbac
-
ACM Press, New York
-
Wainer, J., Kumar, A.: A fine-grained, controllable, user-to-user delegation method in rbac. In: SACMAT 2005: Proceedings of the tenth ACM symposium on Access control models and technologies, pp. 59-66. ACM Press, New York (2005)
-
(2005)
SACMAT 2005: Proceedings of the tenth ACM symposium on Access control models and technologies
, pp. 59-66
-
-
Wainer, J.1
Kumar, A.2
-
12
-
-
57049161970
-
-
Wang, Q.. Li, N.: Satisfiability and resiliency in workflow systems. In: Proc. European Symp. on Research in Computer Security (September 2007)
-
Wang, Q.. Li, N.: Satisfiability and resiliency in workflow systems. In: Proc. European Symp. on Research in Computer Security (September 2007)
-
-
-
-
13
-
-
57049163039
-
On the security of delegation in access control systems
-
July
-
Wang, Q.. Li, N.: On the security of delegation in access control systems. CERIAS Technical Report (July 2008), http://www.cs.purdue.edu/homes/ wangq/papers/delegation.pdf
-
(2008)
CERIAS Technical Report
-
-
Wang, Q.1
Li, N.2
-
15
-
-
3042684910
-
-
Zhang, L.. Ahn. G.-J.. Chu. B.-T.: A rule-based framework for role-based delegation and revocation. ACM Trans. Inf. Syst. Secur. 6(3), 404-441 (2003)
-
Zhang, L.. Ahn. G.-J.. Chu. B.-T.: A rule-based framework for role-based delegation and revocation. ACM Trans. Inf. Syst. Secur. 6(3), 404-441 (2003)
-
-
-
-
16
-
-
0242540371
-
-
Zhang, X.. Oh. S.. Sandhu. R.: Pbdm: a flexible delegation model in rbac. In: SACMAT 2003: Proceedings of the eighth ACM symposium on Access control models and technologies, pp. 149-157. ACM Press, New York (2003)
-
Zhang, X.. Oh. S.. Sandhu. R.: Pbdm: a flexible delegation model in rbac. In: SACMAT 2003: Proceedings of the eighth ACM symposium on Access control models and technologies, pp. 149-157. ACM Press, New York (2003)
-
-
-
|