-
3
-
-
57349175665
-
-
Extensible access control markup language (XACML) version 2.0. OASIS Standard, 2005
-
Extensible access control markup language (XACML) version 2.0. OASIS Standard, 2005.
-
-
-
-
4
-
-
33244479658
-
Evaluating XACML as a policy language
-
Technical report, OASIS
-
A. Anderson. Evaluating XACML as a policy language. Technical report, OASIS, 2003.
-
(2003)
-
-
Anderson, A.1
-
5
-
-
11244270529
-
A goal-based approach to policy refinement
-
A. K. Bandara, E. C. Lupu, J. Moffett, and A. Russo. A goal-based approach to policy refinement. In Proc. of Inter-Workshop on Policies for Distributed System and Network, page 229, 2004.
-
(2004)
Proc. of Inter-Workshop on Policies for Distributed System and Network
, pp. 229
-
-
Bandara, A.K.1
Lupu, E.C.2
Moffett, J.3
Russo, A.4
-
6
-
-
0242456748
-
Models for coalition-based access control
-
E. Cohen, R. K. Thomas, W. Winsborough, and D. Shands. Models for coalition-based access control. In Proc. of SACMAT, pages 97-106, 2002.
-
(2002)
Proc. of SACMAT
, pp. 97-106
-
-
Cohen, E.1
Thomas, R.K.2
Winsborough, W.3
Shands, D.4
-
8
-
-
33244470893
-
Verification and change-impact analysis of access-control policies
-
K. Fisler, S. Krishnamurthi, L. A. Meyerovich, and M. C. Tschantz. Verification and change-impact analysis of access-control policies. In Proc. of Inter. Conf. on Software Engineering, pages 196-205, 2005.
-
(2005)
Proc. of Inter. Conf. on Software Engineering
, pp. 196-205
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.A.3
Tschantz, M.C.4
-
9
-
-
33748485156
-
Attribute-based access control with hidden policies and hidden credentials
-
K. Frikken, M. Atallah, and J. Li. Attribute-based access control with hidden policies and hidden credentials, IEEE Transaction on Computers, 55(10):1259-1270, 2006.
-
(2006)
IEEE Transaction on Computers
, vol.55
, Issue.10
, pp. 1259-1270
-
-
Frikken, K.1
Atallah, M.2
Li, J.3
-
11
-
-
1142293102
-
-
N. Li, W. Du, and D. Boneh. Oblivious signature-based envelope. In In Proc. of ACM Symposium on Principles of Distributed Computing, 2003.
-
N. Li, W. Du, and D. Boneh. Oblivious signature-based envelope. In In Proc. of ACM Symposium on Principles of Distributed Computing, 2003.
-
-
-
-
12
-
-
84944456655
-
The prima system for privilege management, authorization and enforcement in grid environments
-
M. Lorch, D. B. Adams, D. Kafura, M. S. R. Koneni, A. Rathi, and S. Shah. The prima system for privilege management, authorization and enforcement in grid environments. In Proc. of International Workshop on Grid Computing, page 109, 2003.
-
(2003)
Proc. of International Workshop on Grid Computing
, pp. 109
-
-
Lorch, M.1
Adams, D.B.2
Kafura, D.3
Koneni, M.S.R.4
Rathi, A.5
Shah, S.6
-
13
-
-
3543052334
-
First experiences using XACML for access control in distributed systems
-
M. Lorch, S. Proctor, R. Lcpro, D. Kafura, and S. Shah. First experiences using XACML for access control in distributed systems. In Proc. of ACM workshop on XML security, pages 25-37, 2003.
-
(2003)
Proc. of ACM workshop on XML security
, pp. 25-37
-
-
Lorch, M.1
Proctor, S.2
Lcpro, R.3
Kafura, D.4
Shah, S.5
-
14
-
-
84887853842
-
A community authorization service for group collaboration
-
L. Pearlman, V. Welch, I. Foster, C. Kesselman, and S. Tuecke. A community authorization service for group collaboration. In Proc. of Workshop on Policies for Distributed Systems and Networks, pages 50-59, 2002.
-
(2002)
Proc. of Workshop on Policies for Distributed Systems and Networks
, pp. 50-59
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
-
15
-
-
33744966599
-
Automated decomposition of access control policies
-
L. Su, D. W. Chadwick, A. Basden, and J. A. Cunningham. Automated decomposition of access control policies. In Proc. of International Workshop on Policies for Distributed Systems and Networks, pages 3-13, 2005.
-
(2005)
Proc. of International Workshop on Policies for Distributed Systems and Networks
, pp. 3-13
-
-
Su, L.1
Chadwick, D.W.2
Basden, A.3
Cunningham, J.A.4
-
16
-
-
2942654406
-
Certificate-based authorization policy in a pki environment
-
M. Thompson, A. Essiari, and S. Mudumbai. Certificate-based authorization policy in a pki environment. ACM Trans. Inf. Syst. Secur., 6(4):566-588, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.4
, pp. 566-588
-
-
Thompson, M.1
Essiari, A.2
Mudumbai, S.3
|