-
2
-
-
84880738920
-
Restricted role-value-maps in a description logic with existential restrictions and terminological cycles
-
F. Baader. Restricted role-value-maps in a description logic with existential restrictions and terminological cycles. Proc. DL 2003.
-
Proc. DL 2003
-
-
Baader, F.1
-
5
-
-
10044257236
-
-
February 2004
-
S. Bechhofer, F. van Harmelen Jim Hendler, I. Horrocks, D. L. McGuinness, P. F. Patel-Schneider, and L. A. Stein. Owl web ontology language reference, February 2004. http://www.w3.org/TR/owl-ref.
-
Owl web ontology language reference
-
-
Bechhofer, S.1
van Harmelen Jim Hendler, F.2
Horrocks, I.3
McGuinness, D.L.4
Patel-Schneider, P.F.5
Stein, L.A.6
-
6
-
-
42949172365
-
N3Logic: A Logical Framework for the World Wide Web
-
T. Berners-Lee, D. Connolly, L. Kagal, J. Hendler, and Y. Schraf. N3Logic: A Logical Framework for the World Wide Web. Journal of Theory and Practice of Logic Programming (TPLP), Special Issue on Logic Programming and the Web, 2008.
-
(2008)
Journal of Theory and Practice of Logic Programming (TPLP), Special Issue on Logic Programming and the Web
-
-
Berners-Lee, T.1
Connolly, D.2
Kagal, L.3
Hendler, J.4
Schraf, Y.5
-
7
-
-
84944048132
-
The ponder policy specification language
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The ponder policy specification language. Lecture Notes in Computer Science, 1995, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.1995
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
8
-
-
33745120496
-
Using semantic web technologies to specify constraints of rbac
-
05-08 Dec
-
W. Di, L. Jian, D. Yabo, and Z. Miaoliang. Using semantic web technologies to specify constraints of rbac. Parallel and Distributed Computing, Applications and Technologies, 2005. PDCAT 2005. Sixth International Conference on, pages 543-545, 05-08 Dec. 2005.
-
(2005)
Parallel and Distributed Computing, Applications and Technologies, 2005. PDCAT 2005. Sixth International Conference on
, pp. 543-545
-
-
Di, W.1
Jian, L.2
Yabo, D.3
Miaoliang, Z.4
-
9
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security (TISSEC), 4(3):224-274, 2001.
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
10
-
-
84992227458
-
Proposed nist standard for role-based access control
-
August
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed nist standard for role-based access control. ACM Transactions on Information and System Security, 4(3):224-274, August 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
11
-
-
57349186673
-
-
S. Godik and T. Moses. OASIS extensible access control markup language (XACML). OASIS Committee Secification cs-xacml-specification-1.0, November 2002.
-
S. Godik and T. Moses. OASIS extensible access control markup language (XACML). OASIS Committee Secification cs-xacml-specification-1.0, November 2002.
-
-
-
-
13
-
-
33749452446
-
An owl based approach for rbac with negative authorization
-
N. Heilili, Y. Chen, C. Zhao, Z. Luo, and Z. Lin. An owl based approach for rbac with negative authorization. Lecture Notes in Computer Science, 4092:164, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4092
, pp. 164
-
-
Heilili, N.1
Chen, Y.2
Zhao, C.3
Luo, Z.4
Lin, Z.5
-
14
-
-
17644419220
-
SWRL: A semantic web rule language combining OWL and RuleML
-
I. Horrocks, P. Patel-Schneider, H. Boley, S. Tabet, B. Grosof, and M. Dean. SWRL: A semantic web rule language combining OWL and RuleML. W3C Member Submission, 21, 2004.
-
(2004)
W3C Member Submission
, vol.21
-
-
Horrocks, I.1
Patel-Schneider, P.2
Boley, H.3
Tabet, S.4
Grosof, B.5
Dean, M.6
-
18
-
-
0033718059
-
A practically implementable and tractable delegation logic
-
Oakland, CA, USA, May
-
N. Li, B. N. Grosof, and J. Feigenbaum. A practically implementable and tractable delegation logic. In Proc. of IEEE Symp. on Security and Privacy, Oakland, CA, USA, May 2000, 2000.
-
(2000)
Proc. of IEEE Symp. on Security and Privacy
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
20
-
-
0036085965
-
Design of a role-based trust-management framework
-
N. Li, J. Mitchell, and W. Winsborough. Design of a role-based trust-management framework. Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium, on, pages 114-130, 2002.
-
(2002)
Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium, on
, pp. 114-130
-
-
Li, N.1
Mitchell, J.2
Winsborough, W.3
-
21
-
-
30544438141
-
Beyond proof-of-compliance: Security analysis in trust management
-
N. Li, J. Mitchell, and W. Winsborough. Beyond proof-of-compliance: security analysis in trust management. Journal of the ACM (JACM), 52(3):474-514, 2005.
-
(2005)
Journal of the ACM (JACM)
, vol.52
, Issue.3
, pp. 474-514
-
-
Li, N.1
Mitchell, J.2
Winsborough, W.3
-
23
-
-
57349177700
-
-
T. Moses et al. extensible Access Control Markup Language (XACML) Version 2.0. OASIS Standard, 200502, 2005
-
T. Moses et al. extensible Access Control Markup Language (XACML) Version 2.0. OASIS Standard, 200502, 2005.
-
-
-
-
25
-
-
33748543201
-
Distributed usage control
-
A. Pretschner, M. Hilty, and D. Basin. Distributed usage control. Communications of the ACM, 49(9):39-44, 2006.
-
(2006)
Communications of the ACM
, vol.49
, Issue.9
, pp. 39-44
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.3
-
27
-
-
84945150402
-
SPL: An access control language for security policies with complex constraints
-
C. N. Ribeiro, A. Zuquete, P. Ferreira, and P. Guedes. SPL: An access control language for security policies with complex constraints. In Network and Distributed System, Security Symposium (NDSS'01), 2001.
-
(2001)
Network and Distributed System, Security Symposium (NDSS'01)
-
-
Ribeiro, C.N.1
Zuquete, A.2
Ferreira, P.3
Guedes, P.4
-
28
-
-
0030086382
-
Role-based access control models
-
February
-
R. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
29
-
-
19344364618
-
Role-based access control
-
M. Zerkowitz, editor, Academic Press
-
R. S. Sandhu. Role-based access control. In M. Zerkowitz, editor, Advances in Computers, volume 48. Academic Press, 1998.
-
(1998)
Advances in Computers
, vol.48
-
-
Sandhu, R.S.1
-
30
-
-
57349180766
-
-
M. Schmidt-Schauss. Subsumption in KL-one is undecidable. Fachber. Informatik, Univ, 1988.
-
M. Schmidt-Schauss. Subsumption in KL-one is undecidable. Fachber. Informatik, Univ, 1988.
-
-
-
-
31
-
-
40149096827
-
Analysis of dynamic policies
-
A. P. Sistla and M. Zhou. Analysis of dynamic policies. Inf. Comput., 206(2-4):185-212, 2008.
-
(2008)
Inf. Comput
, vol.206
, Issue.2-4
, pp. 185-212
-
-
Sistla, A.P.1
Zhou, M.2
-
32
-
-
32844474610
-
-
A. C. Squicciarini, E. Bertino, E. Ferrari, and I. Ray. Achieving privacy in trust negotiations with an ontology-based approach. IEEE Transactions on Dependable Sec. Comput., 3(l):13-30, 2006.
-
A. C. Squicciarini, E. Bertino, E. Ferrari, and I. Ray. Achieving privacy in trust negotiations with an ontology-based approach. IEEE Transactions on Dependable Sec. Comput., 3(l):13-30, 2006.
-
-
-
-
33
-
-
57349119982
-
-
B. Thuraisingham. Assured information sharing. Technical Report UTDCS-43-06, Computer Science Department, University of Texas Dallas, 2006. to appear as Book Chapter in Security Informatics by Springer, editor: H. Chen.
-
B. Thuraisingham. Assured information sharing. Technical Report UTDCS-43-06, Computer Science Department, University of Texas Dallas, 2006. to appear as Book Chapter in Security Informatics by Springer, editor: H. Chen.
-
-
-
-
34
-
-
4444234997
-
Semantic web languages for policy representation and reasoning: A comparison of kaos, rei, and ponder
-
Springer-Verlag
-
G. Tonti, J. M. Bradshaw, R. Jeffers, R. Montanar, N. Suril, and A. Uszokl. Semantic web languages for policy representation and reasoning: A comparison of kaos, rei, and ponder. In Proceedings of the 2nd International Semantic Web Conference (ISWC2003). Springer-Verlag, 2003.
-
(2003)
Proceedings of the 2nd International Semantic Web Conference (ISWC2003)
-
-
Tonti, G.1
Bradshaw, J.M.2
Jeffers, R.3
Montanar, R.4
Suril, N.5
Uszokl, A.6
|