-
1
-
-
60849093546
-
-
OASIS eXtensible Access Control Markup Language (XACML), v2.0, 6 December
-
OASIS eXtensible Access Control Markup Language (XACML), v2.0, 6 December 2004. http://www.oasis-open.org/committees/ tc_home.php?wg_abbrev=xacml
-
(2004)
-
-
-
2
-
-
3543052334
-
First experiences using XACML for access control in distributed systems
-
In: Fairfax, Virginia
-
Lorch, M., Proctor, S., Lepro, R., Kafura, D., Shah, S.: First experiences using XACML for access control in distributed systems. In: Proceedings of the 2003 ACM Workshop on XML Security. Fairfax, Virginia (2003)
-
(2003)
Proceedings of the 2003 ACM Workshop on XML Security
-
-
Lorch, M.1
Proctor, S.2
Lepro, R.3
Kafura, D.4
Shah, S.5
-
4
-
-
33746187986
-
Use of XACML policies for a Network Access Control Service
-
In: Zhou, J., et al. (eds.) IOS Press, Singapore
-
López, G., Cánovas, Ó., Gómez-Skarmeta, A.F.: Use of XACML policies for a Network Access Control Service. In: Zhou, J., et al. (eds.) Applied Public Key Infrastructure. Proceedings of Fourth International Workshop for Applied PKI, IWAP 05. IOS Press, Singapore (2005)
-
(2005)
Applied Public Key Infrastructure. Proceedings of Fourth International Workshop for Applied PKI, IWAP 05
-
-
López, G.1
Cánovas, Ó.2
Gómez-Skarmeta, A.F.3
-
5
-
-
60849133395
-
ANSI: Information technology - Role Based Access Control
-
ANSI INCITS 359-2004
-
ANSI: Information technology - Role Based Access Control. ANSI INCITS 359-2004
-
-
-
-
6
-
-
33748079186
-
OASIS: Core and hierarchical role based access control (RBAC) profile of XACML v2.0
-
February
-
OASIS: Core and hierarchical role based access control (RBAC) profile of XACML v2.0. February 2005
-
(2005)
-
-
-
8
-
-
60849127963
-
-
http://dictionary.reference.com/search?q=delegate
-
-
-
-
9
-
-
0003593599
-
-
RFC 2693, September
-
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory. RFC 2693, September 1999
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
10
-
-
14544292384
-
From gridmap-file to VOMS: Managing authorization in a Grid environment
-
Alfieri R., Cecchini R., Ciaschini V., Dell'Agnello L., Frohner A., Lorentey K., Spataro M.: From gridmap-file to VOMS: managing authorization in a Grid environment. Future Gener. Comput. Syst. 21(4), 549-558 (2005)
-
(2005)
Future Gener. Comput. Syst.
, vol.21
, Issue.4
, pp. 549-558
-
-
Alfieri, R.1
Cecchini, R.2
Ciaschini, V.3
Dell'Agnello, L.4
Frohner, A.5
Lorentey, K.6
Spataro, F.7
-
11
-
-
33845222790
-
Identity federation and attribute-based authorization through the Globus Toolkit, Shibboleth, GridShib, and MyProxy
-
In: April
-
Barton, T., Basney, J., Freeman, T., Scavo, T., Siebenlist, F., Welch, V., Ananthakrishnan, R., Baker, B., Keahey, K.: Identity federation and attribute-based authorization through the Globus Toolkit, Shibboleth, GridShib, and MyProxy. In: Presented at NIST PKI Workshop, April 2006. http://middleware.internet2.edu/pki06/proceedings/welch-idfederation.pdf
-
(2006)
Presented at NIST PKI Workshop
-
-
Barton, T.1
Basney, J.2
Freeman, T.3
Scavo, T.4
Siebenlist, F.5
Welch, V.6
Ananthakrishnan, R.7
Baker, B.8
Keahey, K.9
-
12
-
-
46449084609
-
Authorisation using attributes from multiple authorities
-
In: June Manchester, UK
-
Chadwick, D.: Authorisation using attributes from multiple authorities. In: Proceedings of WET-ICE 2006, June 2006, Manchester, UK
-
(2006)
Proceedings of WET-ICE 2006
-
-
Chadwick, D.1
-
13
-
-
44949218700
-
OASIS: Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2.0
-
15 January
-
OASIS: Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2.0, 15 January 2005
-
(2005)
-
-
-
14
-
-
60849124302
-
ISO 9594-8/ITU-T Rec. X.509: The Directory: Public-key and Attribute Certificate Frameworks
-
ISO 9594-8/ITU-T Rec. X.509: The Directory: Public-key and Attribute Certificate Frameworks (2001)
-
(2001)
-
-
-
15
-
-
33646028994
-
Shibboleth Architecture, Protocols and Profiles
-
22 September
-
Cantor, S.: Shibboleth Architecture, Protocols and Profiles. Working Draft 02, 22 September 2004. http://shibboleth.internet2.edu/
-
(2004)
Working Draft 02
-
-
Cantor, S.1
-
16
-
-
60849083307
-
-
Internet2 Middleware Architecture Committee for Education, Directory Working Group (MACE-Dir): EduPerson Object Class Specification (200604), 14 April
-
Internet2 Middleware Architecture Committee for Education, Directory Working Group (MACE-Dir): EduPerson Object Class Specification (200604), 14 April 2006. http://www.nmi-edit.org/eduPerson/ internet2-mace-dir-eduperson-200604.html
-
(2006)
-
-
-
17
-
-
0036086099
-
Constrained delegation
-
In: IEEE Computer Society Press, Oakland
-
Bandmann, O., Dam, M., Sadighi Firozabadi, B.: Constrained delegation. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 131-140. IEEE Computer Society Press, Oakland (2002)
-
(2002)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 131-140
-
-
Bandmann, O.1
Dam, M.2
Sadighi Firozabadi, B.3
-
20
-
-
60849112630
-
Use of XACML Request Context to Obtain an Authorisation Decision
-
31 March
-
Chadwick, D.W., Su, L., Laborde, R.: Use of XACML Request Context to Obtain an Authorisation Decision, Open Grid Forum Working Draft, 31 March 2008. http://forge.gridforum.org/sf/go/doc15169?nav=1
-
(2008)
Open Grid Forum Working Draft
-
-
Chadwick, D.W.1
Su, L.2
Laborde, R.3
-
21
-
-
60849091688
-
Use of WS-TRUST and SAML to access a CVS
-
11 June
-
Chadwick, D.W., Su, L.: Use of WS-TRUST and SAML to access a CVS. Open Grid Forum Working Draft, 11 June 2008. http://forge.gridforum.org/sf/go/ doc15253?nav=1
-
(2008)
Open Grid Forum Working Draft
-
-
Chadwick, D.W.1
Su, L.2
-
22
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
Li N., Winsborough W.H., Mitchell J.C.: Distributed credential chain discovery in trust management. J. Comput. Secur. 11, 35-86 (2003)
-
(2003)
J. Comput. Secur.
, vol.11
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
23
-
-
38049075824
-
Using WebDAV for improved certificate revocation and publication
-
In: Palma de Mallorca, Spain
-
Chadwick, D.W., Anthony, S.: Using WebDAV for improved certificate revocation and publication. In: LCNS 4582, Public Key Infrastructure. Proceedings of Fourth European PKI Workshop, pp. 265-279. Palma de Mallorca, Spain (2007)
-
(2007)
LCNS 4582, Public Key Infrastructure. Proceedings of Fourth European PKI Workshop
, pp. 265-279
-
-
Chadwick, D.W.1
Anthony, S.2
-
24
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
Clarke D., Elien J.-E., Ellison C., Fredette M., Morcos A., Rivest R.L.: Certificate chain discovery in SPKI/SDSI. J. Comput. Secur. 9(4), 285-322 (2001)
-
(2001)
J. Comput. Secur.
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
25
-
-
85180773761
-
Building certificate paths: Forward vs. reverse
-
In: Internet Society, USA
-
Elley, Y., Anderson, A., Hanna S., Mullan S., Perlman, R., Proctor, S.: Building certificate paths: Forward vs. reverse. In: Proceedings of the 2001 Network and Distributed System Security Symposium (NDSS'01), pp. 153-160. Internet Society, USA (2001)
-
(2001)
Proceedings of the 2001 Network and Distributed System Security Symposium (NDSS'01)
, pp. 153-160
-
-
Elley, Y.1
Anderson, A.2
Hanna, S.3
Mullan, S.4
Perlman, R.5
Proctor, S.6
-
26
-
-
0041291986
-
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
-
RFC 3280, April
-
Housley, R., Ford, W., Polk, W., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, RFC 3280, April 2002
-
(2002)
-
-
Housley, R.1
Ford, W.2
Polk, W.3
Solo, D.4
-
27
-
-
60849135478
-
-
The Shewhart Control Chart. http://www.itl.nist.gov/div898/handbook/mpc/ section2/mpc221.htm
-
The Shewhart Control Chart
-
-
-
28
-
-
37349082943
-
Recognition of authority in virtual organisations
-
In: Lambrinoudakis, C., Pernul, G., Min Tjoa, A. (eds.) LCNS & Security in Digital Business, vol. 4657, pp. 3-13. LCNS (2007)
-
Nguyen, T.-A., Chadwick, D., Nasser, B.: Recognition of authority in virtual organisations. In: Lambrinoudakis, C., Pernul, G., Min Tjoa, A. (eds.) Trust, Privacy & Security in Digital Business, vol. 4657, pp. 3-13. LCNS (2007)
-
(2007)
Trust, Privacy & Security in Digital Business
, vol.4657
, pp. 3-13
-
-
Nguyen, T.-A.1
Chadwick, D.2
Nasser, B.3
|