-
4
-
-
70349105649
-
-
T. Berfall. Mobility versus security-getting the balance right. http://www.bcs.org/server.php?show=ConWebDoc.3057, 2006. Last visit: Sept. 2007.
-
T. Berfall. Mobility versus security-getting the balance right. http://www.bcs.org/server.php?show=ConWebDoc.3057, 2006. Last visit: Sept. 2007.
-
-
-
-
5
-
-
70349104851
-
Some Usability Considerations in Access Control Systems
-
E. Bertino, S. Calo, H. Chen, N. Li, T. Li, J. Lobo, I. Molloy, and Q. Wang. Some Usability Considerations in Access Control Systems. In Proc. Symposium On Usable Privacy and Security (SOUPS), 2008.
-
(2008)
Proc. Symposium On Usable Privacy and Security (SOUPS)
-
-
Bertino, E.1
Calo, S.2
Chen, H.3
Li, N.4
Li, T.5
Lobo, J.6
Molloy, I.7
Wang, Q.8
-
6
-
-
41649091646
-
Policy Mapper: A Simplified Approach for Administration of Location-based Access Control Policies
-
R. Bhatti, M. Damiani, D. Bettis, and E. Bertino. Policy Mapper: A Simplified Approach for Administration of Location-based Access Control Policies. IEEE internet Computing, 12(2), 2008.
-
(2008)
IEEE internet Computing
, vol.12
, Issue.2
-
-
Bhatti, R.1
Damiani, M.2
Bettis, D.3
Bertino, E.4
-
7
-
-
23244445557
-
X-GTRBAC: An XML-based policy specification framework and architecture for enterprise-wide access control
-
May
-
R. Bhatti, A. Ghafoor, E. Bertino, and J. Joshi. X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control. ACM Transactions on Information and System Security (TISSEC), 8(2): 187-227, May 2005.
-
(2005)
ACM Transactions on Information and System Security (TISSEC)
, vol.8
, Issue.2
, pp. 187-227
-
-
Bhatti, R.1
Ghafoor, A.2
Bertino, E.3
Joshi, J.4
-
8
-
-
33745472982
-
X-GTRBAC Admin: A Decentralized AdministrationModel for Enterprise-Wide Access Control
-
R. Bhatti, J. B. D. Joshi, E. Bertino, and A. Ghafoor. X-GTRBAC Admin: A Decentralized AdministrationModel for Enterprise-Wide Access Control. ACM Transactions on Information and System Security, 4, 2005.
-
(2005)
ACM Transactions on Information and System Security
, vol.4
-
-
Bhatti, R.1
Joshi, J.B.D.2
Bertino, E.3
Ghafoor, A.4
-
9
-
-
70349104347
-
-
U. C. Bureau. http://www.census.gov/geo/www/tiger/.
-
U. C. Bureau. http://www.census.gov/geo/www/tiger/.
-
-
-
-
11
-
-
70349089849
-
Access Control Systems for Geo-spatial Data and Applications
-
E. Ferrari, A. Belussi, B. Catania, and E. Clementini, editors, Springer
-
M. Damiani and E. Bertino. Access Control Systems for Geo-spatial Data and Applications. In E. Ferrari, A. Belussi, B. Catania, and E. Clementini, editors, Spatial Data on the Web: Modeling and Management. Springer, 2007.
-
(2007)
Spatial Data on the Web: Modeling and Management
-
-
Damiani, M.1
Bertino, E.2
-
13
-
-
33847092871
-
GEO-RBAC: A spatially aware RBAC
-
Art. 1
-
M. L. Damiani, E. Bertino, B. Catania, and P. Perlasca. GEO-RBAC: a spatially aware RBAC. ACM Transactions on Information and System Security, 1(1): Art. 1, 2007.
-
(2007)
ACM Transactions on Information and System Security
, vol.1
, Issue.1
-
-
Damiani, M.L.1
Bertino, E.2
Catania, B.3
Perlasca, P.4
-
14
-
-
55349099132
-
Spatial Domains for the Administration of Location-based Access Control Policies
-
DOI 10.1007/sl0922-008-9106-0, September, online
-
M. L. Damiani, E. Bertino, and C. Silvestri. Spatial Domains for the Administration of Location-based Access Control Policies. Journal of Network and Systems Management, DOI 10.1007/sl0922-008-9106-0, September 2008 (online).
-
(2008)
Journal of Network and Systems Management
-
-
Damiani, M.L.1
Bertino, E.2
Silvestri, C.3
-
16
-
-
1542341270
-
Location-Based Authentication: Grounding Cyberspace for Better Security
-
Elsevier Science Ltd, February
-
D.E. Denning and F. MacDoran. Location-Based Authentication: Grounding Cyberspace for Better Security. Computer Fraud and Security, Elsevier Science Ltd., February 1996.
-
(1996)
Computer Fraud and Security
-
-
Denning, D.E.1
MacDoran, F.2
-
17
-
-
57349182523
-
ROWLBAC: Representing role based access control in OWL
-
T. W. Finin, A. Joshi, L. Kagal, J. Niu, R. S. Sandhu, W. H. Winsborough, and B. M. Thuraisingham. ROWLBAC: representing role based access control in OWL. In Proc. SACMAT, 2008.
-
(2008)
Proc. SACMAT
-
-
Finin, T.W.1
Joshi, A.2
Kagal, L.3
Niu, J.4
Sandhu, R.S.5
Winsborough, W.H.6
Thuraisingham, B.M.7
-
18
-
-
84859404584
-
-
M. Ge and S. L. Osborn. A Design for Parameterized Roles. In F. C. and S. P., editors, Research Directions in Data and Applications Security XVIII, IFIP TC11/WG 11.3 Eighteenth Annual Conference on Data and Applications Security, 2004.
-
M. Ge and S. L. Osborn. A Design for Parameterized Roles. In F. C. and S. P., editors, Research Directions in Data and Applications Security XVIII, IFIP TC11/WG 11.3 Eighteenth Annual Conference on Data and Applications Security, 2004.
-
-
-
-
20
-
-
0035424017
-
Location Systems for Ubiquitous Computing
-
J. Hightower and G. Boriello. Location Systems for Ubiquitous Computing. Computer, 34(8), 2001.
-
(2001)
Computer
, vol.34
, Issue.8
-
-
Hightower, J.1
Boriello, G.2
-
21
-
-
38049040380
-
A policy language for distributed usage control
-
M. Hilty, A. Pretschner, D. A. Basin, C. Schaefer, and T. Walter. A policy language for distributed usage control. In ESORICS, pages 531-546, 2007.
-
(2007)
ESORICS
, pp. 531-546
-
-
Hilty, M.1
Pretschner, A.2
Basin, D.A.3
Schaefer, C.4
Walter, T.5
-
22
-
-
46449131175
-
Secure localization with phantom node detection
-
J. Hwang, T. He, and Y. Kim. Secure localization with phantom node detection. Ad Hoc Netw., 6(7): 1031-1050, 2008.
-
(2008)
Ad Hoc Netw
, vol.6
, Issue.7
, pp. 1031-1050
-
-
Hwang, J.1
He, T.2
Kim, Y.3
-
23
-
-
17444406680
-
A Generalized Temporal Role-Based Access Control Model
-
January
-
J. Joshi, E. Bertino, U. Latif, and A. Ghafoor. A Generalized Temporal Role-Based Access Control Model. IEEE Transactions on Knowledge and Data Engineering, 17(1):4-23, January 2005.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
24
-
-
57349145290
-
Context-aware role-based access control in pervasive computing systems
-
New York, NY, USA, ACM
-
D. Kulkarni and A. Tripathi. Context-aware role-based access control in pervasive computing systems. In SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies, pages 113-122, New York, NY, USA, 2008. ACM.
-
(2008)
SACMAT '08: Proceedings of the 13th ACM symposium on Access control models and technologies
, pp. 113-122
-
-
Kulkarni, D.1
Tripathi, A.2
-
25
-
-
38049143822
-
STRBAC - An approach towards spatio-temporal role-based access control
-
M. Kumar and R. Newman. STRBAC - An approach towards spatio-temporal role-based access control. In Communication, Network, and Information Security, pages 150-155, 2006.
-
(2006)
Communication, Network, and Information Security
, pp. 150-155
-
-
Kumar, M.1
Newman, R.2
-
26
-
-
40949093944
-
Location constraints in digital rights management
-
A. Muhlbauer, R. Safavi-Naini, F. Salim, N. Sheppard, and M. Surminen. Location constraints in digital rights management. Computer Communication, 31(6):1173-1180, 2008.
-
(2008)
Computer Communication
, vol.31
, Issue.6
, pp. 1173-1180
-
-
Muhlbauer, A.1
Safavi-Naini, R.2
Salim, F.3
Sheppard, N.4
Surminen, M.5
-
30
-
-
33745450500
-
Formal model and policy specification of usage control
-
X. Zhang, F. Parisi-Presicce, R. Sandhu, and J. Park. Formal model and policy specification of usage control. ACM Transactions on Information and System Security, 8(4):351-387, 2005.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.4
, pp. 351-387
-
-
Zhang, X.1
Parisi-Presicce, F.2
Sandhu, R.3
Park, J.4
|