-
1
-
-
84956993736
-
Role-based authorization constraints specification
-
G.-J. Ahn and R. S. Sandhu. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur., 3(4):207-226, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, Issue.4
, pp. 207-226
-
-
Ahn, G.-J.1
Sandhu, R.S.2
-
2
-
-
0346236349
-
-
Art and Science. Addison-Wesley
-
M. Bishop. Computer Security - Art and Science. Addison-Wesley, 2003.
-
(2003)
Computer Security
-
-
Bishop, M.1
-
3
-
-
33748060530
-
Constraint generation for separation of duty
-
Lake Tahoe, California, USA, Jun
-
H. Chen and N. Li. Constraint generation for separation of duty. In ACM Symposium on Access Control Models and Technologies, pages 130 - 138, Lake Tahoe, California, USA, Jun. 2006.
-
(2006)
ACM Symposium on Access Control Models and Technologies
, pp. 130-138
-
-
Chen, H.1
Li, N.2
-
5
-
-
33745801960
-
Understanding and developing role-based administrative models
-
Alexandria, VA, USA, Nov, CCS'05
-
J. Crampton. Understanding and developing role-based administrative models. In ACM Conference on Computer and Communications Security, pages 158 - 167, Alexandria, VA, USA, Nov. 2005. CCS'05.
-
(2005)
ACM Conference on Computer and Communications Security
, pp. 158-167
-
-
Crampton, J.1
-
6
-
-
3142510989
-
Administrative scope: A foundation for role-based administrative models
-
J. Crampton and G. Loizou. Administrative scope: A foundation for role-based administrative models. ACM Trans. Inf. Syst. Secur., 6(2):201-231, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.2
, pp. 201-231
-
-
Crampton, J.1
Loizou, G.2
-
7
-
-
33748076789
-
Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy
-
S. Du and J. B. D. Joshi. Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy. In SACMAT, pages 228-236, 2006.
-
(2006)
SACMAT
, pp. 228-236
-
-
Du, S.1
Joshi, J.B.D.2
-
8
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D. F. Ferraiolo, R. S. Sandhu, S. I. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur., 4(3):224-274, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.S.2
Gavrila, S.I.3
Kuhn, D.R.4
Chandramouli, R.5
-
10
-
-
38149044178
-
Establishing rbac-based secure interoperability in decentralized multi-domain environments
-
J. Hu, R. Li, and Z. Lu. Establishing rbac-based secure interoperability in decentralized multi-domain environments. In ICISC, pages 49-63, 2007.
-
(2007)
ICISC
, pp. 49-63
-
-
Hu, J.1
Li, R.2
Lu, Z.3
-
11
-
-
33748077108
-
Role-based access management for ad-hoc collaborative sharing
-
J. Jin and G.-J. Ahn. Role-based access management for ad-hoc collaborative sharing. In SACMAT, pages 200-209, 2006.
-
(2006)
SACMAT
, pp. 200-209
-
-
Jin, J.1
Ahn, G.-J.2
-
12
-
-
11044223672
-
Access-control language for multidomain environments
-
J. B. Joshi, R. Bhatti, E. Bertino, and A. Ghafoor. Access-control language for multidomain environments. IEEE Internet Computing, 8(6):40-50, 2004.
-
(2004)
IEEE Internet Computing
, vol.8
, Issue.6
, pp. 40-50
-
-
Joshi, J.B.1
Bhatti, R.2
Bertino, E.3
Ghafoor, A.4
-
13
-
-
33750037393
-
IRBAC 2000: Secure interoperability using dynamic role translation
-
A. Kapadia, J. Al-Muhtadi, R. H. Campbell, and M. D. Mick-unas. IRBAC 2000: Secure interoperability using dynamic role translation. In Proceedings of the 1st International Conference on Internet Computing, pages 231-238, 2000.
-
(2000)
Proceedings of the 1st International Conference on Internet Computing
, pp. 231-238
-
-
Kapadia, A.1
Al-Muhtadi, J.2
Campbell, R.H.3
Mick-unas, M.D.4
-
14
-
-
47249100212
-
A secure policy-enabled collaboration framework for virtual organizations
-
J. Li, J. Huai, and C. Hu. Peace-vo: A secure policy-enabled collaboration framework for virtual organizations. In SRDS, pages 199-208, 2007.
-
(2007)
SRDS
, pp. 199-208
-
-
Li, J.1
Huai, J.2
Peace-vo, C.H.3
-
16
-
-
33748043984
-
Semantic access control for information interoperation
-
C.-C. Pan, P. Mitra, and P. Liu. Semantic access control for information interoperation. In SACMAT, pages 237-246, 2006.
-
(2006)
SACMAT
, pp. 237-246
-
-
Pan, C.-C.1
Mitra, P.2
Liu, P.3
-
17
-
-
0031153122
-
A survey of approximately optimal solutions to some covering and packing problems
-
V. T. Paschos. A survey of approximately optimal solutions to some covering and packing problems. ACM Comput. Surv., 29(2):171-209, 1997.
-
(1997)
ACM Comput. Surv
, vol.29
, Issue.2
, pp. 171-209
-
-
Paschos, V.T.1
-
19
-
-
0001549660
-
The arbac97 model for role-based administration of roles
-
R. S. Sandhu, V. Bhamidipati, and Q. Munawer. The arbac97 model for role-based administration of roles. ACM Trans. Inf. Syst. Secur., 2(1):105-135, 1999.
-
(1999)
ACM Trans. Inf. Syst. Secur
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.S.1
Bhamidipati, V.2
Munawer, Q.3
-
20
-
-
0030086382
-
Role-based access control models
-
February
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
21
-
-
28244460211
-
Secure interoperation in a multidomain environment employing rbac policies
-
B. Shafiq, J. Joshi, E. Bertino, and A. Ghafoor. Secure interoperation in a multidomain environment employing rbac policies. IEEE Trans. Knowl. Data Eng., 17(11):1557-1577, 2005.
-
(2005)
IEEE Trans. Knowl. Data Eng
, vol.17
, Issue.11
, pp. 1557-1577
-
-
Shafiq, B.1
Joshi, J.2
Bertino, E.3
Ghafoor, A.4
-
24
-
-
55149083788
-
Proactive role discovery in mediator-free environments
-
M. Shehab, E. Bertino, and A. Ghafoor. Proactive role discovery in mediator-free environments. In Peer-to-Peer Computing, pages 150-159, 2008.
-
(2008)
Peer-to-Peer Computing
, pp. 150-159
-
-
Shehab, M.1
Bertino, E.2
Ghafoor, A.3
-
25
-
-
36949011422
-
-
M. Shehab, K. Bhattacharya, and A. Ghafoor. Web services discovery in secure collaboration environments. ACM Trans. Internet Techn., 8(1), 2007.
-
M. Shehab, K. Bhattacharya, and A. Ghafoor. Web services discovery in secure collaboration environments. ACM Trans. Internet Techn., 8(1), 2007.
-
-
-
|