-
1
-
-
38949086163
-
Access control and authorization constraints for ws-bpel
-
In, Chicago, Illinois, USA
-
E. Bertino, J. Cramption, and F. Paci. Access control and authorization constraints for ws-bpel. In IEEE International Conference on Web Services (ICWS), pp. 275-284, Chicago, Illinois, USA, 2006.
-
(2006)
IEEE International Conference on Web Services (ICWS)
, pp. 275-284
-
-
Bertino, E.1
Cramption, J.2
Paci, F.3
-
2
-
-
4644227527
-
A fine-grained access control model for web services
-
In, Shanghai, China, September
-
E. Bertino, A. C. Squicciarini, and D. Mevi. A fine-grained access control model for web services. In IEEE International Conference on Services Computing, pp. 33-40, Shanghai, China, September 2004.
-
(2004)
IEEE International Conference on Services Computing
, pp. 33-40
-
-
Bertino, E.1
Squicciarini, A.C.2
Mevi, D.3
-
3
-
-
1142309815
-
Provisions and obligations in policy management and security applications
-
In, Hong Kong
-
Claudio Bettini, Sushil Jajodia, X. Sean Wang, and Duminda Wijesekera. Provisions and obligations in policy management and security applications. In 28th International Conference on Very Large Data Bases (VLDB), Hong Kong, 2002.
-
(2002)
28th International Conference on Very Large Data Bases (VLDB)
-
-
Bettini, C.1
Jajodia, S.2
Sean Wang, X.3
Wijesekera, D.4
-
4
-
-
4744370524
-
A trust-based context-aware access control model for web-services
-
In, San Diego, CA, June
-
R. Bhatti, E. Bertino, and A. Ghafoor. A trust-based context-aware access control model for web-services. In IEEE International Conference on Web Services, pp. 184-191, San Diego, CA, June 2004.
-
(2004)
IEEE International Conference on Web Services
, pp. 184-191
-
-
Bhatti, R.1
Bertino, E.2
Ghafoor, A.3
-
5
-
-
1942532238
-
Xml-based specification for web services document security
-
R. Bhatti, E. Bertino, A. Ghafoor, and J. Joshi. Xml-based specification for web services document security. IEEE Computer, vol. 37, no. 4, pp. 41-49, 2004.
-
(2004)
IEEE Computer
, vol.37
, Issue.4
, pp. 41-49
-
-
Bhatti, R.1
Bertino, E.2
Ghafoor, A.3
Joshi, J.4
-
6
-
-
1642341365
-
Access control in dynamic xml-based web-services with x-rbac
-
In, Las Vegas, Nevada, USA, June
-
R. Bhatti, J. Joshi, E. Bertino, and A. Ghafoor. Access control in dynamic xml-based web-services with x-rbac. In International Conference on Web Services, pp. 243-249, Las Vegas, Nevada, USA, June 2003.
-
(2003)
International Conference on Web Services
, pp. 243-249
-
-
Bhatti, R.1
Joshi, J.2
Bertino, E.3
Ghafoor, A.4
-
8
-
-
38049032894
-
Description logic framework for access control and security in object-oriented systems
-
In
-
Jung-Hwa Chae and Nematollaah Shiri. Description logic framework for access control and security in object-oriented systems. In RSFDGrC, pp. 565-573, 2007.
-
(2007)
RSFDGrC
, pp. 565-573
-
-
Chae, J.-H.1
Shiri, N.2
-
10
-
-
34748845082
-
Using saml and xacml for complex resource provisioning in grid based applications
-
In, Bologna, Italy, June
-
Y. Demchenko, L. Gommans, and C. D. Laat. Using saml and xacml for complex resource provisioning in grid based applications. In 8th IEEE International Workshop on Policies for Distributed Systems and Networks, pp. 183-187, Bologna, Italy, June 2007.
-
(2007)
8th IEEE International Workshop on Policies for Distributed Systems and Networks
, pp. 183-187
-
-
Demchenko, Y.1
Gommans, L.2
Laat, C.D.3
-
11
-
-
79953656502
-
E-consent design and implementation issues for health informationmanagers
-
H. Grain. E-consent design and implementation issues for health informationmanagers. Health Information Management, vol. 33, no. 3, pp. 84-88, 2004.
-
(2004)
Health Information Management
, vol.33
, Issue.3
, pp. 84-88
-
-
Grain, H.1
-
12
-
-
74349086688
-
Access control: What is required in business collaboration?
-
In, Wellington, Newzealand, January
-
D. D. He, M. Compton, K. Taylor, and J. Yang. Access control: What is required in business collaboration? In 2009 Australian Database Conference (ADC 2009), Wellington, Newzealand, January 2009.
-
(2009)
2009 Australian Database Conference (ADC 2009)
-
-
He, D.D.1
Compton, M.2
Taylor, K.3
Yang, J.4
-
13
-
-
46849120978
-
A policy driven authorization control framework for business collaboration
-
In, Salt Lake City, Utah, USA, July
-
D. D. He and J. Yang. A policy driven authorization control framework for business collaboration. In IEEE SCW, pp. 17-24, Salt Lake City, Utah, USA, July 2007.
-
(2007)
IEEE SCW
, pp. 17-24
-
-
He, D.D.1
Yang, J.2
-
14
-
-
35248865383
-
Security policy specification and integration in business collaboration
-
In, Salt Lake City, Utah, USA, July
-
D. D. He and J. Yang. Security policy specification and integration in business collaboration. In 2007 IEEE International Conference on Services Computing (SCC 2007), pp. 20-27, Salt Lake City, Utah, USA, July 2007.
-
(2007)
2007 IEEE International Conference on Services Computing (SCC 2007)
, pp. 20-27
-
-
He, D.D.1
Yang, J.2
-
15
-
-
0242652022
-
Design science in information systems research
-
A. R. Hevner, S. T. March, J. Park, and S. Ram. Design science in information systems research. MIS Quarterly, vol. 28, no. 1, pp. 75-105, 2004.
-
(2004)
MIS Quarterly
, vol.28
, Issue.1
, pp. 75-105
-
-
Hevner, A.R.1
March, S.T.2
Park, J.3
Ram, S.4
-
16
-
-
25144452376
-
Authorization service for web services and its application in a health care domain
-
S. Indrakanti, V. Varadharajan, and M. Hitchens. Authorization service for web services and its application in a health care domain. International Journal of Web Services Research, vol. 2, no. 4, pp. 94-119, 2005.
-
(2005)
International Journal of Web Services Research
, vol.2
, Issue.4
, pp. 94-119
-
-
Indrakanti, S.1
Varadharajan, V.2
Hitchens, M.3
-
17
-
-
4344716019
-
Authorization and privacy for semantic web services
-
L. Kagal, M. Paolucci, N. Srinivasan, K. Sycara, and G. Denker. Authorization and privacy for semantic web services. IEEE Intelligent Systems, vol. 19, no. 4, pp. 50-56, 2004.
-
(2004)
IEEE Intelligent Systems
, vol.19
, Issue.4
, pp. 50-56
-
-
Kagal, L.1
Paolucci, M.2
Srinivasan, N.3
Sycara, K.4
Denker, G.5
-
18
-
-
77952407814
-
Organization based access control
-
In, Villa Olmo, Lake Como, Italy
-
A. A. E. Kalam, R. E. Baide, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miege, C. Saurel, and G. Trouessin. Organization based access control. In IEEE 4th International Workshop on Policies for Distributed Systems and Networks, pp. 120-131, Villa Olmo, Lake Como, Italy, 2003.
-
(2003)
IEEE 4th International Workshop on Policies for Distributed Systems and Networks
, pp. 120-131
-
-
Kalam, A.A.E.1
Baide, R.E.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miege, A.7
Saurel, C.8
Trouessin, G.9
-
19
-
-
34547371746
-
Frameworks for secured business process management systems
-
In, Seattle, Washington, USA
-
H. K. Kim, R. Y. Lee, and H. S. Yang. Frameworks for secured business process management systems. In 4th InternationalConference on Software EngineeringResearch, Management and Applications (SERA'06), pp. 57-65, Seattle, Washington, USA, 2006.
-
(2006)
4th InternationalConference on Software EngineeringResearch, Management and Applications (SERA'06)
, pp. 57-65
-
-
Kim, H.K.1
Lee, R.Y.2
Yang, H.S.3
-
20
-
-
79953657012
-
Web services and xml: Leveraging web services to connect the healthcare enterprise
-
(April), [Online]. Available
-
A. Laroia. Web services and xml: Leveraging web services to connect the healthcare enterprise. (2002, April) EbizQ. [Online]. Available: http://www.ebizq.net/topics/webservices/features/1546.html.
-
(2002)
EbizQ
-
-
Laroia, A.1
-
21
-
-
79953654519
-
Secure and conditional resource coordination for successful collaborations
-
In, Florida, USA
-
D. Liu, S. Nepal, D. Moreland, S. Chen, C. Wang, and J. Zic. Secure and conditional resource coordination for successful collaborations. In Proceedings of International Conference on Collaborative Computing, Florida, USA, 2008.
-
(2008)
Proceedings of International Conference on Collaborative Computing
-
-
Liu, D.1
Nepal, S.2
Moreland, D.3
Chen, S.4
Wang, C.5
Zic, J.6
-
23
-
-
49249125427
-
Dynamic integration and semantic security policy ontology mapping for semantic web services (sws)
-
In
-
Saravanan Muthaiyah and Larry Kerschberg. Dynamic integration and semantic security policy ontology mapping for semantic web services (sws). In ICDIM, pp. 116-120, 2006.
-
(2006)
ICDIM
, pp. 116-120
-
-
Muthaiyah, S.1
Kerschberg, L.2
-
24
-
-
79953647562
-
-
OASIS, [Online]. Available
-
OASIS. (2005) Ws-secureconversation 1.3. [Online]. Available: http://www.oasisopen.org/ws-sx/ws-secureconversation/200512/ws-securecon versation-1.3-os.doc.
-
(2005)
Ws-secureconversation 1.3
-
-
-
25
-
-
14544292262
-
-
OASIS, [Online]. Available
-
OASIS. (2006) Security assertion markup language (saml). [Online]. Available: http://saml.xml.org/samlspecifications.
-
(2006)
Security assertion markup language (saml)
-
-
-
26
-
-
77951265406
-
-
OASIS, [Online]. Available
-
OASIS. (2006) Ws-security core specification 1.1. [Online]. Available: http://www.oasisopen.org/committees/download.php/16790/wss-v1.1-os-SOAPM essageSecurity.pdf.
-
(2006)
Ws-security core specification 1.1
-
-
-
27
-
-
84863971834
-
-
OASIS, [Online]. Available
-
OASIS. (2006) Ws-trust 1.3. [Online]. Available: http://docs.oasis-open.org/ws-sx/ws-trust/200512.
-
(2006)
Ws-trust 1.3
-
-
-
29
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-based access control models. IEEE Computer, vol. 29, no. 2, pp. 38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
31
-
-
47849108986
-
Using description logic and rules to determine xml access control
-
In
-
Brian Shields and Owen Molloy. Using description logic and rules to determine xml access control. In DEXA Workshops, pp. 718-724, 2007.
-
(2007)
DEXA Workshops
, pp. 718-724
-
-
Shields, B.1
Molloy, O.2
-
32
-
-
0030644642
-
Separation of duty in role-based environments
-
In, Rockport, Massachusetts, USA
-
R. Simon and M. E. Zurko. Separation of duty in role-based environments. In 10th Computer Security FoundationsWorkshop (CSFW'97), p. 183, Rockport, Massachusetts, USA, 1997.
-
(1997)
10th Computer Security FoundationsWorkshop (CSFW'97)
, pp. 183
-
-
Simon, R.1
Zurko, M.E.2
-
33
-
-
0242540392
-
An access control language for web services
-
In
-
E. G. Sirer and K. Wang. An access control language for web services. In SACMAT, pp. 23-30, 2002.
-
(2002)
SACMAT
, pp. 23-30
-
-
Sirer, E.G.1
Wang, K.2
-
34
-
-
19944408999
-
Trust-serv: Model-driven lifecycle management of trust negotiation policies for web services
-
In, New York, USA, May
-
H. Skogsrud, B. Benatallah, and F. Casati. Trust-serv: Model-driven lifecycle management of trust negotiation policies for web services. In 13th World Wide Web Conf. (WWW 2004), New York, USA, May 2004.
-
(2004)
13th World Wide Web Conf. (WWW 2004)
-
-
Skogsrud, H.1
Benatallah, B.2
Casati, F.3
-
35
-
-
46849122230
-
An access control system for web service compositions
-
In, Salt Lake City, UT, July, IEEE
-
M. Srivatsa, A. Iyengar, T. Mikalsen, I. Rouvellou, and J. Yin. An access control system for web service compositions. In Proceedings of International Conference on Web Services, Salt Lake City, UT, July 2007. IEEE.
-
(2007)
Proceedings of International Conference on Web Services
-
-
Srivatsa, M.1
Iyengar, A.2
Mikalsen, T.3
Rouvellou, I.4
Yin, J.5
-
36
-
-
0002841051
-
Task-based authorization controls (tbac): A family of models for active and enterprise-oriented authorization management
-
In, California, USA
-
R. K. Thomas and R. S. Sandhu. Task-based authorization controls (tbac): A family of models for active and enterprise-oriented authorization management. In 11th International Conference on Database Security, pp. 166-181, California, USA, 1997.
-
(1997)
11th International Conference on Database Security
, pp. 166-181
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
39
-
-
11244319622
-
Security policy reconciliation in distributed computing environments
-
In
-
H. Wang, S. Jha, M. Livny, and P. D. McDaniel. Security policy reconciliation in distributed computing environments. In Proceedings of 5th IEEE InternationalWorkshop on Policies for Distributed Systems and Networks, pp. 137-147, 2004.
-
(2004)
Proceedings of 5th IEEE InternationalWorkshop on Policies for Distributed Systems and Networks
, pp. 137-147
-
-
Wang, H.1
Jha, S.2
Livny, M.3
McDaniel, P.D.4
-
40
-
-
38949126162
-
A web services secure conversation establishment protocol based on forwarded trust
-
In, Chicago, Illinois, USA
-
J. Wang. A web services secure conversation establishment protocol based on forwarded trust. In International Conferences on Web Services (ICWS), pp. 569-576, Chicago, Illinois, USA, 2006.
-
(2006)
International Conferences on Web Services (ICWS)
, pp. 569-576
-
-
Wang, J.1
-
41
-
-
79953648607
-
Privacy, confidentiality and consent of electronic health record systems
-
In, Australia
-
K. T. Win, P. Croll, and J. Cooper. Privacy, confidentiality and consent of electronic health record systems. In HIC 2003 RACGP12CC, pp. 65-71, Australia, 2003.
-
(2003)
HIC 2003 RACGP12CC
, pp. 65-71
-
-
Win, K.T.1
Croll, P.2
Cooper, J.3
-
42
-
-
74349109123
-
Security policy integration and conflict reconciliation for collaborations among organizations in ubiquitous computing environments
-
In, Oslo, Norway
-
S. S. Yau and Z. Chen. Security policy integration and conflict reconciliation for collaborations among organizations in ubiquitous computing environments. In Proceedings of the 5th International Conference on Ubiquitous Intelligence and Computing, Oslo, Norway, 2008.
-
(2008)
Proceedings of the 5th International Conference on Ubiquitous Intelligence and Computing
-
-
Yau, S.S.1
Chen, Z.2
|