-
1
-
-
84982994153
-
Distributed access-rights management with delegation certificates
-
[ed.] J. Vitek and C. D. Jensen Springer Lecture Notes in Computer Science 1603
-
Aura, Tuomas. Distributed Access-Rights Management with Delegation Certificates. [ed.] J. Vitek and C. D. Jensen. Secure Internet Programming - Security Issues for Distributed and Mobile Objects. s.l.: Springer, 1999, Vol. Lecture Notes in Computer Science 1603, pp. 211-235.
-
(1999)
Secure Internet Programming - Security Issues for Distributed and Mobile objects. S.l.
, pp. 211-235
-
-
Tuomas, A.1
-
3
-
-
84982899264
-
The role of trust management in distributed systems security
-
Chapter Vitek and Jensen, eds. Springer-Verlag
-
Blaze, M., Feigenbaum, J., Ioannidis, J., and Keromytis, A., "The Role of Trust Management in Distributed Systems Security." Chapter in Secure Internet Programming: Security Issues for Mobile and Distributed Objects, (Vitek and Jensen, eds.) Springer-Verlag, 1999.
-
(1999)
Secure Internet Programming: Security Issues for Mobile and Distributed objects
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
4
-
-
33845225891
-
Adding support to XACML for dynamic delegation of authority in multiple domains
-
Chadwick, D. W., Otenko, S., and Nguyen, T. A., "Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains," Proc. of the IFIP Intl Conf. on Communications and Multimedia Security, pp. 67-86, 2006.
-
(2006)
Proc. of the IFIP Intl Conf. on Communications and Multimedia Security
, pp. 67-86
-
-
Chadwick, D.W.1
Otenko, S.2
Nguyen, T.A.3
-
5
-
-
77952392888
-
Web-key: Mashing with permission
-
Web 2.0 Security and Privacy. May
-
Close, T., "web-key: Mashing with Permission", IEEE W2SP 2008: Web 2.0 Security and Privacy. May 2008.
-
(2008)
IEEE W2SP 2008
-
-
Close, T.1
-
6
-
-
0000338326
-
Programming semantics for multiprogrammed computations
-
Dennis, J. B. and Van Horn, E. C., "Programming Semantics for Multiprogrammed Computations" Comm. ACM, 9(3):143-155, 1966.
-
(1966)
Comm. ACM
, vol.9
, Issue.3
, pp. 143-155
-
-
Dennis, J.B.1
Van Horn, E.C.2
-
7
-
-
77952367424
-
A security architecture for net-centric enterprise services (NCES)
-
DISA March
-
DISA, "A Security Architecture for Net-Centric Enterprise Services (NCES)", Defense Information Systems Agency, March 2004.
-
(2004)
Defense Information Systems Agency
-
-
-
9
-
-
1942521913
-
SPKI requirements
-
September
-
C. Ellison, "SPKI Requirements", IETF RFC 2692, September 1999.
-
(1999)
IETF RFC 2692
-
-
Ellison, C.1
-
10
-
-
0038150613
-
An internet attribute certificate profile for authorization
-
April
-
Farrell, S. and Housley, R. "An Internet Attribute Certificate Profile for Authorization", IETF RFC 3281, April 2002.
-
(2002)
IETF RFC 3281
-
-
Farrell, S.1
Housley, R.2
-
13
-
-
33746638936
-
The community authorization service: Status and future
-
Foster, I., Kesselman, C., Pearlman, L., Tuecke, S., and Welch, V., "The Community Authorization Service: Status and Future", In Proc. of Computing in High Energy Physics. (CHEP'03) 2003.
-
(2003)
Proc. of Computing in High Energy Physics. (CHEP'03)
-
-
Foster, I.1
Kesselman, C.2
Pearlman, L.3
Tuecke, S.4
Welch, V.5
-
14
-
-
0036376894
-
DRBAC: Distributed role-based access control for dynamic coalition environments
-
Freudenthal, E., Pesin, T., Keenan, Port, E. L. and Karamcheti, V., "dRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments", Proc. of the Intl. Conf. on Distributed Computing Systems (ICDCS), 2002.
-
(2002)
Proc. of the Intl. Conf. on Distributed Computing Systems (ICDCS)
-
-
Freudenthal, E.1
Pesin, T.2
Keenan Port, E.L.3
Karamcheti, V.4
-
15
-
-
33747129213
-
-
Graham, S., Karmarkar, A., Mischinsky, J., Robinson, I., and Sedukhin, I., eds.
-
Graham, S., Karmarkar, A., Mischinsky, J., Robinson, I., and Sedukhin, I., eds., "Web Services Resource 1.2", http://docs.oasis-open.org/ wsrf/wsrf-ws-resource-1.2-spec-os.pdf, 2006.
-
(2006)
Web Services Resource 1.2
-
-
-
17
-
-
77952373419
-
-
Hirsch, F., ed.
-
Hirsch, F., ed., "ID-WSF 2.0 SecMech SAML Profile, Version v2.0", http://www.projectliberty.org/liberty/content/download/894/6258/ file/liberty-idwsf-security-mechanisms-saml-profile-v2.0.pdf
-
ID-WSF 2.0 SecMech SAML Profile, Version V2.0
-
-
-
18
-
-
3242801879
-
E-speak E-xplained
-
July
-
Karp, A. H. "E-speak E-xplained", CACM, 46(7):113-118, July 2003.
-
(2003)
CACM
, vol.46
, Issue.7
, pp. 113-118
-
-
Karp, A.H.1
-
19
-
-
34547474561
-
Authorization based access control for the services oriented architecture
-
Berkeley, CA, IEEE Press, January
-
Karp, A. H., "Authorization Based Access Control for the Services Oriented Architecture", Proc. 4th Int. Conf. on Creating, Connecting and Collaborating through Computing (C5 2006), Berkeley, CA, IEEE Press, January 2006.
-
(2006)
Proc. 4th Int. Conf. on Creating, Connecting and Collaborating Through Computing (C5 2006)
-
-
Karp, A.H.1
-
20
-
-
77952374462
-
From ABAC to ZBAC: The evolution of access control models
-
February
-
Karp, A. H., Haury, H., and Davis, M. H. "From ABAC to ZBAC: The Evolution of Access Control Models", HP Labs Technical Report HPL-2009-30, February 2009.
-
(2009)
HP Labs Technical Report HPL-2009-30
-
-
Karp, A.H.1
Haury, H.2
Davis, H.M.3
-
24
-
-
70449504689
-
Access control for the services oriented architecture
-
ACM #459074 Fairfax, VA, November
-
Li, J. and Karp, A. H., "Access Control for the Services Oriented Architecture", ACM Workshop on Secure Web Services, ACM #459074, pp. 9-17, Fairfax, VA, November 2007.
-
(2007)
ACM Workshop on Secure Web Services
, pp. 9-17
-
-
Li, J.1
Karp, A.H.2
-
25
-
-
77952355552
-
-
Secure Knowledge Management Workshop, Buffalo, NY, September
-
McGraw, R. W., "Securing Content in the Department of Defense's Global Information Grid", Secure Knowledge Management Workshop, Buffalo, NY, September, 2004.
-
(2004)
Securing Content in the Department of Defense's Global Information Grid
-
-
McGraw, R.W.1
-
30
-
-
77952408841
-
-
OAUTH, http://oauth.net
-
-
-
-
32
-
-
77952403666
-
-
PlanetLab
-
PlanetLab, http://www.planet-lab.org/
-
-
-
-
33
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer, J. H. and Schroeder, M. D. "The Protection of Information in Computer Systems", Proc. of the IEEE, 63(9):1278.1308, 1975.
-
(1975)
Proc. of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
35
-
-
77952412537
-
-
Version 0.9.7.1 November
-
Tom, A., Eaton, B. Hardt, D., Goland, Y., "Web Resource Authorization Protocol (WRAP), Version 0.9.7.1", http://groups.google.com/ group/WRAP-WG, November 2009.
-
(2009)
-
-
Tom, A.1
Eaton, B.2
Hardt, D.3
Goland, Y.4
-
36
-
-
33748549923
-
Polaris: Virus safe computing for windows XP
-
September
-
Stiegler, M., Yee, K-P., Close, T. and Karp, A. H. "Polaris: Virus Safe Computing for Windows XP", Comm. ACM, 49(9):83-88, September 2006.
-
(2006)
Comm. ACM
, vol.49
, Issue.9
, pp. 83-88
-
-
Stiegler, M.1
Yee, K.-P.2
Close, T.3
Karp, A.H.4
-
37
-
-
17644368658
-
X.509 proxy certificates for dynamic delegation
-
Welch, V., Foster, I., Kesselman, C., Mulmo, O., Pearlman, L., Tuecke, Gawor, J., Meder, S., and Siebenlist, F., "X.509 Proxy Certificates for Dynamic Delegation", Proceedings of the 3rd Annual PKI R&D Workshop, 2000.
-
(2000)
Proceedings of the 3rd Annual PKI R&D Workshop
-
-
Welch, V.1
Foster, I.2
Kesselman, C.3
Mulmo, O.4
Pearlman, L.5
Tuecke Gawor, J.6
Meder, S.7
Siebenlist, F.8
|