-
1
-
-
4143059199
-
Organization based access control
-
IEEE Computer Society
-
Abou-El-Kalam, A., Benferhat, S., Miège, A., Baida, R. E., Cuppens, F., Saurel, C., Balbiani, P., Deswarte, Y., Trouessin, G.: Organization based access control. In: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003). IEEE Computer Society (2003).
-
(2003)
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003)
-
-
Abou-El-Kalam, A.1
Benferhat, S.2
Miège, A.3
Baida, R.E.4
Cuppens, F.5
Saurel, C.6
Balbiani, P.7
Deswarte, Y.8
Trouessin, G.9
-
2
-
-
33750534177
-
Towards secure information sharing using role-based delegation
-
Ahn G. J., Mohan B., Hong S. P.: Towards secure information sharing using role-based delegation. J. Netw. Comput. Appl. 30(1), 42-59 (2007).
-
(2007)
J. Netw. Comput. Appl.
, vol.30
, Issue.1
, pp. 42-59
-
-
Ahn, G.J.1
Mohan, B.2
Hong, S.P.3
-
3
-
-
70349657130
-
Deploying security policy in intra and inter workflows management systems
-
IEEE Computer Society, Fukuoka
-
Ayed, S., Cuppens-Boulahia, N., Cuppens, F.: Deploying security policy in intra and inter workflows management systems. In: Proceedings of 3rd International Conference on Availability, Reliability and Security (ARES 2009). IEEE Computer Society, Fukuoka (2009).
-
(2009)
Proceedings of 3rd International Conference on Availability, Reliability and Security (ARES 2009)
-
-
Ayed, S.1
Cuppens-Boulahia, N.2
Cuppens, F.3
-
8
-
-
52249097466
-
Managing delegation in access control models
-
IEEE Computer Society, Guwahati, Inde
-
Ben-Ghorbel-Talbi, M., Cuppens, F., Cuppens-Boulahia, N., Bouhoula, A.: Managing delegation in access control models. In: Proceedings of the 15th International Conference on Advanced Computing and Communications (ADCOM 2007), pp. 744-751. IEEE Computer Society, Guwahati, Inde (2007).
-
(2007)
Proceedings of the 15th International Conference on Advanced Computing and Communications (ADCOM 2007)
, pp. 744-751
-
-
Ben-Ghorbel-Talbi, M.1
Cuppens, F.2
Cuppens-Boulahia, N.3
Bouhoula, A.4
-
9
-
-
57049126545
-
Revocations schemes for delegation licences
-
Springer, Birmingham
-
Ben-Ghorbel-Talbi, M., Cuppens, F., Cuppens-Boulahia, N., Bouhoula, A.: Revocations schemes for delegation licences. In: Proceedings of the 10th International Conference on Information and Communications Security (ICICS 2008). Springer, Birmingham (2008).
-
(2008)
Proceedings of the 10th International Conference on Information and Communications Security (ICICS 2008)
-
-
Ben-Ghorbel-Talbi, M.1
Cuppens, F.2
Cuppens-Boulahia, N.3
Bouhoula, A.4
-
10
-
-
70350606082
-
An extended role-based access control model for delegating obligations
-
LNCS Springer, Linz, Austria
-
Ben-Ghorbel-Talbi, M., Cuppens, F., Cuppens-Boulahia, N., Bouhoula, A.: An extended role-based access control model for delegating obligations. In: Proceedings of the 6th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2009). LNCS Springer, Linz, Austria (2009).
-
(2009)
Proceedings of the 6th International Conference on Trust, Privacy & Security in Digital Business (TrustBus 2009)
-
-
Ben-Ghorbel-Talbi, M.1
Cuppens, F.2
Cuppens-Boulahia, N.3
Bouhoula, A.4
-
15
-
-
84872742167
-
Multi-granular licences to decentralize security administration
-
Paris, France
-
Cuppens, F., Cuppens-Boulahia, N., Coma, C.: Multi-granular licences to decentralize security administration. In: Proceedings of the First International Workshop on Reliability, Availability and Security (SSS/WRAS 2007). Paris, France (2007).
-
(2007)
Proceedings of the First International Workshop on Reliability, Availability and Security (SSS/WRAS 2007)
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Coma, C.3
-
16
-
-
33746441974
-
Inheritance hierarchies in the Or-BAC model and application in a network environment
-
Turku, Finland
-
Cuppens, F., Cuppens-Boulahia, N., Miège, A.: Inheritance hierarchies in the Or-BAC model and application in a network environment. In: Proceedings of the 3rd Workshop on Foundations of Computer Security (FCS04). Turku, Finland (2004).
-
(2004)
Proceedings of the 3rd Workshop on Foundations of Computer Security (FCS04)
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Miège, A.3
-
19
-
-
77953081911
-
-
Jena: A Semantic Web Framework for Java
-
Jena: A Semantic Web Framework for Java. http://jena. sourceforge. net/.
-
-
-
-
20
-
-
63149159856
-
Research on RBAC-based separation of duty constraints
-
Kong G., Li J.: Research on RBAC-based separation of duty constraints. J. Inf. Comput. Sci. 2(3), 235-240 (2007).
-
(2007)
J. Inf. Comput. Sci.
, vol.2
, Issue.3
, pp. 235-240
-
-
Kong, G.1
Li, J.2
-
21
-
-
77953081266
-
A rule-based delegation model for restricted permission inheritance RBAC
-
Yellow Mountain
-
Lee, Y., Park, J., Lee, H., Noh, B.: A rule-based delegation model for restricted permission inheritance RBAC. In: Proceedings of the 2nd International Conference (ACNS 2004). Yellow Mountain (2004).
-
(2004)
Proceedings of the 2nd International Conference (ACNS 2004)
-
-
Lee, Y.1
Park, J.2
Lee, H.3
Noh, B.4
-
22
-
-
77953081958
-
-
Motorbac
-
Motorbac: http://motorbac.sourceforge.net/.
-
-
-
-
26
-
-
0030086382
-
Role-based access control models
-
Sandhu R., Coyne E. J., Feinstein H. L., Youman C. E.: Role-based access control models. IEEE Comput. 29(2), 38-47 (1996).
-
(1996)
IEEE Comput.
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
28
-
-
77953082697
-
-
The Motorbac Tool
-
The Motorbac Tool: http://motorbac.sourceforge.net/.
-
-
-
-
29
-
-
0242453160
-
Memoing evaluation for constraint extensions of datalog
-
Toman D.: Memoing evaluation for constraint extensions of datalog. Constraints 2(3/4), 337-359 (1997).
-
(1997)
Constraints
, vol.2
, Issue.3-4
, pp. 337-359
-
-
Toman, D.1
-
31
-
-
33644684766
-
An attribute-based delegation model and its extension
-
Ye, C., Wu, Z., Fu, Y.: An attribute-based delegation model and its extension. J. Res. Pract. Inf. Technol. 38(1) (2006).
-
(2006)
J. Res. Pract. Inf. Technol.
, vol.38
, Issue.1
-
-
Ye, C.1
Wu, Z.2
Fu, Y.3
-
33
-
-
0242540371
-
Pbdm: A flexible delegation model in RBAC
-
ACM Press, Como
-
Zhang, X., Oh, S., Sandhu, R.: Pbdm: a flexible delegation model in RBAC. In: Proceedings of the 8th ACM Symposium on Access Control Models and Technologies (SACMAT 2003). ACM Press, Como (2003).
-
(2003)
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies (SACMAT 2003)
-
-
Zhang, X.1
Oh, S.2
Sandhu, R.3
|