-
2
-
-
33745883651
-
-
Version 2.0 Feb. Last visited on 8/23/2007
-
eXtensible Access Control Markup Language (XACML) Version 2.0. http://docs.oasis-open.org/xacml/2.0/access controlxacml-2.0-core-spec-os.pdf, Feb. 2005, (Last visited on 8/23/2007).
-
(2005)
eXtensible Access Control Markup Language (XACML)
-
-
-
8
-
-
38449085573
-
Domain Based Access Control Model for Distributed Collaborative Applications
-
Washington, DC, USA
-
Y. Demchenko, C. de Laat, L. Gommans, and R. van Buuren. Domain Based Access Control Model for Distributed Collaborative Applications. In E-SCIENCE '06: Proceedings of the Second IEEE International Conference on e-Science and Grid Computing, page 24, Washington, DC, USA, 2006.
-
(2006)
E-SCIENCE '06: Proceedings of the Second IEEE International Conference on E-Science and Grid Computing
, pp. 24
-
-
Demchenko, Y.1
De Laat, C.2
Gommans, L.3
Van Buuren, R.4
-
10
-
-
0036376894
-
-
E. Freudenthal, T. Pesin, L. Port, E. Keenan, and V. Karamcheti. dRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments, 2002.
-
(2002)
DRBAC: Distributed Role-Based Access Control for Dynamic Coalition Environments
-
-
Freudenthal, E.1
Pesin, T.2
Port, L.3
Keenan, E.4
Karamcheti, V.5
-
12
-
-
11044223672
-
Access-Control Language for Multidomain Environments
-
J. B. Joshi, R. Bhatti, E. Bertino, and A. Ghafoor. Access-Control Language for Multidomain Environments. IEEE Internet Computing, 08(6):40-50, 2004.
-
(2004)
IEEE Internet Computing
, vol.8
, Issue.6
, pp. 40-50
-
-
Joshi, J.B.1
Bhatti, R.2
Bertino, E.3
Ghafoor, A.4
-
14
-
-
38349060294
-
-
Technical report, Purdue University
-
N. Li, J. C. Mitchell, W. H. Winsborough, K. E. Seamons, M. Halcrow, and J. Jacobson. RTML: A Role-based Trust-management Markup Language. Technical report, Purdue University, 2004.
-
(2004)
RTML: A Role-based Trust-management Markup Language
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
Seamons, K.E.4
Halcrow, M.5
Jacobson, J.6
-
15
-
-
8344266879
-
Authentication and Authorization Infrastructures (AAIs): A Comparative Survey
-
J. Lopez, R. Oppliger, and G. Pernul. Authentication and Authorization Infrastructures (AAIs): a Comparative Survey. Computers & Security, Volume 23, Issue 7:578-590, 2004.
-
(2004)
Computers & Security
, vol.23
, Issue.7
, pp. 578-590
-
-
Lopez, J.1
Oppliger, R.2
Pernul, G.3
-
16
-
-
34547370490
-
Constraint-Enabled Distributed RBAC for Subscription-Based Remote Network Services
-
Washington, DC, USA, IEEE Computer Society
-
M. Ma and S. Woodhead. Constraint-Enabled Distributed RBAC for Subscription-Based Remote Network Services. In CIT '06: Proceedings of the Sixth IEEE International Conference on Computer and Information Technology (CIT'06), page 160, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
CIT '06: Proceedings of the Sixth IEEE International Conference on Computer and Information Technology (CIT'06)
, pp. 160
-
-
Ma, M.1
Woodhead, S.2
-
17
-
-
4143147395
-
A Composite RBAC Approach for Large, Complex Organizations
-
New York, NY, USA, ACM Press
-
J. S. Park, K. P. Costello, T. M. Neven, and J. A. Diosomito. A Composite RBAC Approach for Large, Complex Organizations. In SACMAT '04: Proceedings of the ninth ACM symposium on Access control models and technologies, pages 163-172, New York, NY, USA, 2004. ACM Press.
-
(2004)
SACMAT '04: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies
, pp. 163-172
-
-
Park, J.S.1
Costello, K.P.2
Neven, T.M.3
Diosomito, J.A.4
-
19
-
-
0030086382
-
Role-Based Access Control Models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-Based Access Control Models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
|