-
1
-
-
0010032891
-
Computational issues in secure interoperation
-
L. Gong and X. Qian, "Computational Issues in Secure Interoperation", IEEE Trans. Software Eng., vol.22, no.1.
-
IEEE Trans. Software Eng.
, vol.22
, Issue.1
-
-
Gong, L.1
Qian, X.2
-
2
-
-
0033884687
-
Providing security and interoperation of heterogeneous systems
-
Aug.
-
S. Dawson, S. Qian, and P. Samarati, "Providing Security and Interoperation of Heterogeneous Systems," Distributed and Parallel Databases, vol.8, pp. 119-145, Aug. 2000.
-
(2000)
Distributed and Parallel Databases
, vol.8
, pp. 119-145
-
-
Dawson, S.1
Qian, S.2
Samarati, P.3
-
3
-
-
28244460211
-
Secure interoperation in a multi-domain environment employing RBAC policies
-
Nov.
-
B. Shafiq, J. B. D. Joshi, E. Bertino, A. Ghafoor, "Secure Interoperation in a Multi-Domain Environment Employing RBAC Policies", IEEE Transactions on Knowledge & Data Eng, vol.17, no.11, pp. 1557-1577, Nov. 2005.
-
(2005)
IEEE Transactions on Knowledge & Data Eng
, vol.17
, Issue.11
, pp. 1557-1577
-
-
Shafiq, B.1
Joshi, J.B.D.2
Bertino, E.3
Ghafoor, A.4
-
4
-
-
30644461515
-
SERAT: SEcure role mApping technique for decentralized secure interoperability
-
ACM, New York, NY
-
Shehab, M., Bertino, E., and Ghafoor, A., "SERAT: SEcure role mApping technique for decentralized secure interoperability", ACM Symposium on Access Control Models and Technologies, SACMAT '05. ACM, New York, NY, 159-167
-
ACM Symposium on Access Control Models and Technologies, SACMAT '05
, pp. 159-167
-
-
Shehab, M.1
Bertino, E.2
Ghafoor, A.3
-
6
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
August
-
D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn, and R. Chandramouli, "Proposed NIST standard for role-based access control," ACM Transactions on Information and Systems Security, vol.4, no.3, pp. 224-274, August 2001.
-
(2001)
ACM Transactions on Information and Systems Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
7
-
-
77954523963
-
A request-driven secure interoperation framework in loosely-coupled multi-domain environment employing RBAC policies
-
Nov. White Plains, NY
-
Yue Zhang and James, B.D. Joshi, "A Request-Driven Secure Interoperation Framework in Loosely-Coupled Multi-domain Environment Employing RBAC Policies", The Second International Workshop on Trusted Collaboration, 2007 (TrustCol-07), Nov. 2007, White Plains, NY.
-
(2007)
The Second International Workshop on Trusted Collaboration 2007 (TrustCol-07)
-
-
Zhang, Y.1
James2
Joshi, B.D.3
-
8
-
-
0242625215
-
Temporal hierarchies and inheritance semantics for GTRBAC
-
ACM Press, New York, NY, USA
-
J. B. D. Joshi, E. Bertino, and A. Ghafoor, "Temporal hierarchies and inheritance semantics for GTRBAC", In Proceedings of the 7th ACM symposium on Access control models and technologies, ACM Press, New York, NY, USA, 74-83.
-
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies
, pp. 74-83
-
-
Joshi, J.B.D.1
Bertino, E.2
Ghafoor, A.3
-
9
-
-
57349156959
-
A Framework for User Authorization Query Processing in RBAC extended with Hybrid Hierarchy and Constraints
-
Jun. Estes Park, CO
-
Yue Zhang and James B.D. Joshi, "A Framework for User Authorization Query Processing in RBAC extended with Hybrid Hierarchy and Constraints", ACM symposium on access control models and technologies (SACMAT), Jun. 2008, Estes Park, CO.
-
(2008)
ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
Zhang, Y.1
Joshi, J.B.D.2
|