-
1
-
-
0036387050
-
Hybrid role hierarchy for generalized temporal role based access control model
-
Oxford, England, August 26-29
-
Joshi, J.B.D., Bertino, E.: Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model. In: Proceedings of the 26th Annual International Computer Software and Applications Conference (COMPSAC 2002), Oxford, England, August 26-29 (2002).
-
(2002)
Proceedings of the 26th Annual International Computer Software and Applications Conference (COMPSAC 2002)
-
-
Joshi, J.B.D.1
Bertino, E.2
-
2
-
-
38549096135
-
Dynamic access control research for inter-operation in multi-domain environment based on risk
-
Kim, S. Yung, M. Lee, H.-W. (eds.), LNCS, . Springer, Heidelberg
-
Tang, Z., Li, R., Lu, Z., Wen, Z.: Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol. 4867, pp. 277-290. Springer, Heidelberg (2008).
-
(2008)
WISA 2007
, vol.4867
, pp. 277-290
-
-
Tang, Z.1
Li, R.2
Lu, Z.3
Wen, Z.4
-
3
-
-
49549111832
-
A request-driven policy framework for secure interoperation in multi-domain environment
-
Li, R., Tang, Z., Lu, Z.: A Request-driven Policy Framework for Secure Interoperation in Multi-domain Environment. International Journal of Computer Systems Science & Engineering 23(3), 193-206 (2008).
-
(2008)
International Journal of Computer Systems Science & Engineering
, vol.23
, Issue.3
, pp. 193-206
-
-
Li, R.1
Tang, Z.2
Lu, Z.3
-
4
-
-
30544438141
-
Beyond proof-of-compliance: Security analysis in trust management
-
Li, N., Mitchell, J.C., Winsborough, W.H.: Beyond proof-of-compliance: Security analysis in trust management. Journal of the ACM 52(3), 474-514 (2005).
-
(2005)
Journal of the ACM
, vol.52
, Issue.3
, pp. 474-514
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
6
-
-
0030086382
-
Role based access control models
-
February
-
Sandhu, R., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role Based Access Control Models. Computer 29(2) (February 1996).
-
(1996)
Computer
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
7
-
-
31144439653
-
Generalized role-based access control for securing future applications
-
Baltimore, Md, USA October
-
Moyer, M.J., Covington, M.J., Ahamad, M.: Generalized role-based access control for securing future applications. In: 23rd National Information Systems Security Conference (NISSC 2000), Baltimore, Md, USA (October 2000).
-
(2000)
23rd National Information Systems Security Conference (NISSC 2000)
-
-
Moyer, M.J.1
Covington, M.J.2
Ahamad, M.3
-
8
-
-
30744476985
-
Context-aware dynamic access control for pervasive applications
-
Western MultiConference (WMC), San Diego, CA, USA January
-
Zhang, G., Parashar, M.: Context-Aware Dynamic Access Control for Pervasive Applications. In: Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2004), Western MultiConference (WMC), San Diego, CA, USA (January 2004).
-
(2004)
Proceedings of the Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2004)
-
-
Zhang, G.1
Parashar, M.2
-
9
-
-
4143058053
-
Using trust and risk in role-based access control policies
-
Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J., Moody, K.: Using Trust and Risk in Role-Based Access Control Policies. In: Proceedings of Symposium on Access Control Models and Technologies (2004).
-
(2004)
Proceedings of Symposium on Access Control Models and Technologies
-
-
Dimmock, N.1
Belokosztolszki, A.2
Eyers, D.3
Bacon, J.4
Moody, K.5
-
10
-
-
0009481412
-
A survey of trust in internet applications
-
Fourth Quarter
-
Grandison, T., Sloman, M.: A Survey of Trust in Internet Applications. IEEE Communications Surveys 3(4), 2-16 (Fourth Quarter 2000).
-
(2000)
IEEE Communications Surveys
, vol.3
, Issue.4
, pp. 2-16
-
-
Grandison, T.1
Sloman, M.2
-
12
-
-
0036085965
-
Design of a role-based trust management framework
-
IEEE, Los Alamitos
-
Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust management framework. In: 2002 IEEE Symposium on Security and Privacy, pp. 114-131. IEEE, Los Alamitos (2002).
-
(2002)
2002 IEEE Symposium on Security and Privacy
, pp. 114-131
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
13
-
-
35248894984
-
Fidelis: A policy-driven trust management framework
-
Nixon, P. Terzis, S. (eds.), LNCS, Springer, Heidelberg
-
Yao, W.T.-M.: Fidelis: A policy-driven trust management framework. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 301-317. Springer, Heidelberg (2003).
-
(2003)
ITrust 2003
, vol.2692
, pp. 301-317
-
-
Yao, W.T.-M.1
-
14
-
-
4143058053
-
Using trust and risk in role-based access control policies
-
New York, USA, June 2-4
-
Dimmock, N., Belokosztolszki, A., Eyers, D., et al.: Using Trust and Risk in Role-Based Access Control Policies. In: SACMAT 2004, New York, USA, June 2-4 (2004).
-
(2004)
SACMAT 2004
-
-
Dimmock, N.1
Belokosztolszki, A.2
Eyers, D.3
-
15
-
-
84957011508
-
Decidability of safety in graph-based models for access control
-
Gollmann, D. Karjoth, G. Waidner, M. (eds.), LNCS, Springer, Heidelberg
-
Koch, M., Mancini, L.V., Parisi-Presicce, F.: Decidability of safety in graph-based models for access control. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol. 2502, pp. 229-243. Springer, Heidelberg (2002).
-
(2002)
ESORICS 2002
, vol.2502
, pp. 229-243
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
|