-
1
-
-
0003727420
-
-
Cambridge University Press, Cambridge UK
-
F. Baader, D. Calvanese, D. L. McGuinness, D. Nardi, and P. F. Patel-Schneider. The Description Logic Handbook: Theory, Implementation, and Applications. Cambridge University Press, Cambridge UK, 2003.
-
(2003)
The Description Logic Handbook: Theory, Implementation, and Applications.
-
-
Baader, F.1
Calvanese, D.2
McGuinness, D.L.3
Nardi, D.4
Patel-Schneider, P.F.5
-
2
-
-
10044257236
-
-
Technical report, World Wide Web Consortium
-
S. Bechhofer, F. van Harmelen, J. Hendler, I. Horrocks, D. L. McGuinness, P. F. Patel-Schneider, and L. A. Stein. OWL Web Ontology Language reference. Technical report, World Wide Web Consortium, 2004.http://www.w3.org/TR/owl-ref/.
-
(2004)
OWL Web Ontology Language Reference
-
-
Bechhofer, S.1
Van Harmelen, F.2
Hendler, J.3
Horrocks, I.4
McGuinness, D.L.5
Patel-Schneider, P.F.6
Stein, L.A.7
-
3
-
-
30644474741
-
GEO-RBAC: A spatially aware RBAC
-
ACM
-
E. Bertino, B. Catania, M. L. Damiani, and P. Perlasca. GEO-RBAC: A Spatially Aware RBAC. In ACM Symposium on Access Control Models and Technologies (SACMAT), pages 29-37. ACM, 2005.
-
(2005)
ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 29-37
-
-
Bertino, E.1
Catania, B.2
Damiani, M.L.3
Perlasca, P.4
-
4
-
-
84875547646
-
A constraint and attribute based security framework for dynamic role assignment in collaborative environments
-
Springer
-
I. F. Cruz, R. Gjomemo, B. Lin, and M. Orsini. A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments. In International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pages 1-18. Springer, 2008.
-
(2008)
International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)
, pp. 1-18
-
-
Cruz, I.F.1
Gjomemo, R.2
Lin, B.3
Orsini, M.4
-
5
-
-
0033884687
-
Providing security and interoperation of heterogeneous systems
-
S. Dawson, S. Qian, and P. Samarati. Providing Security and Interoperation of Heterogeneous Systems. Distrib. Parallel Databases, 8(1):119-145, 2000.
-
(2000)
Distrib. Parallel Databases
, vol.8
, Issue.1
, pp. 119-145
-
-
Dawson, S.1
Qian, S.2
Samarati, P.3
-
6
-
-
33748076789
-
Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy
-
ACM
-
S. Du and J. B. D. Joshi. Supporting Authorization Query and Inter-domain Role Mapping in Presence of Hybrid Role Hierarchy. In ACM Symposium on Access Control Models and Technologies (SACMAT), pages 228-236. ACM, 2006.
-
(2006)
ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 228-236
-
-
Du, S.1
Joshi, J.B.D.2
-
7
-
-
0010032891
-
Computational issues in secure interoperation
-
L. Gong and X. Qian. Computational Issues in Secure Interoperation. IEEE Trans. Softw. Eng., 22(1):43-52, 1996.
-
(1996)
IEEE Trans. Softw. Eng.
, vol.22
, Issue.1
, pp. 43-52
-
-
Gong, L.1
Qian, X.2
-
8
-
-
11044223672
-
Access-control language for multidomain environments
-
J. B. Joshi, R. Bhatti, E. Bertino, and A. Ghafoor. Access-Control Language for Multidomain Environments. IEEE Internet Computing, 8:40-50, 2004.
-
(2004)
IEEE Internet Computing
, vol.8
, pp. 40-50
-
-
Joshi, J.B.1
Bhatti, R.2
Bertino, E.3
Ghafoor, A.4
-
12
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-Based Access Control Models. Computer, 29(2):38-47, 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
13
-
-
28244460211
-
Secure interoperation in a multidomain environment employing RBAC policies
-
B. Shafiq, J. B. D. Joshi, E. Bertino, and A. Ghafoor. Secure Interoperation in a Multidomain Environment Employing RBAC Policies. IEEE Trans. on Knowl. and Data Eng., 17(11):1557-1577, 2005.
-
(2005)
IEEE Trans. on Knowl. and Data Eng.
, vol.17
, Issue.11
, pp. 1557-1577
-
-
Shafiq, B.1
Joshi, J.B.D.2
Bertino, E.3
Ghafoor, A.4
-
15
-
-
77954476833
-
Managing security policies in a distributed environment using eXtensible Markup Language (XML)
-
ACM
-
N. N. Vuong, G. Smith, and Y. Deng. Managing Security Policies in a Distributed Environment Using eXtensible Markup Language (XML). In ACM Symposium on Applied Computing (SAC), pages 405-411. ACM, 2001.
-
(2001)
ACM Symposium on Applied Computing (SAC)
, pp. 405-411
-
-
Vuong, N.N.1
Smith, G.2
Deng, Y.3
|