-
1
-
-
84956993736
-
Role-based authorization constraints specification
-
Nov
-
G. J. Ahn and R. Sandhu, "Role-based authorization constraints specification," ACM Transactions on Information and System Security, vol. 3, no. 4, pp. 207-226, Nov. 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 207-226
-
-
Ahn, G.J.1
Sandhu, R.2
-
2
-
-
35248882716
-
-
S. Farrell, J. Vollbrecht, P. Calhoun, L. Gommans, G. Gross, B. d. Bruijn, C. d. Laat, M. Holdrege, and D. Spence, AAA Authorization Requirements, RFC2906, 2000.
-
(2000)
AAA Authorization Requirements, RFC2906
-
-
Farrell, S.1
Vollbrecht, J.2
Calhoun, P.3
Gommans, L.4
Gross, G.5
Bruijn, B.D.6
Laat, C.D.7
Holdrege, M.8
Spence, D.9
-
3
-
-
0005908365
-
Distributed firewalls
-
special issue on security, Nov
-
S. M. Bellovin, "Distributed firewalls," ;login: magazine, special issue on security, Nov. 1999.
-
(1999)
login: magazine
-
-
Bellovin, S.M.1
-
4
-
-
0032153903
-
An access control model supporting periodicity con-straints and temporal reasoning
-
Sep
-
E. Bertino, C. Bettini, E. Ferrari, and P. Samarati, "An access control model supporting periodicity con-straints and temporal reasoning," ACM Transactions on Database Systems, vol. 23, no. 3, pp. 231-285, Sep. 1998.
-
(1998)
ACM Transactions on Database Systems
, vol.23
, Issue.3
, pp. 231-285
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
5
-
-
0032691796
-
A logical framework for reasoning on data access control policies
-
IEEE Computer Society Press, Jul
-
E. Bertino, F. Buccafurri, E. Ferrari, and P. Rullo, "A logical framework for reasoning on data access control policies," in Proceedings of the IEEE Computer Security Foundations Workshop, pp. 175-191, IEEE Computer Society Press, Jul. 1999.
-
(1999)
Proceedings of the IEEE Computer Security Foundations Workshop
, pp. 175-191
-
-
Bertino, E.1
Buccafurri, F.2
Ferrari, E.3
Rullo, P.4
-
6
-
-
84893074859
-
A system to specify and manage multipolicy ac-cess control models
-
IEEE Computer So-ciety Press., Monterey, CA, USA, June
-
E. Bertino, B. Catania, E. Ferrari, and P. Perlasca, "A system to specify and manage multipolicy ac-cess control models," in 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), pp. 116-127, IEEE Computer So-ciety Press., Monterey, CA, USA, June 2002.
-
(2002)
3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002)
, pp. 116-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
7
-
-
0041524664
-
A logical framework for reasoning about access con-trol models
-
Feb
-
E. Bertino, B. Catania, E. Ferrari, and P. Perlasc, "A logical framework for reasoning about access con-trol models," ACM Transactions on Information and System Security, vol. 6, no. 1, pp. 71-127, Feb. 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
, pp. 71-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasc, P.4
-
8
-
-
0029700918
-
Support-ing multiple access control policies in database sys-tems
-
IEEE Computer Society Press, Oakland, CA, May
-
E. Bertino, S. Jajodia, and P. Samarati, "Support-ing multiple access control policies in database sys-tems," in Proceedings of the IEEE Symposium on Security and Privacy, pp. 94-109, IEEE Computer Society Press, Oakland, CA, May 1996.
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 94-109
-
-
Bertino, E.1
Jajodia, S.2
Samarati, P.3
-
9
-
-
84874816496
-
A Constraint Language for Adage
-
Computational Logic, Inc., April
-
W. R. Bevier, and W. D. Young, A Constraint Language for Adage, Technical report, Computational Logic, Inc., April 1997.
-
(1997)
Technical report
-
-
Bevier, W.R.1
Young, W.D.2
-
10
-
-
0003226048
-
The KeyNote Trust-Management System Version
-
Sep
-
M. Blaze, J. Feigenbaum, and J. Ionnidis, The KeyNote Trust-Management System Version, Tech-nical report, Internet RFC 2704, Sep. 1999.
-
(1999)
Tech-nical report, Internet RFC 2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ionnidis, J.3
-
11
-
-
0029700344
-
Decentral-ized trust management
-
IEEE Computer Society Press, Oakland, CA, May
-
M. Blaze, J. Feigenbaum, and J. Lacy, "Decentral-ized trust management, in Proceedings of the IEEE Symposium on Security and Privacy, pp. 164-173, IEEE Computer Society Press, Oakland, CA, May 1996.
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
12
-
-
85025424440
-
An algebra for composing access control policies
-
Feb
-
P. Bonatti, S. d. C. d. Vimercati, and P. Samarati, "An algebra for composing access control policies," ACM Transactions on Information and System Security , vol. 5, no. 1, pp. 1-35, Feb. 2002.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.1
Vimercati, S.D.C.D.2
Samarati, P.3
-
13
-
-
0024663219
-
The Chi-nese wall security policy
-
IEEE Computer Society Press, Oakland, CA, May
-
David F. Brewer and Michael J. Nash, "The Chi-nese wall security policy," in Proceedings of the IEEE Symposium on Security and Privacy, pp. 206-214, IEEE Computer Society Press, Oakland, CA, May 1989.
-
(1989)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 206-214
-
-
Brewer, D.F.1
Nash, M.J.2
-
14
-
-
0004043780
-
-
Camdbridge University Press
-
B. Chellas, Modal Logic, Camdbridge University Press, 1980.
-
(1980)
Modal Logic
-
-
Chellas, B.1
-
16
-
-
0242540379
-
Specifying and enforcing constraints in role-based access control
-
ACM Press, New York, Jun. 2-3
-
J. Crampton, "Specifying and enforcing constraints in role-based access control," in Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies (SACMAT-03), pp. 43-50, ACM Press, New York, Jun. 2-3 2003.
-
(2003)
Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies (SACMAT-03)
, pp. 43-50
-
-
Crampton, J.1
-
18
-
-
84944048132
-
The Ponder policy specification language
-
Springer-Verlag, Bristol, UK, Jan
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman, "The Ponder policy specification language," in Policy 2001: Workshop on Policies for Distributed Systems and Networks, LNCS 1995, pp. 17-28, Springer-Verlag, Bristol, UK, Jan. 2001.
-
(2001)
Policy 2001: Workshop on Policies for Distributed Systems and Networks, LNCS 1995
, pp. 17-28
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
19
-
-
34548017808
-
Enforcing history-based security policies in mobile agent sys-tems
-
IEEE Computer Society Press, Lake Como (Italy)
-
P. Dias, C. Ribeiro, and P. Ferreira, "Enforcing history-based security policies in mobile agent sys-tems," in Proceedings of the IEEE 4th International Workshop on Policies for Distributed Systemsand Networks, pp. 231-234, IEEE Computer Society Press, Lake Como (Italy), 2003.
-
(2003)
Proceedings of the IEEE 4th International Workshop on Policies for Distributed Systemsand Networks
, pp. 231-234
-
-
Dias, P.1
Ribeiro, C.2
Ferreira, P.3
-
20
-
-
0032218233
-
History-based access control for mobile code
-
ACM Press, San Francisco, Cali-fornia, Nov
-
G. Edjlali, A. Acharya, and V. Chaudhary, "History-based access control for mobile code," in 5th ACM Conference on Computer and Communications Security , pp. 38-48, ACM Press, San Francisco, Cali-fornia, Nov. 1998.
-
(1998)
5th ACM Conference on Computer and Communications Security
, pp. 38-48
-
-
Edjlali, G.1
Acharya, A.2
Chaudhary, V.3
-
21
-
-
0003358457
-
SPKI Certificate Theory
-
Sep
-
C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B.M. Thomas, and T. Ylonen, SPKI Certificate Theory , Internet RFC 2693, Sep. 1999.
-
(1999)
Internet RFC 2693
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.M.5
Ylonen, T.6
-
23
-
-
0032186691
-
Theory and practice of constraint han-dling rules, special issue on constraint logic program-ming
-
Oct
-
T. F. Wirth, "Theory and practice of constraint han-dling rules, special issue on constraint logic program-ming," Journal of Logic Programming, pp. 95-138, Oct. 1998.
-
(1998)
Journal of Logic Programming
, pp. 95-138
-
-
Wirth, T.F.1
-
24
-
-
33751098803
-
Heimdhal: A history-based policy engine for grids
-
Singapore, May
-
P. Gama, C. Ribeiro, and P. Ferreira, "Heimdhal: A history-based policy engine for grids," in 6th IEEE International Symposium on Cluster Computing and Grid, Singapore, May 2006.
-
(2006)
6th IEEE International Symposium on Cluster Computing and Grid
-
-
Gama, P.1
Ribeiro, C.2
Ferreira, P.3
-
26
-
-
13244254629
-
OASIS eXtensible access control markup language (XACML)
-
Aug
-
S. Godik and T. Moses, "OASIS eXtensible access control markup language (XACML), OASIS draft version 16, Aug. 2002.
-
(2002)
OASIS draft version 16
-
-
Godik, S.1
Moses, T.2
-
27
-
-
0005307288
-
Transaction Processing: Concepts and Techniques
-
Morgan Kaufmann Publishers, Inc., SanMateo (CA), USA
-
J. Gray and A. Reuter, Transaction Processing: Concepts and Techniques, Data Management Sys-tems, Morgan Kaufmann Publishers, Inc., SanMateo (CA), USA, 1993.
-
(1993)
Data Management Sys-tems
-
-
Gray, J.1
Reuter, A.2
-
28
-
-
0033724294
-
Access control meets public key infras-tructure, or: Assigning roles to strangers
-
IEEE Computer Society Press, May
-
A. Herzberg, Y. Mass, J. Mihaeli, D. Naor, and Y. Ravid, "Access control meets public key infras-tructure, or: Assigning roles to strangers," in Proceedings of the IEEE Symposium on Security and Privacy, pp. 2-14, IEEE Computer Society Press, May 2000.
-
(2000)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
Naor, D.4
Ravid, Y.5
-
29
-
-
84874797554
-
-
IBM Corporation, Entrepise Security Architecture Using Tivoli Security Solutions
-
IBM Corporation, Entrepise Security Architecture Using Tivoli Security Solutions, 2002.
-
(2002)
-
-
-
30
-
-
84874806114
-
-
Sotiris Ioannidis, Security Policy Consistency and Distributed Evalution in Heterogeneous Environments , PhD thesis, University of Pennsylvania
-
Sotiris Ioannidis, Security Policy Consistency and Distributed Evalution in Heterogeneous Environments , PhD thesis, University of Pennsylvania, 2005.
-
(2005)
-
-
-
31
-
-
0001619596
-
Flexible support for multiple access control policies
-
Jun
-
S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subramanian, "Flexible support for multiple access control policies," ACM Trans. on Database Systems, vol. 26, no. 2, pp. 214-260, Jun. 2001.
-
(2001)
ACM Trans. on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subramanian, V.S.4
-
32
-
-
0030677524
-
A logical language for expressing authorizations
-
IEEE Computer Society Press, Oakland, CA, May
-
S. Jajodia, P. Samarati, and V. S. Subrahmanian, "A logical language for expressing authorizations," in Proceedings of the IEEE Symposium on Security and Privacy, pp. 31-43, IEEE Computer Society Press, Oakland, CA, May 1997.
-
(1997)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 31-43
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
-
33
-
-
84874814211
-
Security Policy Specification Using a Graphical Approach, Technical Report CSE-98-3, University of California
-
H. James, R. Pandey, and K. Levitt, Security Policy Specification Using a Graphical Approach, Technical Report CSE-98-3, University of California, Davis De-partment of Computer Science, 1998.
-
(1998)
Davis De-partment of Computer Science
-
-
James, H.1
Pandey, R.2
Levitt, K.3
-
34
-
-
84942257511
-
The STRONGMAN architecture
-
IEEE press, Apr
-
A. D. Keromytis, S. Ioannidis, M. Greenwald, and J. Smith, "The STRONGMAN architecture," in Proceedings, DARPA Information Survivability Confernce and Exhibition, vol. 1, pp. 178-188, IEEE press, Apr. 2003.
-
(2003)
Proceedings, DARPA Information Survivability Confernce and Exhibition
, vol.1
, pp. 178-188
-
-
Keromytis, A.D.1
Ioannidis, S.2
Greenwald, M.3
Smith, J.4
-
36
-
-
0031373615
-
A policy based role object model
-
Gold Coast, Queensland, Australia, Oct
-
E. Lupu and M. Sloman, "A policy based role object model," in First International Enterprise Distributed Object Computing Workshop (EDOC'97), pp. 36-47, Gold Coast, Queensland, Australia, Oct. 1997.
-
(1997)
First International Enterprise Distributed Object Computing Workshop (EDOC'97)
, pp. 36-47
-
-
Lupu, E.1
Sloman, M.2
-
37
-
-
0000788149
-
Law-governed in-teraction: a coordination and control mechanism for heterogeneous distributed systems
-
Jul
-
N. H. Minsky and V. Ungureanu, "Law-governed in-teraction: a coordination and control mechanism for heterogeneous distributed systems," ACM Transactions on Software Engineering and Methodology, vol. 9, no. 3, pp. 273-305, Jul. 2000.
-
(2000)
ACM Transactions on Software Engineering and Methodology
, vol.9
, Issue.3
, pp. 273-305
-
-
Minsky, N.H.1
Ungureanu, V.2
-
38
-
-
84874791014
-
Uma Plataforma Para Poíiticas de Autoriza ç~ao Para Organizaç~oes
-
PhD thesis, Instituto Superior Técnico, Lisbon, Portugal, Jul
-
C. Ribeiro, Uma Plataforma Para Poíiticas de Autoriza ç~ao Para Organizaç~oes, PhD thesis, Instituto Superior Técnico, Lisbon, Portugal, Jul. 2002.
-
(2002)
-
-
Ribeiro, C.1
-
39
-
-
48749114683
-
Security policy consistency
-
Imperial College, London, UK, Jul
-
C. Ribeiro, P. Ferreira, A. Zuquete, and P. Guedes, "Security policy consistency," in CL2000 -First Workshop on Rule-Based Constraint Reasoning and Programming, Imperial College, London, UK, Jul. 2000.
-
(2000)
CL2000 -First Workshop on Rule-Based Constraint Reasoning and Programming
-
-
Ribeiro, C.1
Ferreira, P.2
Zuquete, A.3
Guedes, P.4
-
40
-
-
84956971202
-
En-forcing obligation with security monitors
-
Springer Verlag, Xi'an, China, November
-
C. Ribeiro, A. Zuquete, and P. Ferreira, "En-forcing obligation with security monitors," in The Third International Conference on Information and Communication Security (ICICS'2001), pp. 172-176, Springer Verlag, Xi'an, China, November 2001.
-
(2001)
The Third International Conference on Information and Communication Security (ICICS'2001)
, pp. 172-176
-
-
Ribeiro, C.1
Zuquete, A.2
Ferreira, P.3
-
41
-
-
84945150402
-
Spl: An access control language for security poli-cies with complex constraints
-
San Diego, California, Feb
-
C. Ribeiro, A. Zuquete,P. Ferreira, and P. Guedes, "Spl: An access control language for security poli-cies with complex constraints," in Network and Distributed System Security Symposium (NDSS'01), col-orredpp. ?, San Diego, California, Feb. 2001.
-
(2001)
Network and Distributed System Security Symposium (NDSS'01), col-orredpp. ?
-
-
Ribeiro, C.1
Zuquete, A.2
Ferreira, P.3
Guedes, P.4
-
43
-
-
0003342146
-
Separation of duties in computarized information systems
-
Halifax, UK, Sep. 18-21
-
R. Sandhu, "Separation of duties in computarized information systems," in Proceedings of the IFIP WG11.3 Workshop on Database Security, pp. 179-190, Halifax, UK, Sep. 18-21 1990.
-
(1990)
Proceedings of the IFIP WG11.3 Workshop on Database Security
, pp. 179-190
-
-
Sandhu, R.1
-
44
-
-
0027699087
-
Lattice-based access control models
-
Nov
-
R. Sandhu, "Lattice-based access control models," IEEE Computer, vol. 26, no. 11, pp. 9-19, Nov. 1993.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.1
-
45
-
-
0030086382
-
Role-based access control models
-
Feb
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-based access control models," Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
46
-
-
84881225236
-
Enforceable security policies
-
Feb
-
F. B. Schneider, "Enforceable security policies," ACM Transactions on Information and System Security , vol. 3, no. 1, pp. 30-50, Feb. 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
47
-
-
0345980113
-
Adage: An Architecture for Distributed Authorization
-
OSF Research Institute, Cambridge
-
R. Simon and M. E. Zurko, Adage: An Architecture for Distributed Authorization, Technical report, OSF Research Institute, Cambridge, 1997.
-
(1997)
Technical report
-
-
Simon, R.1
Zurko, M.E.2
-
48
-
-
0030644642
-
Separation of duty in role-based environments
-
IEEE Computer Society Press, Jun
-
R. Simon, and M. E. Zurko, "Separation of duty in role-based environments," in Proceedings of the IEEE Computer Security Foundations Workshop, pp. 183-194, IEEE Computer Society Press, Jun. 1997.
-
(1997)
Proceedings of the IEEE Computer Security Foundations Workshop
, pp. 183-194
-
-
Simon, R.1
Zurko, M.E.2
-
50
-
-
3142523600
-
A propositional pol-icy algebra for access control
-
D. Wijesekera and S. Jajodia, "A propositional pol-icy algebra for access control," ACM Transactions on Information and System Security, vol. 6, no. 2, pp. 286-325, 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.2
, pp. 286-325
-
-
Wijesekera, D.1
Jajodia, S.2
-
51
-
-
0026851844
-
Authorization in dis-tributed systems: A formal approach
-
IEEE Computer Society Press, May
-
T. Y. C. Woo and S. S. Lam, "Authorization in dis-tributed systems: A formal approach," in Proceedings of the IEEE Symposium on Security and Privacy , pp. 33-51, IEEE Computer Society Press, May 1992.
-
(1992)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 33-51
-
-
Woo, T.Y.C.1
Lam, S.S.2
-
52
-
-
3042684910
-
A rule-based framework for role-based delegation and revocation
-
L. Zhang, G. J. Ahn, and B. T. Chug, "A rule-based framework for role-based delegation and revocation," ACM Transactions on Information and System Security , vol. 6, no. 3, pp. 404-441, 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.3
, pp. 404-441
-
-
Zhang, L.1
Ahn, G.J.2
Chug, B.T.3
-
53
-
-
84940100462
-
A user-centered, modular authorization service built on an RBAC foundation
-
IEEE Computer Society Press, May
-
M. E. Zurko, R. Simon, and T. Sanfilipo, "A user-centered, modular authorization service built on an RBAC foundation," in Proceedings of the IEEE Symposium on Security and Privacy, pp. 57-73. IEEE Computer Society Press, May 1999.
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 57-73
-
-
Zurko, M.E.1
Simon, R.2
Sanfilipo, T.3
|