-
2
-
-
34548769351
-
Fuzzy multi-level security: An experiment on quantified risk adaptive access control
-
Oakland, California, USA: ACM, May
-
P. Cheng, P. Rohatgi, C. Keser, P. A. Karger, G. M. Wagner, and A. S. Reninger, "Fuzzy multi-level security: An experiment on quantified risk adaptive access control," in Proceedings of 2007 IEEE Symposium on Security and Privacy (SP'07). Oakland, California, USA: ACM, May 2007, pp. 222 - 230.
-
(2007)
Proceedings of 2007 IEEE Symposium on Security and Privacy (SP'07)
, pp. 222-230
-
-
Cheng, P.1
Rohatgi, P.2
Keser, C.3
Karger, P.A.4
Wagner, G.M.5
Reninger, A.S.6
-
3
-
-
77950607501
-
Trading in risk: Using markets to improve access control
-
Lake Tahoe, California, USA: ACM, September
-
I. Molloy, P.-C. Cheng, and P. Rohatgi, "Trading in risk: Using markets to improve access control," in Proceedings of New Security Paradigms Workshop (NSPW'08). Lake Tahoe, California, USA: ACM, September 2008, pp. 1-19.
-
(2008)
Proceedings of New Security Paradigms Workshop (NSPW'08)
, pp. 1-19
-
-
Molloy, I.1
Cheng, P.-C.2
Rohatgi, P.3
-
5
-
-
70049088429
-
A decision support system for secure information sharing
-
Stresa, Italy: ACM, June
-
A. Fokoue, M. Srivatsa, P. Rohatgi, P. Wrobel, and J. Yesberg, "A decision support system for secure information sharing," in Proceedings of the 14th ACM Symposium on Access Control Models and Technologies. Stresa, Italy: ACM, June 2009, pp. 105 - 114.
-
(2009)
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies
, pp. 105-114
-
-
Fokoue, A.1
Srivatsa, M.2
Rohatgi, P.3
Wrobel, P.4
Yesberg, J.5
-
6
-
-
71049122450
-
Apply measurable risk to strengthen security of a role-based delegation supporting workflow system
-
London, UK: IEEE, July
-
W. Han, Q. Ni, and H. Chen, "Apply measurable risk to strengthen security of a role-based delegation supporting workflow system," in IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2009). London, UK: IEEE, July 2009.
-
(2009)
IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2009)
-
-
Han, W.1
Ni, Q.2
Chen, H.3
-
7
-
-
84992227458
-
Proposed nist standard for role-based access control
-
August
-
D. F. Ferraiola, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, "Proposed nist standard for role-based access control," ACM Transactions on Information and System Security (TISSEC), vol. 4, no. 3, pp. 224-274, August 2001.
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiola, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
8
-
-
84919635357
-
Extensible access control markup language (xacml) version 3.0
-
April
-
E. Rissanen, "Extensible access control markup language (xacml) version 3.0," OASIS Standard, April 2009.
-
(2009)
OASIS Standard
-
-
Rissanen, E.1
-
9
-
-
33745905108
-
-
Sun, June
-
Sun, "Sun's xacml implementation," http://sunxacml.sourceforge. net/, June 2006.
-
(2006)
Sun's xacml implementation
-
-
-
10
-
-
4143058053
-
Using trust and risk in role-based access control policies
-
Yorktown Heights, New York, USA: ACM, June
-
N. Dimmock, A. Belokosztolszki, and D. Eyers, "Using trust and risk in role-based access control policies," in Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies, (SACMAT'04). Yorktown Heights, New York, USA: ACM, June 2004, pp. 156-162.
-
(2004)
Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies, (SACMAT'04)
, pp. 156-162
-
-
Dimmock, N.1
Belokosztolszki, A.2
Eyers, D.3
-
11
-
-
77954482365
-
Risk-based access control systems built on fuzzy inferences
-
Beijing, China, April 13-16
-
Q. Ni, E. Bertino, and J. Lobo, "Risk-based access control systems built on fuzzy inferences," in Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China, April 13-16 2010.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010)
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
-
12
-
-
33748031099
-
A usage-based authorization framework for collaborative computing systems
-
Lake Tahoe, California, USA, June
-
X. Zhang, M. Nakae, M. J. Covington, and R. Sandhu, "A usage-based authorization framework for collaborative computing systems," in Proceedings of the 11th ACM symposium on Access control models and technologies (SACMAT 2006), Lake Tahoe, California, USA, June.
-
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies (SACMAT 2006)
-
-
Zhang, X.1
Nakae, M.2
Covington, M.J.3
Sandhu, R.4
-
13
-
-
71049167747
-
Towards session-aware rbac administration and enforcement with xacml
-
Imperial College London, UK, July
-
M. Xu, D. Wijesekera, X. Zhang, and D. Cooray, "Towards session-aware rbac administration and enforcement with xacml," in Proceedings of IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2009), Imperial College London, UK, July.
-
Proceedings of IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2009)
-
-
Xu, M.1
Wijesekera, D.2
Zhang, X.3
Cooray, D.4
-
14
-
-
70450263359
-
Efficient access enforcement in distributed role-based access control (rbac) deployments
-
Stresa, Italy, June
-
M. V. Tripunitara and B. Carbunar, "Efficient access enforcement in distributed role-based access control (rbac) deployments," in Proceedings of the 14th ACM symposium on Access control models and technologies (SACMAT 2009), Stresa, Italy, June, pp. 155-164.
-
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT 2009)
, pp. 155-164
-
-
Tripunitara, M.V.1
Carbunar, B.2
-
15
-
-
70450277229
-
Access control policy combining: Theory meets practice
-
Stresa, Italy, June
-
N. Li, Q. Wang, W. H. Qardaji, E. Bertino, P. Rao, J. Lobo, and D. Lin, "Access control policy combining: theory meets practice," in Proceedings of the 14th ACM symposium on Access control models and technologies (SACMAT 2009), Stresa, Italy, June 2009, pp. 135-144.
-
(2009)
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT 2009)
, pp. 135-144
-
-
Li, N.1
Wang, Q.2
Qardaji, W.H.3
Bertino, E.4
Rao, P.5
Lobo, J.6
Lin, D.7
-
16
-
-
0015558134
-
Outline of a new approach to the analysis of complex systems and decision processes
-
L. Zadeh, "Outline of a new approach to the analysis of complex systems and decision processes," IEEE Transactions on Systems, Man and Cybernetics, vol. 1, pp. 28-44.
-
IEEE Transactions on Systems, Man and Cybernetics
, vol.1
, pp. 28-44
-
-
Zadeh, L.1
|