-
1
-
-
79957907619
-
-
http://ec2-184-72-45-148.us-west-1.compute.amazonaws.com/CloudWebProject/ Login.jsp
-
-
-
-
2
-
-
84885573531
-
-
"Amazon EC2", Available at: http://aws.amazon.com/ec2
-
Amazon EC2
-
-
-
5
-
-
79957904800
-
Ensuring spatio-temporal access control for real-world applications
-
SACMAT June
-
Kyriakos Anastasakis, Behzad Bordbar, Geri Georg, Indrakshi Ray, and Manachai Toahchoodee, "Ensuring Spatio-Temporal Access Control for Real-World Applications", Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT June 2009.
-
(2009)
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies
-
-
Anastasakis, K.1
Bordbar, B.2
Georg, G.3
Ray, I.4
Toahchoodee, M.5
-
6
-
-
84949747356
-
An authorization model for workflows
-
V. Atluri and W.-K. Huang. "An authorization model for workflows". In proc. of the ESORIC 1996, LNCS1146, pages 44-64, September 1996. (Pubitemid 126128893)
-
(1996)
Lecture Notes in Computer Science
, Issue.1146
, pp. 44-64
-
-
Atluri, V.1
Huang, W.-K.2
-
9
-
-
0030086382
-
Role-based access control models
-
E. Coyne, H. Fenstein, R. Sandhu and C. Youman, "Role-Based Access Control Models", IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Coyne, E.1
Fenstein, H.2
Sandhu, R.3
Youman, C.4
-
10
-
-
39049126192
-
A study of access control requirements for healthcare systems based on audit trails from access logs
-
Miami, Florida, December
-
O. Edsberg and L. Røstad, "A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs", In Proc. of 22nd Annual Computer Security Applications Conference, Miami, Florida, December, 2006.
-
(2006)
Proc. of 22nd Annual Computer Security Applications Conference
-
-
Edsberg, O.1
Røstad, L.2
-
12
-
-
0003488696
-
-
Tsinghua New York: Springer Verlag
-
Y. Fan, W. Shi, C. Wu, "Fundamentals of Workflow Management Technology", Tsinghua New York: Springer Verlag, 2001, pp. 30-35.
-
(2001)
Fundamentals of Workflow Management Technology
, pp. 30-35
-
-
Fan, Y.1
Shi, W.2
Wu, C.3
-
13
-
-
34547700615
-
RTFW: An access control model for workflow environment
-
10th International Conference on May
-
Hao Jiang, Shengye Lu, "RTFW: An Access Control Model for Workflow Environment", Computer Supported Cooperative Work in Design, 10th International Conference on, May 2006.
-
(2006)
Computer Supported Cooperative Work in Design
-
-
Jiang, H.1
Lu, S.2
-
15
-
-
0038825675
-
Task-role-based access control model
-
September
-
Sejong Oh, Seog Park, "Task-Role-Based Access Control Model", Information System, September 2003.
-
(2003)
Information System
-
-
Oh, S.1
Park, S.2
-
17
-
-
0003195066
-
The MD5 message-digest algorithm
-
Apr
-
R. Riverst, "The MD5 Message-Digest Algorithm", RFC 1321, Apr 1992.
-
(1992)
RFC
, vol.1321
-
-
Riverst, R.1
-
18
-
-
0002841051
-
Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management
-
August
-
R. S. Sandhu and R. K. Thomas, "Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management", In proceedings of the IFIP WG11.3 Workshop on Database Security, August 1997.
-
(1997)
Proceedings of the IFIP WG11.3 Workshop on Database Security
-
-
Sandhu, R.S.1
Thomas, R.K.2
|