-
1
-
-
35048883832
-
VOMS, an authorization system for virtual organizations
-
Fernández Rivera, F., Bubak, M., Gómez Tato, A., Doallo, R. (eds.) Across Grids 2003. Springer, Heidelberg
-
Alfieri, R., Cecchini, R.L., Ciaschini, V., dell'Agnello, L., Frohner, A., Gianoli, A., Lõrentey, K., Spataro, F.: VOMS, an authorization system for virtual organizations. In: Fernández Rivera, F., Bubak, M., Gómez Tato, A., Doallo, R. (eds.) Across Grids 2003. LNCS, vol. 2970, pp. 33-40. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.2970
, pp. 33-40
-
-
Alfieri, R.1
Cecchini, R.L.2
Ciaschini, V.3
Dell'Agnello, L.4
Frohner, A.5
Gianoli, A.6
Lõrentey, K.7
Spataro, F.8
-
5
-
-
0037362986
-
Role-based access control with x. 509 attribute certificates
-
Chadwick, D., Otenko, A., Ball, E.: Role-based access control with x. 509 attribute certificates. IEEE Internet Computing 7(2), 62-69 (2003)
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.2
, pp. 62-69
-
-
Chadwick, D.1
Otenko, A.2
Ball, E.3
-
8
-
-
0141911037
-
-
Artech House, Inc., Norwood
-
Ferraiolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control. Artech House, Inc., Norwood (2003)
-
(2003)
Role-Based Access Control
-
-
Ferraiolo, D.F.1
Kuhn, D.R.2
Chandramouli, R.3
-
9
-
-
0035455653
-
The anatomy of the grid: Enabling scalable virtual organizations
-
Foster, I., Kesselman, C., Tuecke, S.: The anatomy of the grid: Enabling scalable virtual organizations. International Journal of High Performance Computing Applications 15(3), 200 (2001)
-
(2001)
International Journal of High Performance Computing Applications
, vol.15
, Issue.3
, pp. 200
-
-
Foster, I.1
Kesselman, C.2
Tuecke, S.3
-
10
-
-
0010032891
-
Computational issues in secure interoperation
-
Gong, L., Qian, X.: Computational issues in secure interoperation. IEEE Trans. Softw. Eng. 22(1), 43-52 (1996)
-
(1996)
IEEE Trans. Softw. Eng.
, vol.22
, Issue.1
, pp. 43-52
-
-
Gong, L.1
Qian, X.2
-
11
-
-
79551535025
-
On the definition of access control requirements for grid and cloud computing systems
-
Doulamis, A., Mambretti, J., Tomkos, I., Varvarigou, T. (eds.) GridNets 2009. Springer, Heidelberg
-
Gouglidis, A., Mavridis, I.: On the definition of access control requirements for grid and cloud computing systems. In: Doulamis, A., Mambretti, J., Tomkos, I., Varvarigou, T. (eds.) GridNets 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 25, pp. 19-26. Springer, Heidelberg (2010)
-
(2010)
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, vol.25
, pp. 19-26
-
-
Gouglidis, A.1
Mavridis, I.2
-
16
-
-
84887853842
-
A community authorization service for group collaboration
-
IEEE, Los Alamitos
-
Pearlman, L., Welch, V., Foster, I., Kesselman, C., Tuecke, S.: A community authorization service for group collaboration. In: Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks., pp. 50-59. IEEE, Los Alamitos (2002)
-
(2002)
Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks
, pp. 50-59
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
-
17
-
-
0036949030
-
Challenge: Integrating mobile wireless devices into the computational grid
-
ACM, New York
-
Phan, T., Huang, L., Dulan, C.: Challenge: integrating mobile wireless devices into the computational grid. In: Proceedings of the 8th Annual International Conference on Mobile Computing and Networking, p. 278. ACM, New York (2002)
-
(2002)
Proceedings of the 8th Annual International Conference on Mobile Computing and Networking
, pp. 278
-
-
Phan, T.1
Huang, L.2
Dulan, C.3
-
18
-
-
50249167255
-
Mobility and qos support for a commercial mobile grid in akogrimo
-
Racz, P., Burgos, J., Inacio, N., Morariu, C., Olmedo, V., Villagra, V., Aguiar, R., Stiller, B.: Mobility and qos support for a commercial mobile grid in akogrimo. In: 16th IST on Mobile and Wireless Communications Summit, pp. 1-5 (2007)
-
(2007)
16th IST on Mobile and Wireless Communications Summit
, pp. 1-5
-
-
Racz, P.1
Burgos, J.2
Inacio, N.3
Morariu, C.4
Olmedo, V.5
Villagra, V.6
Aguiar, R.7
Stiller, B.8
-
19
-
-
35248873795
-
Usage control: A vision for next generation access control
-
Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. Springer, Heidelberg
-
Sandhu, R., Park, J.: Usage control: A vision for next generation access control. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol. 2776, pp. 17-31. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2776
, pp. 17-31
-
-
Sandhu, R.1
Park, J.2
-
20
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38-47 (1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
21
-
-
28244460211
-
Secure interoperation in a multidomain environment employing rbac policies
-
Shafiq, B., Joshi, J.B.D., Bertino, E., Ghafoor, A.: Secure interoperation in a multidomain environment employing rbac policies. IEEE Trans. on Knowl. and Data Eng. 17(11), 1557-1577 (2005)
-
(2005)
IEEE Trans. on Knowl. and Data Eng.
, vol.17
, Issue.11
, pp. 1557-1577
-
-
Shafiq, B.1
Joshi, J.B.D.2
Bertino, E.3
Ghafoor, A.4
-
22
-
-
30644461515
-
Serat: Secure role mapping technique for decentralized secure interoperability
-
ACM, New York
-
Shehab, M., Bertino, E., Ghafoor, A.: Serat: Secure role mapping technique for decentralized secure interoperability. In: SACMAT 2005: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies, pp. 159-167. ACM, New York (2005)
-
(2005)
SACMAT 2005: Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies
, pp. 159-167
-
-
Shehab, M.1
Bertino, E.2
Ghafoor, A.3
-
23
-
-
2942654406
-
Certificate-based authorization policy in a pki environment
-
Thompson, M., Essiari, A., Mudumbai, S.: Certificate-based authorization policy in a pki environment. ACM Transactions on Information and System Security (TISSEC) 6(4), 566-588 (2003)
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.4
, pp. 566-588
-
-
Thompson, M.1
Essiari, A.2
Mudumbai, S.3
-
24
-
-
24344501341
-
Access control in collaborative systems
-
Tolone, W., Ahn, G.J., Pai, T., Hong, S.P.: Access control in collaborative systems. ACM Comput. Surv. 37(1), 29-41 (2005)
-
(2005)
ACM Comput. Surv.
, vol.37
, Issue.1
, pp. 29-41
-
-
Tolone, W.1
Ahn, G.J.2
Pai, T.3
Hong, S.P.4
-
25
-
-
37849052062
-
Regulatory issues for mobile grid computing in the european union
-
Waldburger, M., Stiller, B.: Regulatory issues for mobile grid computing in the european union. In: 17th European Regional ITS Conference, Amsterdam, The Netherlands, pp. 1-9 (2006)
-
(2006)
17th European Regional ITS Conference, Amsterdam, The Netherlands
, pp. 1-9
-
-
Waldburger, M.1
Stiller, B.2
-
27
-
-
33748031099
-
A usage-based authorization framework for collaborative computing systems
-
ACM, New York
-
Zhang, X., Nakae, M., Covington, M., Sandhu, R.: A usage-based authorization framework for collaborative computing systems. In: Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, pp. 180-189. ACM, New York (2006)
-
(2006)
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies
, pp. 180-189
-
-
Zhang, X.1
Nakae, M.2
Covington, M.3
Sandhu, R.4
-
28
-
-
38949184514
-
Toward a usage-based security framework for collaborative computing systems
-
Zhang, X., Nakae, M., Covington, M.J., Sandhu, R.: Toward a usage-based security framework for collaborative computing systems. ACM Trans. Inf. Syst. Secur. 11(1), 1-36 (2008)
-
(2008)
ACM Trans. Inf. Syst. Secur.
, vol.11
, Issue.1
, pp. 1-36
-
-
Zhang, X.1
Nakae, M.2
Covington, M.J.3
Sandhu, R.4
|