-
1
-
-
84858150604
-
A non-technical user-oriented display notation for XACML conditions, E-Technologies: Innovation in an Open World
-
Springer LNBIP 26
-
B. Stepien, A. Felty, and S. Matwin, A non-technical user-oriented display notation for XACML conditions, E-Technologies: Innovation in an Open World, in Proc. of the 4th International MCeTech Conference, Springer LNBIP 26, 2009.
-
(2009)
Proc. of the 4th International MCeTech Conference
-
-
Stepien, B.1
Felty, A.2
Matwin, S.3
-
2
-
-
80052088975
-
-
XACML OASIS standard
-
XACML, OASIS standard, http://www.oasisopen.org/committees/tc-home.php? wg-abbrev=xacml
-
-
-
-
5
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, C. E. Youman, Role-Based Access Control Models, in IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
6
-
-
0035790675
-
The Role-Based Access Control System of a European Bank: A Case Study and Discussion
-
A. Schaad, J. Moffett, J. Jacob, The Role-Based Access Control System of a European Bank: A Case Study and Discussion, in Proc. of the 6th ACM Symposium on Access Control Models and Technologies, pages 3- 9, 2001.
-
(2001)
Proc. of the 6th ACM Symposium on Access Control Models and Technologies
, pp. 3-9
-
-
Schaad, A.1
Moffett, J.2
Jacob, J.3
-
7
-
-
80052096846
-
Integrating policy-driven role based access control with the common data security architecture technical report
-
A. Lin, Integrating Policy-Driven Role Based Access Control With The Common Data Security Architecture, Technical Report, HP Laboratories, HPL-1999-59, 1999.
-
(1999)
HP Laboratories HPL-1999-1959
-
-
Lin, A.1
-
8
-
-
77953350247
-
Adding attributes to role-based access control
-
R. Kuhn, E. J. Coyne, T. R. Weil, Adding Attributes to Role-Based Access Control, in IEEE Computer, 43(6):79-81, 2010.
-
(2010)
IEEE Computer
, vol.43
, Issue.6
, pp. 79-81
-
-
Kuhn, R.1
Coyne, E.J.2
Weil, T.R.3
-
9
-
-
37249093004
-
RBAC standard rationale
-
D. Ferraiolo, R. Kuhn, R. Sandhu, RBAC Standard Rationale, in IEEE Security & Privacy, 5(6):51-53, 2007.
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.6
, pp. 51-53
-
-
Ferraiolo, D.1
Kuhn, R.2
Sandhu, R.3
-
10
-
-
0033657498
-
Application of XML tools for enterprise-wide RBAC implementation tasks
-
Workshop on Role-Based Access Control
-
R. Chandramouli, Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks, in Proc. of the 5th ACM Workshop on Role-Based Access Control, 2000.
-
(2000)
Proc. of the 5th ACM
-
-
Chandramouli, R.1
-
11
-
-
3042584122
-
Flexible access control policy specification with constraint logic programming
-
S. Barker, P. J. Stuckey, Flexible Access Control Policy Specification with Constraint Logic Programming, in ACM Transactions on Information and System Security, 6(4):501-546, 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.4
, pp. 501-546
-
-
Barker, S.1
Stuckey, P.J.2
-
12
-
-
80052092168
-
Administrative privileges in RBAC
-
M. A. C. Dekker, J. Cerderquist, J. Crampton, S. Etalle, Administrative Privileges in RBAC, in !st Benelux Workshop on Information and System Security, 2006.
-
(2006)
St Benelux Workshop on Information and System Security
-
-
Dekker, M.A.C.1
Cerderquist, J.2
Crampton, J.3
Etalle, S.4
-
14
-
-
80052097460
-
-
workshop material of Privilege (Access) Management Workshop
-
A survey of Access Control Models, workshop material of Privilege (Access) Management Workshop, http://csrc.nist.gov/news-events/privilege- managementworkshop/PvM-Model-Survey-Aug26-2009.pdf, 2009.
-
(2009)
A Survey of Access Control Models
-
-
-
15
-
-
62949114652
-
Supporting attribute-based access control in authorization and authentication infrastructures with ontologies
-
T. Priebe, W. Dobmeier, C. Schläger, N. Kamprath, Supporting Attribute-based Access Control in Authorization and Authentication Infrastructures with Ontologies, in Journal of Software, 2(1):27038, 2007.
-
(2007)
Journal of Software
, vol.2
, Issue.1
, pp. 27038
-
-
Priebe, T.1
Dobmeier, W.2
Schläger, C.3
Kamprath, N.4
-
16
-
-
33746662631
-
ABAC-ein referenzmodell für attributebasierte zugriffskontrolle
-
T. Priebe, W. Dobmeier, B. Muschall, G. Pernul, ABAC-Ein Referenzmodell für attributebasierte Zugriffskontrolle, in Proc. of Sicherheit, 2005.
-
(2005)
Proc. of Sicherheit
-
-
Priebe, T.1
Dobmeier, W.2
Muschall, B.3
Pernul, G.4
-
17
-
-
84868112758
-
PrplAc: Attribute-based access control in PRPL for fine grained information sharing using semantic web
-
G. Bayer, D. Sengupta, T. Wang, A. Vogt, PrplAc: Attribute-based Access Control in PRPL for Fine Grained Information Sharing using Semantic Web, Technical Report, http://senguptas.org/Documents/cs343-PrplAc.pdf.
-
Technical Report
-
-
Bayer, G.1
Sengupta, D.2
Wang, T.3
Vogt, A.4
-
18
-
-
38949168454
-
An attribute-based access control model for web services
-
DOI 10.1109/PDCAT.2006.28, 4032153, Proceedings - Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2006
-
H. Shen, F. Hong, An Attribute-Based Access Control Model for Web Services, in Proc. of the 7th International Conference on Parallel and Distributed Computing, Applications and Technologies, pages 74-79, 2006. (Pubitemid 351209615)
-
(2006)
Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings
, pp. 74-79
-
-
Shen, H.-B.1
Hong, F.2
-
19
-
-
79951618429
-
A deployment framework for self-contained policies
-
M. Cheaito, R. Laborde, F. Barrère, A. Benzekri, A deployment framework for self-contained policies, in Proc. of the 6th International Conference on Network and Service Management, 2010.
-
(2010)
Proc. of the 6th International Conference on Network and Service Management
-
-
Cheaito, M.1
Laborde, R.2
Barrère, F.3
Benzekri, A.4
-
20
-
-
20444479906
-
A logic-based framework for attribute based access control
-
FMSE'04: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering
-
L. Wang, D. Wijesekera, S. Jajodia, A Logic-based Framework for Attribute based Access Control, in Proc. of the 2004 ACM Workshop on Formal Methods in Security Engineering, pages 45-55, 2004. (Pubitemid 40821073)
-
(2004)
FMSE'04: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering
, pp. 45-55
-
-
Wang, L.1
Wijesekera, D.2
Jajodia, S.3
-
21
-
-
74049133603
-
An XACM L-based privacy-centered access control system
-
C. A. Ardagna, S. De Capitani di Vimercati, S. Paraboschi, E. Pedrini, P. Samarati, An XACML-Based Privacy-Centered Access Control System, in Proc. of the 1st ACM Workshop on Information Security Governance, pages 49-58, 2009.
-
(2009)
Proc. of the 1st ACM Workshop on Information Security Governance
, pp. 49-58
-
-
Ardagna, C.A.1
De Vimercati Di Capitani, S.2
Paraboschi, S.3
Pedrini, E.4
Samarati, P.5
-
22
-
-
80052078416
-
-
ACM Conference on Computer and Communications Security
-
Sonia Jahid, Imranul Hoque, Hamed Okhravi, Carl A. Gunter, Enhancing Database Access Control with XACML Policy, poster at 16th ACM Conference on Computer and Communications Security, http://www.cs.illinois.edu/homes/sjahid2/ pub/myabdac-ccs09-abstract-JahidHOG.pdf, 2009.
-
(2009)
Gunter, Enhancing Database Access Control with XACML Policy, Poster at 16th
-
-
Jahid, S.1
Hoque, I.2
Okhravi, H.3
Carl, A.4
-
23
-
-
77952415965
-
Strategies for reducing risks of inconsistencies in access control policies
-
B. Stepien, A. Felty, S. Matwin, Strategies for Reducing Risks of Inconsistencies in Access Control Policies, in Proc. of 5th International Conference on Availability, Reliability, and Security, pages 140-147, 2010.
-
(2010)
Proc. of 5th International Conference on Availability, Reliability, and Security
, pp. 140-147
-
-
Stepien, B.1
Felty, A.2
Matwin, S.3
-
24
-
-
77951279599
-
An extensible XACML authorization decision engine for context aware applications
-
M. Cheaito, R. Laborde, F. Barrère, A. Benzekri, An extensible XACML authorization decision engine for context aware applications, in Joint Conferences on Pervasive Computing, pages 377-382, 2009 .
-
(2009)
Joint Conferences on Pervasive Computing
, pp. 377-382
-
-
Cheaito, M.1
Laborde, R.2
Barrère, F.3
Benzekri, A.4
-
26
-
-
78649997918
-
XACML policy performance evaluation using a flexibleload testing framework
-
B. Butler, B. Jennings, D. Botvich, XACML Policy Performance Evaluation Using a FlexibleLoad Testing Framework, in Proc. of the 17th ACM Conference on Computer and Communications Security, pages 648-650, 2010.
-
(2010)
Proc. of the 17th ACM Conference on Computer and Communications Security
, pp. 648-650
-
-
Butler, B.1
Jennings, B.2
Botvich, D.3
-
27
-
-
80052081797
-
-
SunXACML, url: last access February
-
SunXACML, url: http://sunxacml.sourceforge.net/, last access February 2010.
-
(2010)
-
-
-
28
-
-
38949168454
-
An attribute-based access control model for web services
-
DOI 10.1109/PDCAT.2006.28, 4032153, Proceedings - Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2006
-
H. Shen, F. Hong, An Attribute-Based Access Control Model for Web Services, in Proc. of the 7th International Conference on Parallel and Distributed Computing, Applications and Technologies, pages 74-79, 2006. (Pubitemid 351209615)
-
(2006)
Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings
, pp. 74-79
-
-
Shen, H.-B.1
Hong, F.2
|