-
2
-
-
84944792110
-
Trbac: A temporal role-based access control model
-
E. Bertino, P.A. Bonatti, "Trbac: A temporal role-based access control model," ACM Trans. on Information and System Security, 4(9), 191-223, 2001.
-
(2001)
ACM Trans. on Information and System Security
, vol.4
, Issue.9
, pp. 191-223
-
-
Bertino, E.1
Bonatti, P.A.2
-
3
-
-
74049122943
-
Privacy-preserving digital identity management for cloud computing
-
1-4, Mar.
-
E. Bertino, F. Paci, R. Ferrini, "Privacy-Preserving Digital Identity Management for Cloud Computing," IEEE Computer Society Data Engineering Bulletin, 1-4, Mar. 2009.
-
(2009)
IEEE Computer Society Data Engineering Bulletin
-
-
Bertino, E.1
Paci, F.2
Ferrini, R.3
-
4
-
-
0032218233
-
History-based access control for mobile code
-
G. Edjlali, A. Acharya, V. Chaudhary, "History-based access control for mobile code," ACM Conference on Computer and Communication Security, 38-48, 1998.
-
(1998)
ACM Conference on Computer and Communication Security
, vol.38-48
-
-
Edjlali, G.1
Acharya, A.2
Chaudhary, V.3
-
5
-
-
80053420594
-
-
ENSIA Report on Cloud Computing Security Risk Assessment, http://www.enisa.europa.eu/act/rm/files/deliverables/cloudcomputing- risk-assessment
-
-
-
-
6
-
-
80053419608
-
-
March 30
-
Epsilon Breach March 30, 2010, http://www.businessweek.com/news/2011-04- 05/citigroupwalgreen- new-york-co-warn-of-e-mail-breaches.html
-
(2010)
-
-
-
7
-
-
80052161993
-
An interoperability enabling framework: Services, processes and clouds
-
P. Goyal, "An Interoperability Enabling Framework: Services, Processes and Clouds," 2009 IEEE Asia-Pacific Services Computing Conference, 174-179, 2009.
-
(2009)
2009 IEEE Asia-Pacific Services Computing Conference
, pp. 174-179
-
-
Goyal, P.1
-
8
-
-
77950618211
-
What you need to know about Cloud computing security and compliance
-
July 13
-
J. Heiser, "What you need to know about Cloud computing security and compliance," Gartner Report, July 13, 2009.
-
(2009)
Gartner Report
-
-
Heiser, J.1
-
9
-
-
18744414770
-
Context-based access control for ubiquitous service provisioning
-
J. Hu, A. Weaver,) A Corradi, R Montanari, D Tibaldi, "Context-based access control for ubiquitous service provisioning," 28th Interl Computer Software and Applications Conf (COMPSAC'2004), 444-501, 2004.
-
(2004)
28th Interl Computer Software and Applications Conf (COMPSAC'2004)
, pp. 444-501
-
-
Hu, J.1
Weaver, A.2
Corradi, A.3
Montanari, R.4
Tibaldi, D.5
-
10
-
-
11044223672
-
Access control language for multi-domain environments
-
J.B. Joshi, R. Bhatti, E. Bertino, A. Ghafoor, "Access Control Language for Multi-domain Environments," IEEE Internet Computing, 8(6), 40-50, 2004.
-
(2004)
IEEE Internet Computing
, vol.8
, Issue.6
, pp. 40-50
-
-
Joshi, J.B.1
Bhatti, R.2
Bertino, E.3
Ghafoor, A.4
-
12
-
-
77953350247
-
Adding attributes to rolebased access control
-
D.R. Kuhn, E.J. Coyne, T.R. Weil, "Adding Attributes to Rolebased Access Control," IEEE Computer, vol. 43, 79-81, 2010.
-
(2010)
IEEE Computer
, vol.43
, pp. 79-81
-
-
Kuhn, D.R.1
Coyne, E.J.2
Weil, T.R.3
-
13
-
-
15944413918
-
Context sensitivity in role-based access control
-
A. Kumar, N. Karnik, and G. Chafle, "Context sensitivity in role-based access control," ACM SIGOPS Operating Systems Review, 36(3), 53-66, 2002.
-
(2002)
ACM SIGOPS Operating Systems Review
, vol.36
, Issue.3
, pp. 53-66
-
-
Kumar, A.1
Karnik, N.2
Chafle, G.3
-
16
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest A. Shamir, L.M. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, 21(2), 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest A Shamir, R.L.1
Adleman, L.M.2
-
17
-
-
0030086382
-
Role based access control models
-
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, C.E. Youman, "Role based access control models," IEEE Computer, 29(2), 38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
19
-
-
28244460211
-
Secure interoperation in a multidomain environment employing RBAC policies
-
B. Shafiq, J.B.D. Joshi, E. Bertino, A. Ghafoor, "Secure Interoperation in a Multidomain Environment Employing RBAC Policies," IEEE Transactions on Knowledge and Data Engineering, Vol. 17 (11), 1557-1577, 2005.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.11
, pp. 1557-1577
-
-
Shafiq, B.1
Joshi, J.B.D.2
Bertino, E.3
Ghafoor, A.4
-
20
-
-
78650065157
-
Security privacy challenges in cloud computing environments
-
H. Takabi, J. B.D. Joshi, G.-J. Ahn, "Security privacy challenges in cloud computing environments," IEEE Security & Privacy, vol. 8, 24-31, 2010.
-
(2010)
IEEE Security & Privacy
, vol.8
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.-J.3
|