-
1
-
-
50249144000
-
Regulating exceptions in healthcare using policy spaces
-
Atluri, V. (ed.) DAS 2008. Springer, Heidelberg
-
Ardagna, C.A., De Capitani di Vimercati, S., Grandison, T., Jajodia, S., Samarati, P.: Regulating exceptions in healthcare using policy spaces. In: Atluri, V. (ed.) DAS 2008. LNCS, vol. 5094, pp. 254-267. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5094
, pp. 254-267
-
-
Ardagna, C.A.1
De Capitani Di Vimercati, S.2
Grandison, T.3
Jajodia, S.4
Samarati, P.5
-
5
-
-
71049179499
-
Delegation assistance
-
Brucker, A.D., Petritsch, H., Schaad, A.: Delegation assistance. In: IEEE International Workshop on Policies for Distributed Systems and Networks, pp. 84-91 (2009)
-
(2009)
IEEE International Workshop on Policies for Distributed Systems and Networks
, pp. 84-91
-
-
Brucker, A.D.1
Petritsch, H.2
Schaad, A.3
-
6
-
-
0034823078
-
A state-transition model of trust management and access control
-
IEEE Computer Society Press, Los Alamitos
-
Chander, A., Mitchell, J.C., Dean, D.: A state-transition model of trust management and access control. In: Proceedings of the 14th IEEE Computer Security Foundations Workshop, pp. 27-43. IEEE Computer Society Press, Los Alamitos (2001)
-
(2001)
Proceedings of the 14th IEEE Computer Security Foundations Workshop
, pp. 27-43
-
-
Chander, A.1
Mitchell, J.C.2
Dean, D.3
-
9
-
-
33947630349
-
On key assignment for hierarchical access control
-
Crampton, J., Martin, K.M., Wild, P.: On key assignment for hierarchical access control. In: Proceedings of 19th Computer Security Foundations Workshop, pp. 98-111 (2006)
-
(2006)
Proceedings of 19th Computer Security Foundations Workshop
, pp. 98-111
-
-
Crampton, J.1
Martin, K.M.2
Wild, P.3
-
10
-
-
77952046953
-
Encryption policies for regulating access to outsourced data
-
De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Encryption policies for regulating access to outsourced data. ACM Transactions on Database Systems 35(2) (2010)
-
(2010)
ACM Transactions on Database Systems
, vol.35
, Issue.2
-
-
De Capitani Di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
11
-
-
0016949746
-
A Lattice Model of Secure Information Flow
-
Denning, D.E.: A Lattice Model of Secure Information Flow. Communications of the ACM 19(5), 236-243 (1976)
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
14
-
-
78650893864
-
Formal definition and comparison of access control models
-
Habib, L., Jaume, M., Morisset, C.: Formal definition and comparison of access control models. Journal of Information Assurance and Security 4, 372-381 (2009)
-
(2009)
Journal of Information Assurance and Security
, vol.4
, pp. 372-381
-
-
Habib, L.1
Jaume, M.2
Morisset, C.3
-
15
-
-
0016984825
-
Protection in operating systems
-
Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Communications of the ACM 19(8), 461-471 (1976)
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
16
-
-
77954905768
-
Capability-based delegation model in RBAC
-
ACM, New York
-
Hasebe, K., Mabuchi, M., Matsushita, A.: Capability-based delegation model in RBAC. In: SACMAT 2010: Proceeding of the 15th ACM Symposium on Access Control Models and Technologies, pp. 109-118. ACM, New York (2010)
-
(2010)
SACMAT 2010: Proceeding of the 15th ACM Symposium on Access Control Models and Technologies
, pp. 109-118
-
-
Hasebe, K.1
Mabuchi, M.2
Matsushita, A.3
-
17
-
-
77952407814
-
Organization based access control
-
June
-
Abou El Kalam, A., El Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miège, A., Saurel, C., Trouessin, G.: Organization based access control. In: Proceedings of Policies for Distributed Systems and Networks, Como, Italy, pp. 120-131 (June 2003)
-
(2003)
Proceedings of Policies for Distributed Systems and Networks, Como, Italy
, pp. 120-131
-
-
Abou El Kalam, A.1
El Baida, R.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miège, A.7
Saurel, C.8
Trouessin, G.9
-
18
-
-
85033460636
-
Plutus: Scalable secure file sharing on untrusted storage
-
Kallahalla, M., Riedel, E., Swaminathan, R., Wang, Q., Fu, K.: Plutus: Scalable secure file sharing on untrusted storage. In: Proceedings of the FAST 2003 Conference on File and Storage Technologies, pp. 29-42 (2003)
-
(2003)
Proceedings of the FAST 2003 Conference on File and Storage Technologies
, pp. 29-42
-
-
Kallahalla, M.1
Riedel, E.2
Swaminathan, R.3
Wang, Q.4
Fu, K.5
-
23
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
Osborn, S.L., Sandhu, R.S., Munawer, Q.: Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security 3(2), 85-106 (2000)
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.L.1
Sandhu, R.S.2
Munawer, Q.3
-
24
-
-
63449110864
-
A novel use of RBAC to protect privacy in distributed health care information systems
-
Reid, J., Cheong, I., Henricksen, M., Smith, J.: A novel use of RBAC to protect privacy in distributed health care information systems. In: Proceedings of the 8th Australasian Conference on Information Security and Privacy, pp. 403-415 (2003)
-
(2003)
Proceedings of the 8th Australasian Conference on Information Security and Privacy
, pp. 403-415
-
-
Reid, J.1
Cheong, I.2
Henricksen, M.3
Smith, J.4
-
25
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29(2), 38-47 (1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
26
-
-
0348209180
-
W-RBAC - A workflow security model incorporating controlled overriding of constraints
-
Wainer, J., Barthelmess, P., Kumar, A.: W-RBAC - a workflow security model incorporating controlled overriding of constraints. International Journal of Cooperative Information Systems 12, 455-485 (2003)
-
(2003)
International Journal of Cooperative Information Systems
, vol.12
, pp. 455-485
-
-
Wainer, J.1
Barthelmess, P.2
Kumar, A.3
|