-
2
-
-
74049154660
-
Secure and efficient access to outsourced data
-
USA
-
Weichao Wang., Zhiwei Li, "Secure and Efficient Access to Outsourced Data",CCSW'09, USA,2009,pp. 55-65.
-
(2009)
CCSW'09
, pp. 55-65
-
-
Wang, W.1
Li, Z.2
-
3
-
-
0002357382
-
Role-based access controls
-
Bultimore Maryland,USA
-
D. Ferraiolo, R. Kuhn, "Role-Based Access Controls," In: 15th NISTNCSC National Computer Security Conference, Bultimore Maryland,USA,1992,pp. 554-563.
-
(1992)
15th NISTNCSC National Computer Security Conference
, pp. 554-563
-
-
Ferraiolo, D.1
Kuhn, R.2
-
4
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
S. Osborn, R. Sandhu, "Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies," ACM Transactions on Information and System Security,3(2), 2000,pp. 85-106.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
-
5
-
-
84956993736
-
Role-based authorization constraints specification
-
J. Ahng, R. Sandhu, "Role-Based Authorization Constraints Specification," ACM Transactions on Information and System Security,3(4), 2000,pp.207-226.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 207-226
-
-
Ahng, J.1
Sandhu, R.2
-
6
-
-
84944792110
-
TRBAC:A temporal role-based access control model
-
E. Bertino, P. A. Bonatti,and E. Ferrari, "TRBAC:A Temporal Role-Based Access Control Model," ACM Transaction on Information and System Security,4(3),pp.191-233,2001.
-
(2001)
ACM Transaction on Information and System Security
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
7
-
-
17444406680
-
A generalized temporal role-based access control model
-
B.D. James, E. Bertino, U. Latif, and A. Ghafoor, "A Generalized Temporal Role-Based Access Control Model," IEEE Transactions on Knowledge and Data Enineering,17(1),pp.4-23,2005.
-
(2005)
IEEE Transactions on Knowledge and Data Enineering
, vol.17
, Issue.1
, pp. 4-23
-
-
James, B.D.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
8
-
-
0029700344
-
Decentralized trust management
-
Los alamitos,CA:IEEE Computer Society
-
M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized Trust Management," Proc. IEEE Conference on Security and Privacy, 1996,pp. 164-171.Los alamitos,CA:IEEE Computer Society.
-
(1996)
Proc. IEEE Conference on Security and Privacy
, pp. 164-171
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
9
-
-
0036085965
-
Design of a role-based trust management framework
-
Los Alamitos,CA:IEEE Computer Society
-
Ninghui Li, J.C. Mitchell, W.H. Winsborough, "Design of A Role-Based Trust Management Framework," Proc. 2002 IEEE Symposium on Security and Privacy,2002, pp. 114-131.Los Alamitos,CA:IEEE Computer Society.
-
(2002)
Proc. 2002 IEEE Symposium on Security and Privacy
, pp. 114-131
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
10
-
-
80054760284
-
A policy-driven trust management framework
-
Proc. 1st Int Conference on Trust Mangement. Springer, Berlin
-
Walt Teh-Ming Yao.Fidelis, "A Policy-Driven Trust Management Framework," Proc. 1st Int Conference on Trust Mangement. LNCS 2692. Springer, Berlin,2003.
-
(2003)
LNCS
, vol.2692
-
-
Walt, T.-M.1
Yao, F.2
-
11
-
-
30144435491
-
Peer-to-peer access control architecture using trusted computing technology
-
Stockholm,Sweeden
-
R. Sandhu, Zhang, X, "Peer-to-peer access control architecture using trusted computing technology," Proc. 10th ACM Symposium on Access Control Models and Technologies (SACMAT'05), Stockholm,Sweeden,2005,pp. 147-158.
-
(2005)
Proc. 10th ACM Symposium on Access Control Models and Technologies (SACMAT'05)
, pp. 147-158
-
-
Sandhu, R.1
Zhang, X.2
-
12
-
-
0242540377
-
Role-based access control for collaborative enterprise in peer-to-peer computing environments
-
Como,Italy
-
J.S. Park, J. Hwang, "Role-based access control for collaborative enterprise in peer-to-peer computing environments," Proc. 8th ACM Symposium on Access Control Models and Technologies, Como,Italy,2003,pp.93-99.
-
(2003)
Proc. 8th ACM Symposium on Access Control Models and Technologies
, pp. 93-99
-
-
Park, J.S.1
Hwang, J.2
-
13
-
-
74049103479
-
PORs: Proofs of retrievability for large files
-
A. Juels, J. Burton, S. Kaliski, "PORs: Proofs of Retrievability for Large Files," Proc. of CCS' 07,2007,pp. 584-597.
-
(2007)
Proc. of CCS' 07
, pp. 584-597
-
-
Juels, A.1
Burton, J.2
Kaliski, S.3
-
14
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Berns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," Proc. Of CCS'07,2007, pp. 598-609.
-
(2007)
Proc. of CCS'07
, pp. 598-609
-
-
Ateniese, G.1
Berns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
15
-
-
35248872156
-
From privacy legislation to interface design:Implementing information privacy in human-computer interactions
-
R. Dingledine(ed.) ,Springer-Verlag,Berlin
-
A. Patrick, S. Kenny, "From Privacy Legislation to Interface Design:Implementing Information Privacy in Human-Computer Interactions," R. Dingledine(ed.), pp. 107-124,LNCS 2760,Springer-Verlag,Berlin,2003.
-
(2003)
LNCS
, vol.2760
, pp. 107-124
-
-
Patrick, A.1
Kenny, S.2
-
16
-
-
77949842100
-
-
O'Rielly, ISBN: 978-0-4596-802769
-
T. Mather, S. Kumarasuwamy, S. Latif, "Cloud Security and Privacy," O'Rielly, ISBN: 978-0-4596-802769,2009.
-
(2009)
Cloud Security and Privacy
-
-
Mather, T.1
Kumarasuwamy, S.2
Latif, S.3
-
17
-
-
70349309706
-
Data security in the world of cloud computing
-
L.M. Kaufman, "Data Security in the World of Cloud Computing," IEEE Security & Privacy,2009.
-
(2009)
IEEE Security & Privacy
-
-
Kaufman, L.M.1
-
18
-
-
77950587463
-
Privacy as a service:privacy-aware data storage and processing in cloud computing architectures
-
W. Itani, A. Kayssi, A. Chehab, "Privacy as a Service:Privacy-Aware Data Storage and Processing in Cloud Computing Architectures," Proc. 8th IEEE International Conference on Dependable,Autonomic and Secure Computing,2009,pp. 711-716.
-
(2009)
Proc. 8th IEEE International Conference on Dependable,Autonomic and Secure Computing
, pp. 711-716
-
-
Itani, W.1
Kayssi, A.2
Chehab, A.3
-
19
-
-
57049132145
-
A browser-based kerberos authentication schene
-
Proc. 13th European Symposium on Research in Computer Security, Springer,Spain
-
S. Gajek, T. Jager, M. Manulis, and J. Schwenk, "A Browser-Based Kerberos Authentication Schene," Proc. 13th European Symposium on Research in Computer Security, 2008, pp. 115-129,LNCS 5283,Springer,Spain.
-
(2008)
LNCS
, vol.5283
, pp. 115-129
-
-
Gajek, S.1
Jager, T.2
Manulis, M.3
Schwenk, J.4
-
20
-
-
33846267322
-
A trust model for ubiquitous systems based on vectors of trust values
-
IEEE Computer Society Press, Washington
-
H. Jameel, L.X. Hung, U. Kalim, A. Sajjad, S.Y. Lee, and Y.K. Lee, "A Trust Model for Ubiquitous Systems based on Vectors of Trust Values" Proc. of the 7th IEEE International Symposium on Multimedia,pp. 674-679, IEEE Computer Society Press, Washington,2005.
-
(2005)
Proc. of the 7th IEEE International Symposium on Multimedia
, pp. 674-679
-
-
Jameel, H.1
Hung, L.X.2
Kalim, U.3
Sajjad, A.4
Lee, S.Y.5
Lee, Y.K.6
-
21
-
-
78650285206
-
Security analysis and validation for access control in multi-domain environment based on risk
-
Proc. 6th International Conference on Information Security Practice and Experience Conference, Seoul, Korea .
-
Zhuo Tang, Shaohua Zhang, Kenli Li, Benming Feng, "Security Analysis and Validation for Access Control in Multi-domain Environment Based on Risk" Proc. 6th International Conference on Information Security Practice and Experience Conference, 2010,pp. 12-13. LNCS, Seoul, Korea.
-
(2010)
LNCS
, pp. 12-13
-
-
Tang, Z.1
Zhang, S.2
Li, K.3
Feng, B.4
|