-
2
-
-
84857324577
-
-
NIST: A survey of access control models (2009), http://csrc.nist.gov/ news-events/privilege-management-workshop/PvM-Model-Survey-Aug26-2009.pdf
-
(2009)
A Survey of Access Control Models
-
-
-
8
-
-
77749269193
-
-
Technical report, Software Research and Development Center, Middle East Technical University Ankara December
-
Namli, T., Dogac, A.: Implementation Experiences On IHE XUA and BPPC. Technical report, Software Research and Development Center, Middle East Technical University Ankara (December 2006)
-
(2006)
Implementation Experiences on IHE XUA and BPPC
-
-
Namli, T.1
Dogac, A.2
-
9
-
-
84857292690
-
-
Universidad de Murcia
-
Universidad de Murcia: UMU-XACML-Editor (2008), http://sourceforge.net/ projects/umu-xacmleditor/
-
(2008)
UMU-XACML-Editor
-
-
-
11
-
-
35348924314
-
Analyzing web access control policies
-
ACM
-
Kolovski, V., Hendler, J.A., Parsia, B.: Analyzing web access control policies. In: WWW, pp. 677-686. ACM (2007)
-
(2007)
WWW
, pp. 677-686
-
-
Kolovski, V.1
Hendler, J.A.2
Parsia, B.3
-
12
-
-
77954326067
-
Reasoning about XACML policies using CSP
-
ACM
-
Bryans, J.: Reasoning about XACML policies using CSP. In: SWS, pp. 28-35. ACM (2005)
-
(2005)
SWS
, pp. 28-35
-
-
Bryans, J.1
-
14
-
-
38149127295
-
Formal Engineering of XACML Access Control Policies in VDM++
-
Butler, M., Hinchey, M.G., Larrondo-Petrie, M.M. (eds.) ICFEM 2007. Springer, Heidelberg
-
Bryans, J., Fitzgerald, J.S.: Formal Engineering of XACML Access Control Policies in VDM++. In: Butler, M., Hinchey, M.G., Larrondo-Petrie, M.M. (eds.) ICFEM 2007. LNCS, vol. 4789, pp. 37-56. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4789
, pp. 37-56
-
-
Bryans, J.1
Fitzgerald, J.S.2
-
15
-
-
84892272876
-
-
Springer, Heidelberg
-
Fitzgerald, J., Larsen, P., Mukherjee, P., Plat, N., Verhoef, M.: Validated Designs for Object-oriented Systems. Springer, Heidelberg (2005)
-
(2005)
Validated Designs for Object-oriented Systems
-
-
Fitzgerald, J.1
Larsen, P.2
Mukherjee, P.3
Plat, N.4
Verhoef, M.5
-
16
-
-
33645964601
-
Evaluating Access Control Policies through Model Checking
-
Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. Springer, Heidelberg
-
Zhang, N., Ryan, M., Guelev, D.P.: Evaluating Access Control Policies through Model Checking. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 446-460. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3650
, pp. 446-460
-
-
Zhang, N.1
Ryan, M.2
Guelev, D.P.3
-
17
-
-
20444450640
-
Synthesising verified access control systems in XACML
-
ACM
-
Zhang, N., Ryan, M., Guelev, D.P.: Synthesising verified access control systems in XACML. In: FMSE, pp. 56-65. ACM (2004)
-
(2004)
FMSE
, pp. 56-65
-
-
Zhang, N.1
Ryan, M.2
Guelev, D.P.3
-
18
-
-
33244470893
-
Verification and change-impact analysis of access-control policies
-
ACM
-
Fisler, K., Krishnamurthi, S., Meyerovich, L.A., Tschantz, M.C.: Verification and change-impact analysis of access-control policies. In: ICSE, pp. 196-205. ACM (2005)
-
(2005)
ICSE
, pp. 196-205
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.A.3
Tschantz, M.C.4
-
19
-
-
33748055425
-
Towards reasonability properties for access-control policy languages
-
ACM
-
Tschantz, M.C., Krishnamurthi, S.: Towards reasonability properties for access-control policy languages. In: SACMAT, pp. 160-169. ACM (2006)
-
(2006)
SACMAT
, pp. 160-169
-
-
Tschantz, M.C.1
Krishnamurthi, S.2
-
20
-
-
84857312464
-
-
last visited September 21, 2011
-
OASIS XACML TC: Available XACML Implementations (2011), http://www.oasis-open.org/committees/tc-home.php?wg-abbrev=xacml#other (last visited September 21, 2011)
-
(2011)
Available XACML Implementations
-
-
-
21
-
-
84857316134
-
-
last visited September 21, 2011
-
Proctor, S.: SUN XACML (2011), http://sunxacml.sf.net (last visited September 21, 2011)
-
(2011)
SUN XACML
-
-
Proctor, S.1
-
22
-
-
84857314169
-
-
AF, http://www.herasaf.org
-
AF
-
-
-
23
-
-
57349199277
-
Xengine: A fast and scalable XACML policy evaluation engine
-
ACM
-
Liu, A.X., Chen, F., Hwang, J., Xie, T.: Xengine: a fast and scalable XACML policy evaluation engine. In: SIGMETRICS, pp. 265-276. ACM (2008)
-
(2008)
SIGMETRICS
, pp. 265-276
-
-
Liu, A.X.1
Chen, F.2
Hwang, J.3
Xie, T.4
-
25
-
-
33750042586
-
Globus toolkit version 4: Software for service-oriented systems
-
Foster, I.T.: Globus toolkit version 4: Software for service-oriented systems. J. Comput. Sci. Technol. 21(4), 513-520 (2006)
-
(2006)
J. Comput. Sci. Technol.
, vol.21
, Issue.4
, pp. 513-520
-
-
Foster, I.T.1
-
26
-
-
33748700422
-
-
Technical report, National Center for Supercomputing Applications, University of Illinois
-
Barton, T., et al.: Identity federation and attribute-based authorization through the globus toolkit, shibboleth, gridshib, and myproxy. Technical report, National Center for Supercomputing Applications, University of Illinois (2006)
-
(2006)
Identity Federation and Attribute-based Authorization Through the Globus Toolkit, Shibboleth, Gridshib, and Myproxy
-
-
Barton, T.1
-
27
-
-
49149113425
-
Permis: A modular authorization infrastructure
-
Chadwick, D.W., Zhao, G., Otenko, S., Laborde, R., Su, L., Nguyen, T.A.: Permis: a modular authorization infrastructure. Concurrency and Computation: Practice and Experience 20(11), 1341-1357 (2008)
-
(2008)
Concurrency and Computation: Practice and Experience
, vol.20
, Issue.11
, pp. 1341-1357
-
-
Chadwick, D.W.1
Zhao, G.2
Otenko, S.3
Laborde, R.4
Su, L.5
Nguyen, T.A.6
-
28
-
-
84857256652
-
-
(full version). Technical report, Univ. Firenze
-
Masi, M., Pugliese, R., Tiezzi, F.: Formalisation and Implementation of the XACML Access Control Mechanism (full version). Technical report, Dipartimento di Sistemi e Informatica, Univ. Firenze (2011), http://rap.dsi.unifi.it/xacml-tools
-
(2011)
Formalisation and Implementation of the XACML Access Control Mechanism
-
-
Masi, M.1
Pugliese, R.2
Tiezzi, F.3
-
31
-
-
71549129092
-
-
Health Level Seven organization: Hl7 standards (2009), http://www.hl7.org
-
(2009)
Hl7 Standards
-
-
-
35
-
-
0016081584
-
Protection and the Control of Information Sharing in Multics
-
Saltzer, J.H.: Protection and the Control of Information Sharing in Multics. Commun. ACM 17, 388-402 (1974)
-
(1974)
Commun. ACM
, vol.17
, pp. 388-402
-
-
Saltzer, J.H.1
|