-
1
-
-
35048883832
-
Voms, an authorization system for virtual organizations
-
Springer
-
R. Alfieri, R. Cecchini, V. Ciaschini, L. Dell'Agnello, A. Frohner, and A. Gianoli Voms, an authorization system for virtual organizations Grid computing 2004 Springer 33 40
-
(2004)
Grid Computing
, pp. 33-40
-
-
Alfieri, R.1
Cecchini, R.2
Ciaschini, V.3
Dell'Agnello, L.4
Frohner, A.5
Gianoli, A.6
-
3
-
-
81455141558
-
Expressive and deployable access control in open web service applications
-
C. Ardagna, S. De Capitani di Vimercati, S. Paraboschi, E. Pedrini, P. Samarati, and M. Verdicchio Expressive and deployable access control in open web service applications Services Computing, IEEE Transactions on 4 2011 96 109
-
(2011)
Services Computing, IEEE Transactions on
, vol.4
, pp. 96-109
-
-
Ardagna, C.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Pedrini, E.4
Samarati, P.5
Verdicchio, M.6
-
7
-
-
17044423787
-
Authorisation in Grid computing
-
DOI 10.1016/j.istr.2004.11.004, PII S1363412704000056
-
D. Chadwick Authorisation in grid computing Information Security Technical Report 10 2005 33 40 (Pubitemid 40497374)
-
(2005)
Information Security Technical Report
, vol.10
, Issue.1
, pp. 33-40
-
-
Chadwick, D.1
-
8
-
-
0037362986
-
Role-based access control with x. 509 attribute certificates
-
D. Chadwick, A. Otenko, and E. Ball Role-based access control with x. 509 attribute certificates Internet Computing, IEEE 7 2003 62 69
-
(2003)
Internet Computing, IEEE
, vol.7
, pp. 62-69
-
-
Chadwick, D.1
Otenko, A.2
Ball, E.3
-
10
-
-
34548013110
-
Inter-domain role mapping and least privilege
-
DOI 10.1145/1266840.1266866, SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
-
L. Chen, and J. Crampton Inter-domain role mapping and least privilege SACMAT'07: proceedings of the 12th ACM symposium on access control models and technologies 2007 ACM New York, NY, USA 157 162 (Pubitemid 47281550)
-
(2007)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, pp. 157-162
-
-
Chen, L.1
Crampton, J.2
-
13
-
-
85024279627
-
Describing the elephant: The different faces of it as service
-
I. Foster, and S. Tuecke Describing the elephant: the different faces of it as service Queue 3 2005 26 29
-
(2005)
Queue
, vol.3
, pp. 26-29
-
-
Foster, I.1
Tuecke, S.2
-
15
-
-
79958784381
-
Role-based secure inter-operation and resource usage management in mobile grid systems
-
C. Ardagna, J. Zhou, Springer Berlin/Heidelberg Volume 6633 of Lecture Notes in Computer Science
-
A. Gouglidis, and I. Mavridis Role-based secure inter-operation and resource usage management in mobile grid systems C. Ardagna, J. Zhou, Information security theory and practice. Security and privacy of mobile devices in wireless communication 2011 Springer Berlin/Heidelberg 38 53 Volume 6633 of Lecture Notes in Computer Science
-
(2011)
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication
, pp. 38-53
-
-
Gouglidis, A.1
Mavridis, I.2
-
21
-
-
78650167730
-
An interoperable usage management framework
-
ACM New York, NY, USA
-
P.A. Jamkhedkar, G.L. Heileman, and C.C. Lamb An interoperable usage management framework Proceedings of the tenth annual ACM workshop on digital rights management DRM'10 2010 ACM New York, NY, USA 73 88
-
(2010)
Proceedings of the Tenth Annual ACM Workshop on Digital Rights Management DRM'10
, pp. 73-88
-
-
Jamkhedkar, P.A.1
Heileman, G.L.2
Lamb, C.C.3
-
22
-
-
37249020924
-
A critique of the ANSI standard on role-based access control
-
DOI 10.1109/MSP.2007.158
-
N. Li, J. Byun, and E. Bertino A critique of the ansi standard on role-based access control Security Privacy, IEEE 5 2007 41 49 (Pubitemid 350274187)
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.6
, pp. 41-49
-
-
Li, N.1
Byun, J.-W.2
Bertino, E.3
-
23
-
-
84861100668
-
-
Networkx
-
NetworkX Networkx 2011
-
(2011)
Networkx
-
-
-
28
-
-
84887853842
-
A community authorization service for group collaboration
-
IEEE
-
L. Pearlman, V. Welch, I. Foster, C. Kesselman, and S. Tuecke A community authorization service for group collaboration Policies for distributed systems and networks. Proceedings. Third international workshop on 2002 IEEE 50 59
-
(2002)
Policies for Distributed Systems and Networks. Proceedings. Third International Workshop on
, pp. 50-59
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
-
30
-
-
0348001131
-
A transitive closure algorithm
-
10.1007/BF01940892
-
P. Purdom A transitive closure algorithm BIT Numerical Mathematics 10 1970 76 94 10.1007/BF01940892
-
(1970)
BIT Numerical Mathematics
, vol.10
, pp. 76-94
-
-
Purdom, P.1
-
31
-
-
50249167255
-
Mobility and qos support for a commercial mobile grid in akogrimo
-
16th IST; 2007
-
Racz P, Burgos J, Inacio N, Morariu C, Olmedo V, Villagra V, et al. Mobility and qos support for a commercial mobile grid in akogrimo. In: Mobile and wireless communications summit, 2007. 16th IST; 2007. p. 1-5.
-
(2007)
Mobile and Wireless Communications Summit
, pp. 1-5
-
-
Racz, P.1
Burgos, J.2
Inacio, N.3
Morariu, C.4
Olmedo, V.5
Villagra, V.6
-
33
-
-
35248873795
-
Usage control: A vision for next generation access control
-
Springer Berlin/Heidelberg
-
R. Sandhu, and J. Park Usage control: a vision for next generation access control Computer network security vol. 2776 2003 Springer Berlin/Heidelberg 17 31
-
(2003)
Computer Network Security
, vol.2776
, pp. 17-31
-
-
Sandhu, R.1
Park, J.2
-
36
-
-
28244460211
-
Secure interoperation in a multidomain environment employing RBAC policies
-
DOI 10.1109/TKDE.2005.185
-
B. Shafiq, J.B.D. Joshi, E. Bertino, and A. Ghafoor Secure interoperation in a multidomain environment employing rbac policies IEEE Transactions on Knowledge and Data Engineering 17 2005 1557 1577 (Pubitemid 41704842)
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.11
, pp. 1557-1577
-
-
Shafiq, B.1
Joshi, J.B.D.2
Bertino, E.3
Ghafoor, A.4
-
37
-
-
30644461515
-
SERAT: SEcure Role mApping Technique for decentralized secure interoperability
-
DOI 10.1145/1063979.1064007, SACMAT 2005: Proceedings of 10th ACM Symposium on Access Control Models and Technologies
-
M. Shehab, E. Bertino, and A. Ghafoor Serat: secure role mapping technique for decentralized secure interoperability SACMAT'05: proceedings of the tenth ACM symposium on Access control models and technologies 2005 ACM New York, NY, USA 159 167 (Pubitemid 43087472)
-
(2005)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, pp. 159-167
-
-
Shehab, M.1
Bertino, E.2
Ghafoor, A.3
-
42
-
-
33749080076
-
Attributed Based Access Control (ABAC) for web services
-
DOI 10.1109/ICWS.2005.25, 1530847, Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005
-
E. Yuan, and J. Tong Attributed based access control (abac) for web services Web Services, IEEE International Conference on 0 2005 561 569 (Pubitemid 44460249)
-
(2005)
Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005
, vol.2005
, pp. 561-569
-
-
Yuan, E.1
Tong, J.2
-
44
-
-
33748031099
-
A usage-based authorization framework for collaborative computing systems
-
SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
-
X. Zhang, M. Nakae, M. Covington, and R. Sandhu A usage-based authorization framework for collaborative computing systems Proceedings of the 11th ACM symposium on access control models and technologies 2006 ACM 180 189 (Pubitemid 44300755)
-
(2006)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, vol.2006
, pp. 180-189
-
-
Zhang, X.1
Nakae, M.2
Covington, M.J.3
Sandhu, R.4
|