-
1
-
-
33744823157
-
Product lifecycle management: Closing the knowledge loops
-
F. Ameri, and D. Dutta Product lifecycle management: closing the knowledge loops Computer-Aided Design and Applications 2 5 2005 577 590
-
(2005)
Computer-Aided Design and Applications
, vol.2
, Issue.5
, pp. 577-590
-
-
Ameri, F.1
Dutta, D.2
-
4
-
-
84868467411
-
-
Aletheia
-
Aletheia, Aletheia Project Web Site (2010). http://www.aletheia-projekt. de.
-
(2010)
Aletheia Project Web Site
-
-
-
5
-
-
84946062136
-
Aletheia - Towards a distributed architecture for semantic federation of comprehensive product information
-
Rome, Italy
-
M. Wauer, D. Schuster, J. Meinecke, T. Janke, and A. Schill Aletheia - towards a distributed architecture for semantic federation of comprehensive product information IADIS International Conference WWW/Internet Rome, Italy 2009
-
(2009)
IADIS International Conference WWW/Internet
-
-
Wauer, M.1
Schuster, D.2
Meinecke, J.3
Janke, T.4
Schill, A.5
-
6
-
-
84957006898
-
Access control and trust in the use of widely distributed services
-
Springer
-
J. Bacon, K. Moody, and W. Yao Access control and trust in the use of widely distributed services Middleware 2001 2001 Springer 295 310
-
(2001)
Middleware 2001
, pp. 295-310
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
8
-
-
84864067675
-
Economic Analysis of Role-Based Access Control
-
December 2010
-
A.C. O'Connor, R.J. Loomis, 2010. Economic Analysis of Role-Based Access Control, NIST Final Report (December 2010).
-
(2010)
NIST Final Report
-
-
O'Connor, A.C.1
Loomis, R.J.2
-
9
-
-
84868476756
-
Comparing Administrative Cost for Hierarchical and Non-hierarchical Role Representations
-
November
-
D. Ferraiolo, J. Barkley, Comparing Administrative Cost for Hierarchical and Non-hierarchical Role Representations, Second ACM Workshop on Role-Based Access Control (November 1997).
-
(1997)
Second ACM Workshop on Role-Based Access Control
-
-
Ferraiolo, D.1
Barkley, J.2
-
12
-
-
0002841051
-
Task-Based Authorization Controls (TBAC): A family of models for active and enterprise-oriented authorization management
-
R. Thomas, and R. Sandhu Task-Based Authorization Controls (TBAC): a family of models for active and enterprise-oriented authorization management Database Security 11 1998 166 181
-
(1998)
Database Security
, vol.11
, pp. 166-181
-
-
Thomas, R.1
Sandhu, R.2
-
15
-
-
0038825675
-
Task-role-based access control model
-
S. Oh, and S. Park Task-role-based access control model Information Systems 28 6 2003 533 562
-
(2003)
Information Systems
, vol.28
, Issue.6
, pp. 533-562
-
-
Oh, S.1
Park, S.2
-
16
-
-
33746062390
-
Role-based modelling of interactions in database applications
-
E. Dubois, K. Pohl, Springer Berlin, Heidelberg
-
M. Petrovic, M. Grossniklaus, and M. Norrie Role-based modelling of interactions in database applications E. Dubois, K. Pohl, Advanced Information Systems Engineering, vol. 4001 of LNCS 2006 Springer Berlin, Heidelberg 63 77
-
(2006)
Advanced Information Systems Engineering, Vol. 4001 of LNCS
, pp. 63-77
-
-
Petrovic, M.1
Grossniklaus, M.2
Norrie, M.3
-
17
-
-
0030086382
-
Role-based access control models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman Role-based access control models Computer 29 2 1996 38 47
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
18
-
-
0033652039
-
The NIST model for role-based access control: Towards a unified standard
-
ACM New York, NY, USA
-
R. Sandhu, D. Ferraiolo, and R. Kuhn The NIST model for role-based access control: towards a unified standard Proceedings of the 5th ACM Workshop on Role-Based Access Control (RBAC'00) 2000 ACM New York, NY, USA 47 63
-
(2000)
Proceedings of the 5th ACM Workshop on Role-Based Access Control (RBAC'00)
, pp. 47-63
-
-
Sandhu, R.1
Ferraiolo, D.2
Kuhn, R.3
-
19
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D.F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn, and R. Chandramouli Proposed NIST standard for role-based access control ACM Transactions on Information and System Security (TISSEC) 4 3 2001 224 274
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
20
-
-
37249020924
-
A critique of the ANSI standard on role-based access control
-
N. Li, J.-W. Byun, and E. Bertino A critique of the ANSI standard on role-based access control IEEE Security and Privacy 5 6 2007 41 49
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.6
, pp. 41-49
-
-
Li, N.1
Byun, J.-W.2
Bertino, E.3
-
21
-
-
37249093004
-
RBAC standard rationale: Comments on a critique of the ANSI standard on role based access control
-
D. Ferraiolo, R. Kuhn, and R. Sandhu RBAC standard rationale: comments on a critique of the ANSI standard on role based access control IEEE Security & Privacy 5 6 2007 51 53
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.6
, pp. 51-53
-
-
Ferraiolo, D.1
Kuhn, R.2
Sandhu, R.3
-
24
-
-
3543052334
-
First experiences using XACML for access control in distributed systems
-
Fairfax, Virginia
-
M. Lorch, S. Proctor, R. Lepro, D. Kafura, and S. Shah First experiences using XACML for access control in distributed systems ACM Workshop on XML Security Fairfax, Virginia 2003 25 37
-
(2003)
ACM Workshop on XML Security
, pp. 25-37
-
-
Lorch, M.1
Proctor, S.2
Lepro, R.3
Kafura, D.4
Shah, S.5
-
26
-
-
77954344839
-
Role-based access control for data service integration
-
Alexandria, Virginia, USA
-
P. Lamb, R. Power, G. Walker, and M. Compton Role-based access control for data service integration Proceedings of the 3rd ACM Workshop on Secure Web Services Alexandria, Virginia, USA 2006 3 12
-
(2006)
Proceedings of the 3rd ACM Workshop on Secure Web Services
, pp. 3-12
-
-
Lamb, P.1
Power, R.2
Walker, G.3
Compton, M.4
-
27
-
-
33845935560
-
Privacy preserving trust authorization framework using XACML
-
Los Alamitos, CA, USA
-
U. Mbanaso, G. Cooper, D. Chadwick, and S. Proctor Privacy preserving trust authorization framework using XACML Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks Los Alamitos, CA, USA 2006 673 678
-
(2006)
Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks
, pp. 673-678
-
-
Mbanaso, U.1
Cooper, G.2
Chadwick, D.3
Proctor, S.4
-
28
-
-
38949106870
-
XACML policy integration algorithms
-
P. Mazzoleni, B. Crispo, S. Sivasubramanian, and E. Bertino XACML policy integration algorithms ACM Transactions of Information System Security 11 1 2008 1 29
-
(2008)
ACM Transactions of Information System Security
, vol.11
, Issue.1
, pp. 1-29
-
-
Mazzoleni, P.1
Crispo, B.2
Sivasubramanian, S.3
Bertino, E.4
-
29
-
-
34748891724
-
Overriding of access control in XACML
-
IEEE Computer Society Los Alamitos, CA, USA
-
J. Alqatawna, E. Rissanen, and B. Sadighi Overriding of access control in XACML Eighth IEEE International Workshop on Policies for Distributed Systems and Networks 2007 IEEE Computer Society Los Alamitos, CA, USA 87 95
-
(2007)
Eighth IEEE International Workshop on Policies for Distributed Systems and Networks
, pp. 87-95
-
-
Alqatawna, J.1
Rissanen, E.2
Sadighi, B.3
-
30
-
-
33748043984
-
Semantic access control for information interoperation
-
ACM New York, NY, USA
-
C.-C. Pan, P. Mitra, and P. Liu Semantic access control for information interoperation Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies, SACMAT'06 2006 ACM New York, NY, USA 237 246
-
(2006)
Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies, SACMAT'06
, pp. 237-246
-
-
Pan, C.-C.1
Mitra, P.2
Liu, P.3
-
34
-
-
84866258707
-
DAML-S: Web service description for the semantic web
-
I. Horrocks, J. Hendler, Springer Berlin, Heidelberg
-
A. Ankolekar, M. Burstein, J. Hobbs, O. Lassila, D. Martin, D. McDermott, S. McIlraith, S. Narayanan, M. Paolucci, T. Payne, and K. Sycara DAML-S: web service description for the semantic web I. Horrocks, J. Hendler, The Semantic Web - ISWC 2002, vol. 2342 of Lecture Notes in Computer Science 2002 Springer Berlin, Heidelberg 348 363
-
(2002)
The Semantic Web - ISWC 2002, Vol. 2342 of Lecture Notes in Computer Science
, pp. 348-363
-
-
Ankolekar, A.1
Burstein, M.2
Hobbs, J.3
Lassila, O.4
Martin, D.5
McDermott, D.6
McIlraith, S.7
Narayanan, S.8
Paolucci, M.9
Payne, T.10
Sycara, K.11
-
35
-
-
78049409910
-
Controlling access to RDF graphs
-
A. Berre, A. Gomez-Perez, K. Tutschku, D. Fensel, Springer Berlin, Heidelberg
-
G. Flouris, I. Fundulaki, M. Michou, and G. Antoniou Controlling access to RDF graphs A. Berre, A. Gomez-Perez, K. Tutschku, D. Fensel, Future Internet - FIS 2010, vol. 6369 of Lecture Notes in Computer Science 2010 Springer Berlin, Heidelberg 107 117
-
(2010)
Future Internet - FIS 2010, Vol. 6369 of Lecture Notes in Computer Science
, pp. 107-117
-
-
Flouris, G.1
Fundulaki, I.2
Michou, M.3
Antoniou, G.4
-
36
-
-
49949098518
-
Enabling advanced and context-dependent access control in RDF stores
-
Springer
-
F. Abel, J. De Coi, N. Henze, A. Koesling, D. Krause, and D. Olmedilla Enabling advanced and context-dependent access control in RDF stores The Semantic Web, vol. 4825 of LNCS 2007 Springer pp. 1-14
-
(2007)
The Semantic Web, Vol. 4825 of LNCS
, pp. 1-14
-
-
Abel, F.1
De Coi, J.2
Henze, N.3
Koesling, A.4
Krause, D.5
Olmedilla, D.6
-
38
-
-
57749182154
-
An introduction to authorization conflict problem in RDF access control
-
I. Lovrek, R. Howlett, L. Jain, Springer Berlin, Heidelberg
-
J. Kim, K. Jung, and S. Park An introduction to authorization conflict problem in RDF access control I. Lovrek, R. Howlett, L. Jain, Knowledge-Based Intelligent Information and Engineering Systems, vol. 5178 of Lecture Notes in Computer Science 2008 Springer Berlin, Heidelberg 583 592
-
(2008)
Knowledge-Based Intelligent Information and Engineering Systems, Vol. 5178 of Lecture Notes in Computer Science
, pp. 583-592
-
-
Kim, J.1
Jung, K.2
Park, S.3
-
39
-
-
54249094230
-
Query rewriting for access control on semantic web
-
J. Li, and W. Cheung Query rewriting for access control on semantic web Secure Data Management 2008 151 168
-
(2008)
Secure Data Management
, pp. 151-168
-
-
Li, J.1
Cheung, W.2
-
51
-
-
84868498165
-
-
Jena
-
Jena, Jena Project Web Site (2010). http://www.openjena.org/.
-
(2010)
Jena Project Web Site
-
-
-
52
-
-
84868444665
-
-
OpenSSO
-
OpenSSO, OpenSSO Project Web Site (2010). https://opensso.dev.java.net/.
-
(2010)
OpenSSO Project Web Site
-
-
|