-
1
-
-
77954327973
-
-
Web Site. URL
-
Aletheia (2009). Aletheia Project Web Site. URL: http://www.aletheia- projekt.de/.
-
(2009)
Aletheia
-
-
-
2
-
-
33744823157
-
Product lifecycle management: Closing the knowledge loops
-
Ameri, F. and Dutta, D. (2005). Product Lifecycle Management: Closing the Knowledge Loops. Computer-Aided Design and Applications, 2 (5), 577-590.
-
(2005)
Computer-Aided Design and Applications
, vol.2
, Issue.5
, pp. 577-590
-
-
Ameri, F.1
Dutta, D.2
-
4
-
-
0037430830
-
Access control and trust in the use of widely distributed services
-
Bacon, J., Moody, K., and Yao, W. (2003). Access Control and Trust in the Use of Widely Distributed Services. Software: Practice and Experience (SP&E), 33 (4).
-
(2003)
Software: Practice and Experience (SP&E)
, vol.33
, Issue.4
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
6
-
-
84929938473
-
Role-based access control for publish/subscribe middleware architectures
-
Belokosztolszki, A., Eyers, D.M., Pietzuch, P.R., Bacon, J., and Moody, K. (2003b). Role-Based Access Control for Publish/Subscribe Middleware Architectures. In Proc. of the International Workshop on Distributed Event-Based Systems.
-
(2003)
Proc. of the International Workshop on Distributed Event-Based Systems
-
-
Belokosztolszki, A.1
Eyers, D.M.2
Pietzuch, P.R.3
Bacon, J.4
Moody, K.5
-
8
-
-
0242456748
-
Models for coalition-based access control (CBAC)
-
Cohen, E., Thomas, R.K., Winsborough, W., and Shands, D. (2002). Models for Coalition-based Access Control (CBAC). In Proc. of the 7th ACM Symposium on Access Control Models and Technologies.
-
(2002)
Proc. of the 7th ACM Symposium on Access Control Models and Technologies
-
-
Cohen, E.1
Thomas, R.K.2
Winsborough, W.3
Shands, D.4
-
11
-
-
0001073758
-
Building theories from case study research
-
Eisenhardt, K.M. (1989) Building Theories from Case Study Research. Academy of Management Review 14 (4), 532-550.
-
(1989)
Academy of Management Review
, vol.14
, Issue.4
, pp. 532-550
-
-
Eisenhardt, K.M.1
-
12
-
-
77955394691
-
Challenges for access control in knowledge federations
-
Madeira, Portugal
-
Evdokimov, S., Fabian, B., Kunz, S. (2009). Challenges for Access Control in Knowledge Federations, In: Proc. International Conference on Knowledge Management and Information Sharing (KMIS 2009), Madeira, Portugal.
-
(2009)
Proc. International Conference on Knowledge Management and Information Sharing (KMIS 2009)
-
-
Evdokimov, S.1
Fabian, B.2
Kunz, S.3
-
15
-
-
70450277229
-
Access control policy combining: Theory meets practice
-
Li, N., Wang, Q., Qardaji, W., Bertino, E., Rao, P., Lobo, J., and Lin, D. (2009). Access Control Policy Combining: Theory Meets Practice. In Proc. of the 14th ACM Symposium on Access Control Models and Technologies.
-
(2009)
Proc. of the 14th ACM Symposium on Access Control Models and Technologies
-
-
Li, N.1
Wang, Q.2
Qardaji, W.3
Bertino, E.4
Rao, P.5
Lobo, J.6
Lin, D.7
-
16
-
-
38949106870
-
XACML policy integration algorithms
-
Mazzoleni, P., Crispo, B., Sivasubramanian, S., and Bertino, E. (2008). XACML Policy Integration Algorithms. ACM Transactions on Information and System Security 11 (1), 1-29.
-
(2008)
ACM Transactions on Information and System Security
, vol.11
, Issue.1
, pp. 1-29
-
-
Mazzoleni, P.1
Crispo, B.2
Sivasubramanian, S.3
Bertino, E.4
-
17
-
-
10444269570
-
An approach to extract RBAC models from BPEL4WS processes
-
Modena, Italy
-
Mendling, J., Strembeck, M., Stermsek, G., and Neumann, G. (2004). An Approach to Extract RBAC Models from BPEL4WS Processes. In Proc. of the 13th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, Modena, Italy.
-
(2004)
Proc. of the 13th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises
-
-
Mendling, J.1
Strembeck, M.2
Stermsek, G.3
Neumann, G.4
-
20
-
-
84870647385
-
Web services security: SOAP message security 1.1, WS-security
-
OASIS (2006). Web Services Security: SOAP Message Security 1.1 (WS-Security), OASIS Standard Specification. http://docs.oasis-open.org/wss/v1. 1/.
-
(2006)
OASIS Standard Specification
-
-
-
23
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., and Youman, C.E. (1996). Role-Based Access Control Models. IEEE Computer, 29 (2).
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
24
-
-
4444246080
-
An integrated approach to engineer and enforce context constraints in RBAC environments
-
Strembeck, M. and Neumann, G. (2004). An Integrated Approach to Engineer and Enforce Context Constraints in RBAC Environments. ACM Transactions on Information and System Security, 7 (3).
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.3
-
-
Strembeck, M.1
Neumann, G.2
-
26
-
-
84946062136
-
Aletheia - Towards a distributed architecture for semantic federation of comprehensive product information
-
Wauer, M., Schuster, D., Meinecke, J., Janke, T., and Schill, A. (2009). Aletheia - Towards a Distributed Architecture for Semantic Federation of Comprehensive Product Information; IADIS International Conference WWW/Internet.
-
(2009)
IADIS International Conference WWW/Internet
-
-
Wauer, M.1
Schuster, D.2
Meinecke, J.3
Janke, T.4
Schill, A.5
|