-
4
-
-
78649235952
-
Modeling the multipolicy machine
-
In Little Compton, Rhode Island, USA
-
Bell D (1994). Modeling the multipolicy machine. In Proc. of the New Security Paradigm Workshop, Little Compton, Rhode Island, USA.
-
(1994)
Proc. of the New Security Paradigm Workshop
-
-
Bell, D.1
-
5
-
-
0032153903
-
An access control model supporting periodicity constraints and temporal reasoning
-
Bertino E, Bettini C, Ferrari E, Samarati P (1998). An access control model supporting periodicity constraints and temporal reasoning. ACM Transactions on Database Systems, 23(3):23 1-285.
-
(1998)
ACM Transactions on Database Systems
, vol.23
, Issue.3
, pp. 231-285
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
8
-
-
0029700344
-
Decentralized trust management
-
In Oakland, CA, USA
-
Blaze M, Feigenbaum J, Lacy J (1996). Decentralized trust management. In Proc. of the 1996 IEEE Symposiumon Security and Privacy, Oakland, CA, USA.
-
(1996)
Proc. of the 1996 IEEE Symposiumon Security and Privacy
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
10
-
-
0036311802
-
A unified framework for regulating access and information release on the web
-
Bonatti P, Samarati P (2002). A unified framework for regulating access and information release on the web. Journal of Computer Security, 10(3):241-272.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.1
Samarati, P.2
-
14
-
-
0037889209
-
Securing XML documents
-
In Konstanz, Germany
-
Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati P (2000). Securing XML documents. In Proc. of the 2000 International Conference on Extending Database Technology (EDBT2000), Konstanz, Germany.
-
(2000)
Proc. of the 2000 International Conference on Extending Database Technology (EDBT2000)
-
-
Damiani, E.1
de Capitani di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
15
-
-
85001697848
-
A fine-grained access control system for XML documents
-
Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati P (2002). A fine-grained access control system for XML documents. ACM Transactions on Information and System Security, 5(2): 169-202.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.2
, pp. 169-202
-
-
Damiani, E.1
de Capitani di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
17
-
-
33745883651
-
-
extensible Access Control Markup Language (XACML) Version 2.0, Version 2.0. OASIS
-
extensible Access Control Markup Language (XACML) Version 2.0 (2004). extensible Access Control Markup Language (XACML) Version 2.0. OASIS. http://www.oasisopen. org/committees/xacml.
-
(2004)
extensible Access Control Markup Language (XACML)
-
-
-
20
-
-
33646837004
-
An authorization model for XML databases
-
In George Mason University, Fairfax, VA, USA
-
Gabillon A (2004). An authorization model for XML databases. In Proc. of the ACM Workshop Secure Web Services, George Mason University, Fairfax, VA, USA.
-
(2004)
Proc. of the ACM Workshop Secure Web Services
-
-
Gabillon, A.1
-
25
-
-
84983002492
-
Access control in configurable systems
-
Jaeger T (2001). Access control in configurable systems. Lecture Notes in Computer Science, 1603:289-3 16.
-
(2001)
Lecture Notes in Computer Science
, vol.1603
, pp. 289-316
-
-
Jaeger, T.1
-
26
-
-
0001619596
-
Flexible support for multiple access control policies
-
Jajodia S, Samarati P, Sapino ML, Subrahmanian VS (2001). Flexible support for multiple access control policies. ACM Transactions on Database Systems, 26(2):214-260.
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
27
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
In Tucson, AZ
-
Jajodia S, Samarati P, Subrahmanian VS, Bertino E (1997). A unified framework for enforcing multiple access control policies. In Proc, of the 1997 ACM International SIGMOD Conference on Management of Data, Tucson, AZ.
-
(1997)
Proc, of the 1997 ACM International SIGMOD Conference on Management of Data
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
Bertino, E.4
-
30
-
-
0019608720
-
Formal models for computer security
-
Landwehr CF (1981). Formal models for computer security. ACM Computing Surveys, 13(3):247-278.
-
(1981)
ACM Computing Surveys
, vol.13
, Issue.3
, pp. 247-278
-
-
Landwehr, C.F.1
-
31
-
-
0000393542
-
A logic-based knowledge representation for authorization with delegation
-
In Washington, DC, USA
-
Li N, Feigenbaum J, Grosof B (1999). A logic-based knowledge representation for authorization with delegation. In Proc. of the 12th IEEE Computer Security Foundations Workshop, Washington, DC, USA.
-
(1999)
Proc. of the 12th IEEE Computer Security Foundations Workshop
-
-
Li, N.1
Feigenbaum, J.2
Grosof, B.3
-
34
-
-
0036085965
-
Design of a role-based trust-management framework
-
In Oakland, CA, USA
-
Li N, Mitchell JC, Winsborough WH (2002). Design of a role-based trust-management framework. In Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, USA.
-
(2002)
Proc. of the IEEE Symposium on Security and Privacy
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
36
-
-
30644473909
-
Adaptive trust negotiation and access control
-
In Stockholm, Sweden
-
Ryutov T, Zhou L, Neuman C, Leithead T, Seamons KE (2005). Adaptive trust negotiation and access control. In Proc. of the 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden.
-
(2005)
Proc. of the 10th ACM Symposium on Access Control Models and Technologies
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Leithead, T.4
Seamons, K.E.5
-
37
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
In Focardi R, Gorrieri R, editors, Springer-Verlag
-
Samarati P, De Capitani di Vimercati S (2001). Access control: Policies, models, and mechanisms. In Focardi R, Gorrieri R, editors, Foundations of Security Analysis and Design, LNCS 2171. Springer-Verlag.
-
(2001)
Foundations of Security Analysis and Design, LNCS 2171
-
-
Samarati, P.1
de Capitani di Vimercati, S.2
-
39
-
-
19544394549
-
-
(SAML) V1.l. Security Assertion Markup Language SAMLJ V1.l. OASIS
-
Security Assertion Markup Language (SAML) V1. l (2003). Security Assertion Markup Language (SAMLJ V1.l. OASIS. http://www.oasis-open.org/committees/security/.
-
(2003)
Security Assertion Markup Language
-
-
-
41
-
-
0003496922
-
-
Subrahmanian V, Adali S, Brink A, Lu J, Rajput A, Rogers T, Ross R, Ward C. Hermes: heterogeneous reasoning and mediator system. http:Nwww.cs.umd.eduIprojects/hermes.
-
Hermes: Heterogeneous reasoning and mediator system
-
-
Subrahmanian, V.1
Adali, S.2
Brink, A.3
Lu, J.4
Rajput, A.5
Rogers, T.6
Ross, R.7
Ward, C.8
-
42
-
-
84882597160
-
-
The XACML Profile for Hierarchical Resources. OASIS
-
The XACML Profile for Hierarchical Resources (2004). The XACML Profile for Hierarchical Resources. OASIS. http:Nwww.oasis-38930pen.org/committees/xacml.
-
(2004)
The XACML Profile for Hierarchical Resources.
-
-
-
43
-
-
33645997087
-
Mobile trust negotiation: Authentication and authorization in dynamic mobile networks
-
In Lake Windermere, England
-
van der Horst TW, Sundelin T, Seamons KE, Knutson CD (2004). Mobile trust negotiation: Authentication and authorization in dynamic mobile networks. In Proc. of the Eighth IFIP Conference on Communications and Multimedia Security, Lake Windermere, England.
-
(2004)
Proc. of the Eighth IFIP Conference on Communications and Multimedia Security
-
-
van der Horst, T.W.1
Sundelin, T.2
Seamons, K.E.3
Knutson, C.D.4
-
44
-
-
4544323391
-
-
Web services security policy (WS-SecurityPolicy)
-
Web services security policy (WS-SecurityPolicy) (2002). Web services security policy (WS-SecurityPolicy). http:Nwww-106.ibm.com/developerworks/library/ws-secpo/.
-
(2002)
Web services security policy (WS-SecurityPolicy)
-
-
-
46
-
-
84939548725
-
Automated trust negotiation
-
In Hilton Head Island, SC, USA
-
Winsborough W, Seamons KE, Jones V (2000). Automated trust negotiation. In Proc. of the DARPA Information Survivability Conf. & Exposition, Hilton Head Island, SC, USA.
-
(2000)
Proc. of the DARPA Information Survivability Conf. & Exposition
-
-
Winsborough, W.1
Seamons, K.E.2
Jones, V.3
-
47
-
-
0030698978
-
Assuring security and privacy for digital library transactions on the web: Client and server security policies
-
Washington, DC
-
Winslett M, Ching N, Jones V, Slepchin I(1997). Assuring security and privacy for digital library transactions on the web: Client and server security policies. In Proc. of the ADL '97-Forum on Research and Tech. Advances in Digital Libraries, Washington, DC.
-
(1997)
Proc. of the ADL '97-Forum on Research and Tech. Advances in Digital Libraries
-
-
Winslett, M.1
Ching, N.2
Jones, V.3
Slepchin, I.4
-
48
-
-
84974750564
-
Authorizations indistributed systems: A new approach
-
Woo TYC, Lam SS (1993). Authorizations indistributed systems: A new approach. Journal of Computer Security, 2(2,3):107-136.
-
(1993)
Journal of Computer Security
, vol.2
, Issue.2-3
, pp. 107-136
-
-
Woo, T.Y.C.1
Lam, S.S.2
-
49
-
-
0004135793
-
-
extensible Markup Language (XML) 1.0 (Third Edition). World Wide Web Consortium (W3C)
-
World Wide Web Consortium (W3C) (2004). extensible Markup Language (XML) 1.0 (Third Edition). World Wide Web Consortium (W3C). http://www.w3.org/TR/REC-xml.
-
(2004)
World Wide Web Consortium (W3C)
-
-
-
51
-
-
84954418287
-
A unified scheme for resource protection in automated trust negotiation
-
In Berkeley, California
-
Yu T, Winslett M (2003). A unified scheme for resource protection in automated trust negotiation. In Proc, of the IEEE Symposium on Security and Privacy, Berkeley, California.
-
(2003)
Proc, of the IEEE Symposium on Security and Privacy
-
-
Yu, T.1
Winslett, M.2
-
53
-
-
1642327001
-
Supporting structured credentials and sensitive policies trough interoperable strategies for automated trust
-
Yu T, Winslett M, Seamons KE (2003). Supporting structured credentials and sensitive policies trough interoperable strategies for automated trust. ACM Transactions on Information and System Security, 6(1):1-42.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|