-
1
-
-
84883096310
-
-
XACML enterprise. http://code.google.com/p/enterprise-java-xacml/.
-
XACML Enterprise
-
-
-
2
-
-
84883062783
-
-
XACML light. http://sourceforge.net/projects/xacmllight/.
-
XACML Light
-
-
-
3
-
-
67650280463
-
Role based access control with spatiotemporal context for mobile applications
-
Springer
-
S. Aich, S. Mondal, S. Sural, and A. Majumdar. Role based access control with spatiotemporal context for mobile applications. In Transactions on Computational Science IV, volume 5430 of LNCS, pages 177-199. Springer, 2009.
-
(2009)
Transactions on Computational Science IV, Volume 5430 of LNCS
, pp. 177-199
-
-
Aich, S.1
Mondal, S.2
Sural, S.3
Majumdar, A.4
-
4
-
-
38349032537
-
STARBAC: Spatiotemporal role based access control
-
Springer-Verlag
-
S. Aich, S. Sural, and A. Majumdar. STARBAC: Spatiotemporal role based access control. In Proceedings of the 2007 OTM confederated international conference: CoopIS, DOA, ODBASE, GADA, and IS-Volume Part II, pages 1567-1582. Springer-Verlag, 2007.
-
(2007)
Proceedings of the 2007 OTM Confederated International Conference: Coopis, DOA, ODBASE, GADA, and is-Volume Part II
, pp. 1567-1582
-
-
Aich, S.1
Sural, S.2
Majumdar, A.3
-
5
-
-
84865788031
-
A model ol OASIS role-based access control and its support for active security
-
J. Bacon, K. Moody, and W. Yao. A model ol OASIS role-based access control and its support for active security. ACM Trans. Inf. Syst. Secur., 5(4):492-540, 2002.
-
(2002)
ACM Trans. Inf. Syst. Secur.
, vol.5
, Issue.4
, pp. 492-540
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
6
-
-
0032153903
-
An access control model supporting periodicity constraints and temporal reasoning
-
E. Bertino, C. Bettini, E. Ferrari, and P. Samarati. An access control model supporting periodicity constraints and temporal reasoning. A CM Trans. Database Syst., 23(3):231-285, 1998.
-
(1998)
A CM Trans. Database Syst.
, vol.23
, Issue.3
, pp. 231-285
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
9
-
-
84948995473
-
A context-aware security architecture for emerging applications
-
ACSAC '02 Washington, DC, USA IEEE Computer Society
-
M. J. Covington, P. Fogla, Z. Zhan, and M. Ahamad. A context-aware security architecture for emerging applications. In Proceedings of the 18th Annual Computer Security Applications Conference, ACSAC '02, pages 249-, Washington, DC, USA, 2002. IEEE Computer Society.
-
(2002)
Proceedings of the 18th Annual Computer Security Applications Conference
, pp. 249
-
-
Covington, M.J.1
Fogla, P.2
Zhan, Z.3
Ahamad, M.4
-
10
-
-
0035791053
-
Securing context-aware applications using environment roles
-
SACMAT '01 ACM
-
M. J. Covington, W. Long, S. Srinivasan, A. K. Dev, M. Ahamad, and G. D. Abowd. Securing context-aware applications using environment roles. In Proceedings of the sixth ACM symposium on Access control models and technologies, SACMAT '01, pages 10-20. ACM, 2001.
-
(2001)
Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
, pp. 10-20
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dev, A.K.4
Ahamad, M.5
Abowd, G.D.6
-
11
-
-
33847092871
-
GEO-RBAC: A spatially aware RBAC
-
M. L. Damiani, E. Bertino, B. Catania, and P. Perlasca. GEO-RBAC: A spatially aware RBAC. ACM Trans. Inf. Syst. Secur., 10(1), 2007.
-
(2007)
ACM Trans. Inf. Syst. Secur.
, vol.10
, Issue.1
-
-
Damiani, M.L.1
Bertino, E.2
Catania, B.3
Perlasca, P.4
-
12
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D. F. Ferraiolo, R. S. Sandhu, S. I. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. A CM Trans. Inf. Syst. Secur., 4(3):224-274, 2001.
-
(2001)
A CM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.S.2
Gavrila, S.I.3
Kuhn, D.R.4
Chandramouli, R.5
-
13
-
-
0035790754
-
Flexible team-based access control using contexts
-
C. K. Georgiadis, I. Mavridis, G. Pangalos, and R. K. Thomas. Flexible team-based access control using contexts. In SACMAT, pages 21-27, 2001.
-
(2001)
SACMAT
, pp. 21-27
-
-
Georgiadis, C.K.1
Mavridis, I.2
Pangalos, G.3
Thomas, R.K.4
-
15
-
-
17444406680
-
A generalized temporal role-based access control model
-
J. Joshi, E. Bertino, U. Latif, and A. Ghafoor. A generalized temporal role-based access control model. IEEE Trans. Knowl. Data Eng., 17(1):4-23, 2005.
-
(2005)
IEEE Trans. Knowl. Data Eng.
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
17
-
-
77950626631
-
A framework for programming robust context-aware applications
-
D. Kulkarni and A. R. Tripathi. A framework for programming robust context-aware applications. IEEE Trans. Software Eng., 36(2):184-197, 2010.
-
(2010)
IEEE Trans. Software Eng.
, vol.36
, Issue.2
, pp. 184-197
-
-
Kulkarni, D.1
Tripathi, A.R.2
-
21
-
-
85015437589
-
Lrbac: A location-aware role-based access control model
-
A. Bagchi and V. Atluri, editors Springer
-
I. Ray, M. Kumar, and L. Yu. Lrbac: A location-aware role-based access control model. In A. Bagchi and V. Atluri, editors, ICISS, volume 4332 of Lecture Notes in Computer Science, pages 147-161. Springer, 2006.
-
(2006)
ICISS, Volume 4332 of Lecture Notes in Computer Science
, pp. 147-161
-
-
Ray, I.1
Kumar, M.2
Yu, L.3
-
22
-
-
37849009763
-
A spatio-temporal role-based access control model
-
S. Barker and G.-J. Ahn, editors Springer Berlin/Heidelberg
-
I. Ray and M. Toahchoodee. A spatio-temporal role-based access control model. In S. Barker and G.-J. Ahn, editors, Data and Applications Security XXI, volume 4602 of Lecture Notes in Computer Science, pages 211-226. Springer Berlin/Heidelberg, 2007.
-
(2007)
Data and Applications Security XXI, Volume 4602 of Lecture Notes in Computer Science
, pp. 211-226
-
-
Ray, I.1
Toahchoodee, M.2
-
23
-
-
52149090713
-
A spatio-temporal access control model supporting delegation for pervasive computing applications
-
I. Ray and M. Toahchoodee. A spatio-temporal access control model supporting delegation for pervasive computing applications. Trust, Privacy and Security in Digital Business, pages 48-58, 2008.
-
(2008)
Trust, Privacy and Security in Digital Business
, pp. 48-58
-
-
Ray, I.1
Toahchoodee, M.2
-
24
-
-
84948983013
-
Access control for active spaces
-
ACSAC '02 Washington, DC, USA IEEE Computer Society
-
G. Sampemane, P. Naldurg, and R. H. Campbell. Access control for active spaces. In Proceedings of the 18th Annual Computer Security Applications Conference, ACSAC '02, pages 343-, Washington, DC, USA, 2002. IEEE Computer Society.
-
(2002)
Proceedings of the 18th Annual Computer Security Applications Conference
, pp. 343
-
-
Sampemane, G.1
Naldurg, P.2
Campbell, R.H.3
-
25
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
27
-
-
4444246080
-
An integrated approach to engineer and enforce context constraints in rbac environments
-
Aug.
-
M. Strembeck and G. Neumann. An integrated approach to engineer and enforce context constraints in rbac environments. A CM Trans. Inf. Syst. Secur., 7(3):392-427, Aug. 2004.
-
(2004)
A CM Trans. Inf. Syst. Secur.
, vol.7
, Issue.3
, pp. 392-427
-
-
Strembeck, M.1
Neumann, G.2
-
29
-
-
70349252058
-
Performance evaluation of XACML PDP implementations
-
SWS '08 New York, NY, USA ACM
-
F. Turkmen and B. Crispo. Performance evaluation of XACML PDP implementations. In Proceedings of the 2008 ACM workshop on Secure web services, SWS '08, pages 37-44, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 2008 ACM Workshop on Secure Web Services
, pp. 37-44
-
-
Turkmen, F.1
Crispo, B.2
|