-
1
-
-
84956993736
-
Role-based authorization constraints specification
-
November
-
Gail-Joon Ahn and Ravi Sandhu. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur., 3(4):207-226, November 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.4
, pp. 207-226
-
-
Ahn, G.-J.1
Sandhu, R.2
-
3
-
-
84874440229
-
A lattice interpretation of group-centric collaboration with expedient insiders
-
IEEE
-
Khalid Zaman Bijon, Tahmina Ahmed, Ravi Sandhu, and Ram Krishnan. A lattice interpretation of group-centric collaboration with expedient insiders. In Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2012 8th International Conference on, pages 200-209. IEEE, 2012.
-
(2012)
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2012 8th International Conference on
, pp. 200-209
-
-
Bijon, K.Z.1
Ahmed, T.2
Sandhu, R.3
Krishnan, R.4
-
5
-
-
84893533683
-
Towards an attribute based constraints specfication language
-
IEEE
-
Khalid Zaman Bijon, Ram Krishnan, and Ravi Sandhu. Towards an attribute based constraints specfication language. In Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom). IEEE, 2013.
-
(2013)
Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom)
-
-
Bijon, K.Z.1
Krishnan, R.2
Sandhu, R.3
-
7
-
-
84893538585
-
XACML and risk-aware access control
-
Liang Chen, Luca Gasparini, and Timothy J Norman. XACML and risk-aware access control. Resource, 2(10):3-5, 2013.
-
(2013)
Resource
, vol.2
, Issue.10
, pp. 3-5
-
-
Chen, L.1
Gasparini, L.2
Norman, T.J.3
-
8
-
-
34548769351
-
Fuzzy multi-level security: An experiment on quantified risk-adaptive access control
-
may
-
Pau-Chen Cheng, P. Rohatgi, C. Keser, P.A. Karger, G.M. Wagner, and A.S. Reninger. Fuzzy multi-level security: An experiment on quantified risk-adaptive access control. In Security and Privacy, 2007., pages 222-230, may 2007.
-
(2007)
Security and Privacy, 2007
, pp. 222-230
-
-
Pau-Chen, C.1
Rohatgi, P.2
Keser, C.3
Karger, P.A.4
Wagner, G.M.5
Reninger, A.S.6
-
9
-
-
0001865043
-
A Comparison of Commercial and Military Computer Security Policies
-
David D. Clark and David R. Wilson. A Comparison of Commercial and Military Computer Security Policies. In Proc. of the IEEE S&P, 1987.
-
Proc. Of the IEEE S&P, 1987
-
-
Clark, D.D.1
Wilson, D.R.2
-
11
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
David F. Ferraiolo, Ravi Sandhu, Serban Gavrila, D. Richard Kuhn, and Ramaswamy Chandramouli. Proposed NIST standard for role-based access control. ACM Tran. Inf. Sys. Sec., 2001.
-
(2001)
ACM Tran. Inf. Sys. Sec.
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
12
-
-
84893628147
-
On the formal definition of separation-of-duty policies and their composition
-
IEEE
-
Virgil D Gligor et al. On the formal definition of separation-of-duty policies and their composition. In Security & Privacy. IEEE, 1998.
-
(1998)
Security & Privacy
-
-
Gligor, V.D.1
-
14
-
-
84873425163
-
A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC
-
Xin Jin, Ram Krishnan, and Ravi Sandhu. A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC. In DBSec, 2012.
-
(2012)
DBSec
-
-
Jin, X.1
Krishnan, R.2
Sandhu, R.3
-
16
-
-
85139863684
-
Risk-based security decisions under uncertainty
-
Ian Molloy, Luke Dickens, Charles Morisset, Pau-Chen Cheng, Jorge Lobo, and Alessandra Russo. Risk-based security decisions under uncertainty. CODASPY '12, 2012.
-
(2012)
CODASPY '12
-
-
Molloy, I.1
Dickens, L.2
Morisset, C.3
Cheng, P.-C.4
Lobo, J.5
Russo, A.6
-
17
-
-
0025099231
-
Some conundrums concerning separation of duty
-
IEEE
-
Michael J Nash and Keith R Poland. Some conundrums concerning separation of duty. In Research in Security and Privacy, pages 201-207. IEEE, 1990.
-
(1990)
Research in Security and Privacy
, pp. 201-207
-
-
Nash, M.J.1
Poland, K.R.2
-
18
-
-
77954482365
-
Risk-based access control systems built on fuzzy inferences
-
New York, NY, USA, ACM
-
Qun Ni, Elisa Bertino, and Jorge Lobo. Risk-based access control systems built on fuzzy inferences. ASIACCS '10, pages 250-260, New York, NY, USA, 2010. ACM.
-
(2010)
ASIACCS '10
, pp. 250-260
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
-
19
-
-
33845437573
-
Horizontal integration: Broader access models for realizing information dominance
-
MITRE Corporation Jason Program Office
-
MITRE Corporation Jason Program Office. Horizontal integration: Broader access models for realizing information dominance. Technical Report JSR-04-132, MITRE Corporation, 2004.
-
(2004)
Technical Report JSR-04-132, MITRE Corporation
-
-
-
20
-
-
80455173614
-
An approach to access control under uncertainty
-
aug
-
F. Salim, J. Reid, E. Dawson, and U. Dulleck. An approach to access control under uncertainty. In Avail., Reliab. and Sec. (ARES), pages 1-8, aug. 2011.
-
(2011)
Avail., Reliab. And Sec. (ARES)
, pp. 1-8
-
-
Salim, F.1
Reid, J.2
Dawson, E.3
Dulleck, U.4
-
21
-
-
0024125647
-
Transaction control expressions for separation of duties
-
Ravi Sandhu. Transaction control expressions for separation of duties. In Proc. of the 4th ACSAC, 1988.
-
(1988)
Proc. Of the 4th ACSAC
-
-
Sandhu, R.1
-
22
-
-
0027699087
-
Lattice-based access control models
-
Ravi S. Sandhu. Lattice-based access control models. IEEE Computer, 26(11), 1993.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
-
-
Sandhu, R.S.1
-
23
-
-
0030086382
-
Role-based access control models
-
feb
-
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-based access control models. Computer, 29(2):38-47, feb 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
24
-
-
0030644642
-
Separation of duty in role-based environments
-
IEEE
-
Richard T Simon and Mary Ellen Zurko. Separation of duty in role-based environments. In CSFW, pages 183-194. IEEE, 1997.
-
(1997)
CSFW
, pp. 183-194
-
-
Simon, R.T.1
Zurko, M.E.2
|