-
1
-
-
0031382313
-
A Flexible Model for the Specification and Enforcement of Role-Based Authorizations in Workflow Management Systems
-
RBAC-97, ACM Press, New York
-
E. Bertino, E. Ferrari, V. Atluri, "A Flexible Model for the Specification and Enforcement of Role-Based Authorizations in Workflow Management Systems," In Proceedings of the 2nd ACM Workshop on Role-Based Access Control (RBAC-97), ACM Press, New York, 1997, pp. 6-7.
-
(1997)
Proceedings of the 2nd ACM Workshop on Role-Based Access Control
, pp. 6-7
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
2
-
-
0035480037
-
Identity management and its support of multilateral security
-
S. Claußand M. Köhntopp. Identity management and its support of multilateral security. Computer Networks, 37 (2001), 205-219.
-
(2001)
Computer Networks
, vol.37
, pp. 205-219
-
-
Claußand, S.1
Köhntopp, M.2
-
3
-
-
0001809810
-
The Ponder Policy Specification Language
-
Bristol, UK, Jan
-
N. Damianou, N. Dulay, E. Lupu, and M. Solomon. The Ponder Policy Specification Language. Proceedings Policy 2001: Workshop on Policies for Distributed Systems and Networks, Bristol, UK, 29-31, Jan. 2001.
-
(2001)
Proceedings Policy 2001: Workshop on Policies for Distributed Systems and Networks
, pp. 29-31
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Solomon, M.4
-
5
-
-
35248896164
-
A Flexible Method for Information System Security Policy Specification
-
Louvainla-Neuve, Belgium, Springer-Verlag
-
R. Ortalo. A Flexible Method for Information System Security Policy Specification. Proceedings of 5th European Symposium on Research in Computer Security, 1998. Louvainla-Neuve, Belgium, Springer-Verlag.
-
(1998)
Proceedings of 5th European Symposium on Research in Computer Security
-
-
Ortalo, R.1
-
6
-
-
85062135381
-
-
J. Rumbaugh, et al: The Unified Modeling Language Reference Manual, Addison-Wesley
-
J. Rumbaugh, et al: The Unified Modeling Language Reference Manual, Addison-Wesley.
-
-
-
-
7
-
-
38949214729
-
Security Contexts in Autonomic Computing Systems
-
Proceedings of Proceedings of 2006 International Conference on Computational Intelligence and Security CIS2006, November 03-06, Guangzhou, PRC
-
Kaiyu Wan, Vasu Alagar. Security Contexts in Autonomic Computing Systems. In Proceedings of Proceedings of 2006 International Conference on Computational Intelligence and Security (CIS2006), November 03-06, 2006, Guangzhou, PRC, page 1523-1527. (also to appear in Lecture Notes in Artificial Intelligence)
-
(2006)
also to appear in Lecture Notes in Artificial Intelligence
, pp. 1523-1527
-
-
Wan, K.1
Alagar, V.2
-
8
-
-
85062127665
-
-
Fighting Back Against Identity Theft, U.S. Federal Trade Commission
-
Fighting Back Against Identity Theft - U.S. Federal Trade Commission. www.ftc.gov/bcp/edu/microsites/idtheft/
-
-
-
-
9
-
-
85062133603
-
-
Identity Theft: What is it and What you can do about it?, Office of the Privacy Commissioner of Canada, www.privcom.gc.ca/fs-fi/02_05_d_10_e.asp/
-
Identity Theft: What is it and What you can do about it?, Office of the Privacy Commissioner of Canada, www.privcom.gc.ca/fs-fi/02_05_d_10_e.asp/
-
-
-
-
10
-
-
85062131757
-
-
European Conference Maintaining the integrity of identities and payments: Two challenges for fraud prevention. ec.europa.eu/ justice_home/news/information_dossiers/conference_integrity/index en.htm/
-
European Conference "Maintaining the integrity of identities and payments: Two challenges for fraud prevention". ec.europa.eu/ justice_home/news/information_dossiers/conference_integrity/index en.htm/
-
-
-
|