-
2
-
-
0035750945
-
A Chinese wall security model for decentralized workftow systems
-
ACM Press
-
ATLURI, V., CHUN, S. A., and MAZZOLENI, P. A Chinese wall security model for decentralized workftow systems. In Proceedings of the 8th ACM conference on Computer and Communications Security (2001), ACM Press, pp. 48-57.
-
(2001)
Proceedings of the 8th ACM Conference On Computer and Communications Security
, pp. 48-57
-
-
Atluri, V.1
Chun, S.A.2
Mazzoleni, P.3
-
3
-
-
0002848811
-
The specification and enforcement of authorization constraints in workftow management systems
-
BERTINO, E., FERRARI, E., and ATLURI, V. The specification and enforcement of authorization constraints in workftow management systems. ACM Transactions on Information and System Security (TISSEC) 2, 1 (1999),65-104.
-
(1999)
ACM Transactions On Information and System Security (TISSEC)
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
4
-
-
0036311802
-
A unified framework for regulating access and information release on the web
-
BONATTI, P., and SAMARATI, P. A unified framework for regulating access and information release on the web. Journal of Computer Security 10,3 (2002), 241-272.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.1
Samarati, P.2
-
5
-
-
0035680371
-
Certificate chain discovery in SPKIjSDSI
-
CLARKE, D., Ellen, J.-E., ELLISON, C., FREDETTE, M., MORCOS, A., and RIVEST, R. L. Certificate chain discovery in SPKIjSDSI. Journal of Computer Security 9, 4 (2001), 285-322.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Ellen, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
7
-
-
84964853055
-
Access control: Policies, models, and mechanism
-
R. Focardi and F. Gorrieri, Eds, of LNCS. Springer Verlag Press
-
DE CAPITANI Di VIMERCATI, S., and SAMARATI, P. Access control: Policies, models, and mechanism. In Foundations of Security Analysis and Design Tuterial Lectures, R. Focardi and F. Gorrieri, Eds., vol. 2171 of LNCS. Springer Verlag Press, 2001.
-
(2001)
Foundations of Security Analysis and Design Tuterial Lectures
, vol.2171
-
-
de Capitani Di Vimercati, S.1
Samarati, P.2
-
8
-
-
0003593599
-
-
September, IETF RFC 2693
-
ELLISON, C., FRANTz, B., LAMPSON, B., RIVEST, R., THOMAS, B. M., and YLONEN, T. SPKI Certificate Theory, September 1999. IETF RFC 2693.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.M.5
Ylonen, T.6
-
9
-
-
0001119421
-
The stable model semantics for logic programming
-
R. Kowalski and K. Bowen, Eds., MIT-Press, pp. 1070-1080
-
GELFOND, M., and LIFSCHITZ, V. The stable model semantics for logic programming. In Proceedings 01 the Fijth. Int ernational Conjerence on Logic Programming (ICLP'88) (1988), R. Kowalski and K. Bowen, Eds., MIT-Press, pp. 1070-1080.
-
(1988)
Proceedings 01 the Fijth. Int Ernational Conjerence On Logic Programming (ICLP'88)
-
-
Gelfond, M.1
Lifschitz, V.2
-
10
-
-
33747074188
-
An overview of workflow management: From process modeling to workflow automation infrastructure
-
GEORGAKOPOULOS, D., HORNICK, M. F., and SIlETIl, A. P. An overview of workflow management: From process modeling to workflow automation infrastructure. Distributed and Parallel Databases 3, 2 (April 1995), 119-153.
-
(1995)
Distributed and Parallel Databases
, vol.3
, Issue.2
, pp. 119-153
-
-
Georgakopoulos, D.1
Hornick, M.F.2
Siletil, A.P.3
-
11
-
-
0035790711
-
Access control mechanisms for inter-organizational workflow
-
ACM Press
-
KANG, M. H., PARK, J. S., and FROSCHER, J. N. Access control mechanisms for inter-organizational workflow. In Proeeedings 01 the Sixth ACM Symposium on Aeeess eontrol models and teehnologies (2001), ACM Press, pp. 66-74.
-
(2001)
Proeeedings 01 the Sixth ACM Symposium On Aeeess Eontrol Models and Teehnologies
, pp. 66-74
-
-
Kang, M.H.1
Park, J.S.2
Froscher, J.N.3
-
12
-
-
3543075807
-
An access control framework for business processes for Web services
-
Fairfax, VA, October, ACM Press
-
KOSHUTANSKI, H., and MASSACCI, F. An access control framework for business processes for Web services. In Proceedings 01 the 2003 ACM uiorkshop on XML security (Fairfax, VA, October 2003), ACM Press.
-
(2003)
Proceedings 01 the 2003 ACM Uiorkshop On XML Security
-
-
Koshutanski, H.1
Massacci, F.2
-
13
-
-
84902462150
-
-
Tech. Rep. 111' TR-1O/2003, First International Workshop on Formal Aspects of Security and Trust (FAST), Istituto di Informatica e Telernatica, Pisa, Italy, September 2003. Editors: Theo Dimitrakos and Fabio Martinelli
-
KOSHUTANSKI, H., and MASSACCI, F. A logical model for security of Web services. Tech. Rep. 111' TR-1O/2003, First International Workshop on Formal Aspects of Security and Trust (FAST), Istituto di Informatica e Telernatica, Pisa, Italy, September 2003. Editors: Theo Dimitrakos and Fabio Martinelli.
-
A Logical Model For Security of Web Services
-
-
Koshutanski, H.1
Massacci, F.2
-
14
-
-
22944463475
-
The DLV system
-
(September 2002), vol. 2424 of Lecture Notes in Computer- Seien ce, Springer
-
LEONE, N., PFEIFER, G., et al. The DLV system. In the 8theuropean Conference on Artificial Intelligenee (JELlA) (September 2002), vol. 2424 of Lecture Notes in Computer- Seien ce, Springer, pp. 537-540.
-
The 8theuropean Conference On Artificial Intelligenee (JELlA
, pp. 537-540
-
-
Leone, N.1
Pfeifer, G.2
-
15
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
LI, N., GROSOF, B. N., and FEIGENBAUM, J. Delegation logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security (TISSEC) 6, 1 (2003), 128-171.
-
(2003)
ACM Transactions On Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
16
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
LI, N., WINSBOROUGH, W. H., and MITCHELL, J. C. Distributed credential chain discovery in trust management. Journal 01 Computer Security 11, 1 (February 2003), 35-86.
-
(2003)
Journal 01 Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
17
-
-
84958675071
-
Stable model semantics ofweight constraint rules
-
December, Springer-Verlag
-
NIEMELÄ, I., SIMONS, P., and SOININEN, T. Stable model semantics ofweight constraint rules. In Proceedings 01 the Fifth. International Conference on Logie Programming and Nonmonotonie Reasoning (December 1999), Springer-Verlag.
-
(1999)
Proceedings 01 the Fifth. International Conference On Logie Programming and Nonmonotonie Reasoning
-
-
Niemelä, I.1
Simons, P.2
Soininen, T.3
-
18
-
-
3543080168
-
Understanding trust management systems
-
IEEE Press
-
WEEKS, S. Understanding trust management systems. In IEEE SS&P-2001 (2001), IEEE Press.
-
(2001)
IEEE SS&P-2001
-
-
Weeks, S.1
-
19
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
Yu, T., WINSLETT, M., and SEAMONS, K. E. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security (TISSEC) 6, 1 (2003), 1-42.
-
(2003)
ACM Transactions On Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|