-
1
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
T. Yu, M. Winslett, and K. E. Seamons, "Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation," ACM Transactions on Information and System Security (TISSEC), vol. 6, no. 1, pp. 1-42, 2003.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
2
-
-
60849083522
-
Xena: An access negotiation framework using xacml
-
D. A. Haidar, N. Cuppens-Boulahia, F. Cuppens, and H. Debar, "Xena: an access negotiation framework using xacml," annals of telecommunications-Annales des teĺecommunications, vol. 64, no. 1-2, pp. 155-169, 2009.
-
(2009)
Annals of Telecommunications-Annales des Teĺecommunications
, vol.64
, Issue.1-2
, pp. 155-169
-
-
Haidar, D.A.1
Cuppens-Boulahia, N.2
Cuppens, F.3
Debar, H.4
-
3
-
-
84959057111
-
On τ-, μ-, φ-, and ε-contracting
-
Springer
-
P. Grefen and S. Angelov, "On τ-, μ-, φ-, and ε-contracting," in Web Services, E-Business, and the Semantic Web. Springer, 2002, pp. 68-77.
-
(2002)
Web Services, E-Business, and the Semantic Web
, pp. 68-77
-
-
Grefen, P.1
Angelov, S.2
-
5
-
-
0347621639
-
The wsla framework: Specifying and monitoring service level agreements for web services
-
A. Keller and H. Ludwig, "The wsla framework: Specifying and monitoring service level agreements for web services," Journal of Network and Systems Management, vol. 11, no. 1, pp. 57-81, 2003.
-
(2003)
Journal of Network and Systems Management
, vol.11
, Issue.1
, pp. 57-81
-
-
Keller, A.1
Ludwig, H.2
-
6
-
-
34250779744
-
Web services agreement specification (ws-Agreement)
-
A. Andrieux, K. Czajkowski, A. Dan, K. Keahey, H. Ludwig, T. Nakata, J. Pruyne, J. Rofrano, S. Tuecke, and M. Xu, "Web services agreement specification (ws-Agreement)," in Global Grid Forum, vol. 2, 2004.
-
(2004)
Global Grid Forum
, vol.2
-
-
Andrieux, A.1
Czajkowski, K.2
Dan, A.3
Keahey, K.4
Ludwig, H.5
Nakata, T.6
Pruyne, J.7
Rofrano, J.8
Tuecke, S.9
Xu, M.10
-
7
-
-
33745273172
-
Job submission description language (jsdl) specification, version 1.0
-
A. Anjomshoaa, F. Brisard, M. Drescher, D. Fellows, A. Ly, S. McGough, D. Pulsipher, and A. Savva, "Job submission description language (jsdl) specification, version 1.0," in Open Grid Forum, GFD, vol. 56, 2005.
-
(2005)
Open Grid Forum, GFD
, vol.56
-
-
Anjomshoaa, A.1
Brisard, F.2
Drescher, M.3
Fellows, D.4
Ly, A.5
McGough, S.6
Pulsipher, D.7
Savva, A.8
-
9
-
-
84924204232
-
Ws-Agreement negotiation version 1.0
-
May 2011)
-
O. Waldrich et al., "Ws-Agreement negotiation version 1.0," in Recomendation, Open Grid Forum (May 2011), 2011.
-
(2011)
Recomendation, Open Grid Forum
-
-
Waldrich, O.1
-
10
-
-
84923061015
-
-
"Slaatsoi project." [Online]. Available: http: //sla-At-soi.eu/
-
-
-
-
11
-
-
84922980140
-
-
"Irmos project." [Online]. Available: http: //www.irmosproject.eu/
-
-
-
-
12
-
-
84923034389
-
-
"Smartlm project." [Online]. Available: http: //www.smartlm.eu/
-
-
-
-
13
-
-
77952407814
-
Organization based access control
-
A. A. E. Kalam, R. Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miege, C. Saurel, and G. Trouessin, "Organization based access control," in Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003. IEEE 4th International Workshop on. IEEE, 2003, pp. 120-131.
-
(2003)
Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003. IEEE 4th International Workshop On. IEEE
, pp. 120-131
-
-
Kalam, A.A.E.1
Baida, R.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miege, A.7
Saurel, C.8
Trouessin, G.9
-
14
-
-
0030086382
-
Role-based access control models yz
-
R. S. Sandhu, E. J. Coynek, H. L. Feinsteink, and C. E. Youmank, "Role-based access control models yz," IEEE computer, vol. 29, no. 2, pp. 38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coynek, E.J.2
Feinsteink, H.L.3
Youmank, C.E.4
-
15
-
-
47649083260
-
Modeling contextual security policies
-
F. Cuppens and N. Cuppens-Boulahia, "Modeling contextual security policies," International Journal of Information Security, vol. 7, no. 4, pp. 285-305, 2008.
-
(2008)
International Journal of Information Security
, vol.7
, Issue.4
, pp. 285-305
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
-
16
-
-
33746441974
-
Inheritance hierarchies in the or-bac model and application in a network environment
-
F. Cuppens, N. Cuppens-Boulahia, and A. Miege, "Inheritance hierarchies in the or-bac model and application in a network environment," Proc. Foundations of Computer Security (FCS04), pp. 41-60, 2004.
-
(2004)
Proc. Foundations of Computer Security (FCS04)
, pp. 41-60
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Miege, A.3
-
17
-
-
60349098718
-
Interoperability of context based system policies using o2o contract
-
C. Coma, N. Cuppens-Boulahia, F. Cuppens, and A. R. Cavalli, "Interoperability of context based system policies using o2o contract," in Signal Image Technology and Internet Based Systems, 2008. SITIS'08. IEEE International Conference on. IEEE, 2008, pp. 137-144.
-
(2008)
Signal Image Technology and Internet Based Systems, 2008. SITIS'08. IEEE International Conference On. IEEE
, pp. 137-144
-
-
Coma, C.1
Cuppens-Boulahia, N.2
Cuppens, F.3
Cavalli, A.R.4
-
20
-
-
84923034388
-
-
"Inter-trust project." [Online]. Available: http: //www.inter-trust.eu/
-
-
-
-
21
-
-
84923006924
-
-
Scenario about one use case its s services access control and negotiation management Tech. Rep., 2014
-
"Scenario about one use case its s services access control and negotiation management," Tech. Rep., 2014
-
-
-
|