-
1
-
-
0002848811
-
An Approach for the Specification and Enforcement of Authorization Constraints in Workflow Management Systems
-
February
-
Bertino E., Ferrari E. and Atluri V. An Approach for the Specification and Enforcement of Authorization Constraints in Workflow Management Systems, ACM Transactions on Information Systems Security, February 1999, Vol 1, No. 1
-
(1999)
ACM Transactions on Information Systems Security
, vol.1
, Issue.1
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
2
-
-
0035594917
-
Managing Workflow Authorization Constraints through Active Database Technologh
-
September
-
Castano, S., Casati F., and Fugini M. Managing Workflow Authorization Constraints through Active Database Technologh, Information Systems Frontiers, 3(3) September 2001.
-
(2001)
Information Systems Frontiers
, vol.3
, Issue.3
-
-
Castano, S.1
Casati, F.2
Fugini, M.3
-
3
-
-
0036161253
-
Authorization and Access Control of Application Data in Workflow Systems
-
January
-
Shengli Wu, Amit Sheth John Miller, Zongwei Luo. Authorization and Access Control of Application Data in Workflow Systems, Intelligent Information Systems, January 2002, pp. 71-94
-
(2002)
Intelligent Information Systems
, pp. 71-94
-
-
Wu, S.1
Sheth, A.2
Miller, J.3
Luo, Z.4
-
4
-
-
0001619596
-
Flexible Support for Multiple Access Control Policies
-
June
-
S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian, Flexible Support for Multiple Access Control Policies, in ACM Transactions on Database Systems, vol. 26, n. 2, June 2001, pp 214-260
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
5
-
-
0034446895
-
A Modular Approach to Composing Access Control Policies
-
Athens Greece, Nov. ACM Press
-
P. Bonatti, S de Capitani di, P. Samarati, A Modular Approach to Composing Access Control Policies, In Proceedings of the 7th ACM conference on Computer and communications security, page 164-173, Athens Greece, Nov 2000. ACM Press
-
(2000)
Proceedings of the 7th ACM conference on Computer and communications security
, pp. 164-173
-
-
Bonatti, P.1
de di Capitani, S.2
Samarati, P.3
-
6
-
-
84974750564
-
Authorizations in distributed systems: A new approach
-
T. Y. C. Woo and S. S. Lam, Authorizations in distributed systems: A new approach. Journal of Computer Security, 2(2, 3): 107-136, 1993
-
(1993)
Journal of Computer Security
, vol.2
, Issue.2-3
, pp. 107-136
-
-
Woo, T.Y.C.1
Lam, S.S.2
-
7
-
-
2342606346
-
An Authorization Model for a Public Key Management Service
-
November
-
P. Samarati, M. K. Reiter, S. Jajodia, An Authorization Model for a Public Key Management Service, in ACM Transactions on Information and System Security (TISSEC), vol. 4, n. 4, November 2001, pp. 453-482
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.4
, pp. 453-482
-
-
Samarati, P.1
Reiter, M.K.2
Jajodia, S.3
-
9
-
-
0030086382
-
Role-based access control models
-
February
-
R. Sandhu, E. Coyne, H. L, Feinstein, C. E. Youman, Role-based access control models. IEEE Computer, pages 38-47, February 1996
-
(1996)
IEEE Computer
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.L.3
Youman, C.E.4
-
10
-
-
0001071507
-
Strauss, Compliance checking in the policymaker trust management system
-
LNCS, Springer-Verlag
-
Blaze, Feigenbaum, Strauss, Compliance checking in the policymaker trust management system. In FC: International Conference on Financial Cryptography. LNCS, Springer-Verlag, 1998
-
(1998)
FC: International Conference on Financial Cryptography
-
-
Blaze, F.1
-
11
-
-
85084161655
-
Unified support for heterogeneous security policies in distributed systems
-
Berkeley, Jan. 26-29, Usenix Association
-
N. H. Minsky, V. Ungureanu, Unified support for heterogeneous security policies in distributed systems. In proceeding of the 7th USENIX Security Symposium (SECURITY-98), pages 131-142, Berkeley, Jan. 26-29, 1998. Usenix Association
-
(1998)
Proceeding of the 7th USENIX Security Symposium (SECURITY-98)
, pp. 131-142
-
-
Minsky, N.H.1
Ungureanu, V.2
|