-
1
-
-
0030678389
-
A logic for state transformations in authorization policies
-
Rockport MA, USA, IEEE Computer Society Press
-
Bai, Y., and Varadharajan, V.’A logic for state transformations in authorization policies", Proceedings of the 10th IEEE Computer Security Foundations Workshop, Rockport MA, USA, 1997, IEEE Computer Society Press, pp. 173-183.
-
(1997)
Proceedings of the 10Th IEEE Computer Security Foundations Workshop
, pp. 173-183
-
-
Bai, Y.1
Varadharajan, V.2
-
2
-
-
0024663219
-
The Chinese Wall security policy
-
Los Alamitos CA, USA
-
Brewer, D. and Nash, M. ‘The Chinese Wall security policy’. Proceedings of the IEEE Symposium on Security and Privacy, Los Alamitos CA, USA, 1989, pp. 206-214.
-
(1989)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 206-214
-
-
Brewer, D.1
Nash, M.2
-
3
-
-
0002357382
-
Role based access controls
-
Baltimore MD, USA
-
Ferraiolo, D., and Kuhn, R. ‘Role based access controls’, Proceedings of the 15th NISTNCSC National Computer Security Conference, Baltimore MD, USA, 1992, pp. 554-563.
-
(1992)
Proceedings of the 15Th NISTNCSC National Computer Security Conference
, pp. 554-563
-
-
Ferraiolo, D.1
Kuhn, R.2
-
5
-
-
0141977659
-
Issues in the Design of a Language for Role Based Access Control
-
M. Hitchens & V. Varadharajan, Issues in the Design of a Language for Role Based Access Control., ICICS.99, pp. 22-38.
-
ICICS.99
, pp. 22-38
-
-
Hitchens, M.1
Varadharajan, V.2
-
6
-
-
0030677524
-
A logical language for expressing authorizations
-
Oakland CA, USA
-
Jajodia, S., Smarati, P., and Subrahmanian, V.: "A logical language for expressing authorizations", Proceedings of the IEEE Symposium on Security and Information Privacy, Oakland CA, USA, 1997, pp. 31-42.
-
(1997)
Proceedings of the IEEE Symposium on Security and Information Privacy
, pp. 31-42
-
-
Jajodia, S.1
Smarati, P.2
Subrahmanian, V.3
-
7
-
-
0023829318
-
Implementing commercial data integrity with secure Capabilities
-
Oakland CA, USA
-
Karger, P.: “Implementing commercial data integrity with secure Capabilities’, Proceedings of the IEEE Symposium on Security and Privacy, Oakland CA, USA, 1988, pp. 130-39.
-
(1988)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 130-139
-
-
Karger, P.1
-
9
-
-
0028699105
-
Role-based access control: A Multi- Dimensional View
-
Orlando FL, USA, IEEE CS Press
-
Sandhu, R., Coyne, E., Feinstein, H., and Youman, C.: “Role-based access control: A Multi- Dimensional View", 10th Annual Computer Security Applications Conference, Orlando FL, USA, 1994, IEEE CS Press, pp. 54-61.
-
(1994)
10Th Annual Computer Security Applications Conference
, pp. 54-61
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
10
-
-
33746976313
-
A three tier architecture for role-based access control
-
Baltimore MD, USA
-
Sandhu, R., and Feinstein, H.: “A three tier architecture for role-based access control’. Proceedings of the 17th NIST-NCSC National Computer Security Conference, Baltimore MD, USA, 1994, pp. 34-46.
-
(1994)
Proceedings of the 17Th NIST-NCSC National Computer Security Conference
, pp. 34-46
-
-
Sandhu, R.1
Feinstein, H.2
-
11
-
-
0030086382
-
Role based access control models
-
Sandhu, R., Coyne, E.J., and Feinstein, H.L., “Role based access control models’, IEEE Computer, 1996, 29, (2), pp. 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
-
13
-
-
0030644642
-
Separation of duty in role-based environments
-
Rockport MA, USA, IEEE CS Press
-
Simon, R., and Zurko, M.: “Separation of duty in role-based environments’. Proceedings of the 10th IEEE Computer Security Foundations Workshop, Rockport MA, USA, IEEE CS Press, 1997, pp. 183-94.
-
(1997)
Proceedings of the 10Th IEEE Computer Security Foundations Workshop
, pp. 183-194
-
-
Simon, R.1
Zurko, M.2
-
14
-
-
0346004750
-
Joint action based authorisation schemes’
-
July
-
Varadharajan, V. and Allen, P.: ’Joint action based authorisation schemes’, ACM Operating Systems Review, volume 30, (3), July 1996, pp. 32-45.
-
(1996)
ACM Operating Systems Review
, vol.30
, Issue.3
, pp. 32-45
-
-
Varadharajan, V.1
Allen, P.2
-
15
-
-
84944112469
-
Authorization for enterprise wide distributed systems: Design and application
-
Scottsdale AZ, USA
-
Varadharajan, V., Crall, C., and Pato, J.: “Authorization for enterprise wide distributed systems: Design and application", Proceedings of the IEEE Computer Security Applications Conference, ACSAC’98, Scottsdale AZ, USA, 1998.
-
(1998)
Proceedings of the IEEE Computer Security Applications Conference, ACSAC’98
-
-
Varadharajan, V.1
Crall, C.2
Pato, J.3
-
16
-
-
0032629460
-
A user-centered, modular authorization service built on an RBAC foundation
-
Oakland CA, USA
-
Zurko, M., Simon, R., and Sanfilippo, T.: “A user-centered, modular authorization service built on an RBAC foundation’, Proceedings of the IEEE Symposium on Security and Privacy, Oakland CA, USA, 1999. pp. 57-71.
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 57-71
-
-
Zurko, M.1
Simon, R.2
Sanfilippo, T.3
|