-
1
-
-
84943550598
-
-
Antonioletti, M., Berry, D., Chervenak, A., Kunszt, P., Luniewski, A., Laws, S., Morgan, M.: Ogsa data architecture v0.6.6. Technical report, Open Grid Forum (2007), http://forge.gridforum.org/sf/go/doc13635?nav=1
-
(2007)
Ogsa Data Architecture V0.6.6. Technical Report, Open Grid Forum
-
-
Antonioletti, M.1
Berry, D.2
Chervenak, A.3
Kunszt, P.4
Luniewski, A.5
Laws, S.6
Morgan, M.7
-
2
-
-
52149101155
-
Controlling usage in business process workflows through fine-grained security policies
-
Aziz, B., Arenas, A., Martinelli, F., Matteucci, I., Mori, P.: Controlling usage in business process workflows through fine-grained security policies. In: Springer (ed.) 5th International Conference on Trust, Privacy& Security in Digital Business (2008)
-
(2008)
Springer (Ed.) 5Th International Conference on Trust, Privacy& Security in Digital Business
-
-
Aziz, B.1
Arenas, A.2
Martinelli, F.3
Matteucci, I.4
Mori, P.5
-
4
-
-
33744984347
-
An overview of s-ogsa: A reference semantic grid architecture
-
Corcho, ó., Alper, P., Kotsiopoulos, I., Missier, P., Bechhofer, S., Goble, C.A.: An overview of s-ogsa: A reference semantic grid architecture. J. Web Sem. 4(2), 102–115 (2006)
-
(2006)
J. Web Sem
, vol.4
, Issue.2
, pp. 102-115
-
-
Corcho, ó.1
Alper, P.2
Kotsiopoulos, I.3
Missier, P.4
Bechhofer, S.5
Goble, C.A.6
-
5
-
-
84992227458
-
Proposed nist standard for role-based access control
-
Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Transactions on Information and System Security (TISSEC) (3), 224–274 (2001)
-
(2001)
ACM Transactions on Information and System Security (TISSEC) (3)
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
6
-
-
84943553708
-
Security of distributed data management. Technical Report EGEE-TR-2006-003
-
Frohner, A., Kunszt, P.Z., Brito da Rocha, R., Laure, E.: Security of distributed data management. Technical Report EGEE-TR-2006-003. EGEE-TR-2006-DATASEC (2006)
-
(2006)
EGEE-TR-2006-DATASEC
-
-
Frohner, A.1
Kunszt, P.Z.2
Da Brito Rocha, R.3
Laure, E.4
-
8
-
-
84943516529
-
Healthgrid white paper. Technical Report HealthGrid-White Paper-Draft v.1.1-5
-
HealthGrid: Healthgrid white paper. Technical Report HealthGrid-White Paper-Draft v.1.1-5, HealthGrid (2004)
-
(2004)
Healthgrid
-
-
-
9
-
-
40249090155
-
Usage control requirements in mobile and ubiquitous computing applications
-
IEEE Computer Society, Los Alamitos
-
Hilty, M., Pretschner, A., Schaefer, C., Walter, T.: Usage control requirements in mobile and ubiquitous computing applications. In: ICSNC 2006: Proceedings of the International Conference on Systems and Networks Communication, p. 27. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
CSNC 2006: Proceedings of the International Conference on Systems and Networks Communication
, pp. 27
-
-
Hilty, M.1
Pretschner, A.2
Schaefer, C.3
Walter, T.4
-
10
-
-
51349163602
-
A Model for Usage Control in GRID systems
-
Martinelli, F., Mori, P.: A Model for Usage Control in GRID systems. In: Grid-STP 2007, International Conference on Security, Trust and Privacy in Grid Systems. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
Grid-Stp 2007, International Conference on Security, Trust and Privacy in Grid Systems. IEEE Computer Society, Los Alamitos
-
-
Martinelli, F.1
Mori, P.2
-
11
-
-
33845332032
-
Towards continuous usage control on grid computational services
-
Martinelli, F., Mori, P., Vaccarelli, A.: Towards continuous usage control on grid computational services. In: ICAS/ICNS, p. 82 (2005)
-
(2005)
ICAS/ICNS
, pp. 82
-
-
Martinelli, F.1
Mori, P.2
Vaccarelli, A.3
-
12
-
-
34547666127
-
Data Grid Management Systems
-
Moore, R., Jagatheesan, A., Rajasekar, A., Wan, M., Schroeder, W.: Data Grid Management Systems. In: Proceedings of the 21st IEEE/NASA Conference on Mass Storage Systems and Technologies, Maryland, USA (2004)
-
(2004)
Proceedings of the 21St IEEE/NASA Conference on Mass Storage Systems and Technologies, Maryland, USA
-
-
Moore, R.1
Jagatheesan, A.2
Rajasekar, A.3
Wan, M.4
Schroeder, W.5
-
16
-
-
37249079159
-
Usage control in service-oriented architectures
-
In: Lambrinoudakis, C., Pernul, G., Tjoa, A.M. (eds.), Springer, Heidelberg
-
Pretschner, A., Massacci, F., Hilty, M.: Usage control in service-oriented architectures. In: Lambrinoudakis, C., Pernul, G., Tjoa, A.M. (eds.) TrustBus 2007. LNCS, vol. 4657, pp. 83–93. Springer, Heidelberg (2007)
-
(2007)
Trustbus 2007. LNCS
, vol.4657
, pp. 83-93
-
-
Pretschner, A.1
Massacci, F.2
Hilty, M.3
-
17
-
-
35248873795
-
Usage control: A vision for next generation access control
-
In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.), Springer, Heidelberg
-
Sandhu, R.S., Park, J.: Usage control: A vision for next generation access control. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol. 2776, pp. 17–31. Springer, Heidelberg (2003)
-
(2003)
MMM-ACNS 2003. LNCS
, vol.2776
, pp. 17-31
-
-
Sandhu, R.S.1
Park, J.2
-
18
-
-
79960423676
-
-
Stagni, F., Arenas, A.E., Aziz, B.: On usage control in data grids. Technical Report TR-0154, Institute on Knowledge and Data Management, CoreGRID-Network of Excellence (2008)
-
(2008)
On Usage Control in Data Grids. Technical Report TR-0154, Institute on Knowledge and Data Management, Coregrid-Network of Excellence
-
-
Stagni, F.1
Arenas, A.E.2
Aziz, B.3
-
19
-
-
84943539832
-
The cclrc scientific metadata model: A metadata model for the exploitation of scientific studies and associated data
-
Sufi, S., Matthews, B.M.: The cclrc scientific metadata model: a metadata model for the exploitation of scientific studies and associated data. In: Knowledge and Data Management in Grids (2005), http://epubs.cclrc.ac.uk/work-details?w=34195
-
(2005)
Knowledge and Data Management in Grids
-
-
Sufi, S.1
Matthews, B.M.2
-
20
-
-
84943570419
-
Egee global security architecture for web and legacy services. Deliverable EGEEJRA3-TEC-487004-DJRA3.1-v1-1
-
team, E.J.: Egee global security architecture for web and legacy services. deliverable EGEEJRA3-TEC-487004-DJRA3.1-v1-1, EGEE JRA3 (2004)
-
(2004)
EGEE JRA3
-
-
Team, E.J.1
-
21
-
-
44949120587
-
Virtual organization management across middleware boundaries
-
IEEE Computer Society, Washington
-
Venturi, V., Stagni, F., Gianoli, A., Ceccanti, A., Ciaschini, V.: Virtual organization management across middleware boundaries. In: E-SCIENCE 2007: Proceedings of the Third IEEE International Conference on e-Science and Grid Computing, pp. 545–552. IEEE Computer Society, Washington (2007), http://dx.doi.org/10.1109/E-SCIENCE.2007.84
-
(2007)
E-SCIENCE 2007: Proceedings of the Third IEEE International Conference on E-Science and Grid Computing
, pp. 545-552
-
-
Venturi, V.1
Stagni, F.2
Gianoli, A.3
Ceccanti, A.4
Ciaschini, V.5
-
22
-
-
33745767064
-
A taxonomy of data grids for distributed data sharing, management, and processing
-
Venugopal, S., Buyya, R., Ramamohanarao, K.: A taxonomy of data grids for distributed data sharing, management, and processing. ACM Comput. Surv. 38(1), 3 (2006), http://dx.doi.acm.org/10.1145/1132952.1132955
-
(2006)
ACM Comput. Surv
, vol.38
, Issue.1
, pp. 3
-
-
Venugopal, S.1
Buyya, R.2
Ramamohanarao, K.3
-
23
-
-
34548043501
-
Towards a vmm-based usage control framework for os kernel integrity protection
-
ACM, New York
-
Xu, M., Jiang, X., Sandhu, R., Zhang, X.: Towards a vmm-based usage control framework for os kernel integrity protection. In: SACMAT 2007: Proceedings of the 12th ACM symposium on Access control models and technologies, pp. 71–80. ACM, New York (2007), http://doi.acm.org/10.1145/1266840.1266852
-
(2007)
SACMAT 2007: Proceedings of the 12Th ACM Symposium on Access Control Models and Technologies
, pp. 71-80
-
-
Xu, M.1
Jiang, X.2
Sandhu, R.3
Zhang, X.4
-
24
-
-
60349107258
-
An ad hoc trust inference model for flexible and controlled information sharing
-
Yao, D.: An ad hoc trust inference model for flexible and controlled information sharing. In: Security and Management, pp. 555–561 (2008)
-
(2008)
Security and Management
, pp. 555-561
-
-
Yao, D.1
-
25
-
-
38949184514
-
Toward a usage-based security framework for collaborative computing systems
-
Zhang, X., Nakae, M., Covington, M.J., Sandhu, R.: Toward a usage-based security framework for collaborative computing systems. ACM Trans. Inf. Syst. Secur. 11(1), 1–36 (2008), http://doi.acm.org/10.1145/1330295.1330298
-
(2008)
ACM Trans. Inf. Syst. Secur
, vol.11
, Issue.1
, pp. 1-36
-
-
Zhang, X.1
Nakae, M.2
Covington, M.J.3
Sandhu, R.4
-
26
-
-
33745450500
-
Formal Model and Policy Specification of Usage Control
-
Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal Model and Policy Specification of Usage Control. ACM Transactions on Information and System Security 8(4), 351–387 (2005), http://doi.acm.org/10.1145/1108906.1108908
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.4
, pp. 351-387
-
-
Zhang, X.1
Parisi-Presicce, F.2
Sandhu, R.3
Park, J.4
|