-
3
-
-
0035791550
-
On specifying security policies for web documents with an XML-based language
-
Chantilly, Virginia, USA, May
-
Elisa Bertino, Silvana Castano, and Elena Ferrari. On specifying security policies for web documents with an XML-based language. In Proceedings of the 6th ACMSymposium on Access Control Models and Technologies, pages 57-74, Chantilly, Virginia, USA, May 2001
-
(2001)
Proceedings of the 6th ACMSymposium on Access Control Models and Technologies
, pp. 57-74
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
-
5
-
-
0035791053
-
Securing context-aware applications using environment roles
-
Chantilly, Virginia, USA, May
-
Michael J. Covington, Wende Long, Srividhya Srinivasan, Anind Dey, Mustaque Ahamad, and Gregory Abowd. Securing context-aware applications using environment roles. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, pages 10-20, Chantilly, Virginia, USA, May 2001
-
(2001)
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies
, pp. 10-20
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dey, A.4
Ahamad, M.5
Abowd, G.6
-
6
-
-
0141876269
-
Generalized role-based access control for securing future applications
-
Baltimore, Maryland, USA, October
-
Michael J. Covington, Matthew J. Moyer, and Mustaque Ahamad. Generalized role-based access control for securing future applications. In Proceedings of the 23rd National Information Systems Security Conference (NISSC), pages 40-51, Baltimore, Maryland, USA, October 2000
-
(2000)
Proceedings of the 23rd National Information Systems Security Conference (NISSC)
, pp. 40-51
-
-
Covington, M.J.1
Moyer, M.J.2
Ahamad, M.3
-
7
-
-
85001697848
-
A finegrained access control system for XML documents
-
May
-
Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, and Pierangela Samarati. A finegrained access control system for XML documents. ACM Transactions on Information and System Security, 5(2):169-202, May 2002
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.2
, pp. 169-202
-
-
Damiani, E.1
De Capitani di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
8
-
-
0002263079
-
A context-based infrastructure for smart environments
-
Dublin, Ireland, December
-
Anind K. Dey, Daniel Salber, and Gregory D. Abowd. A context-based infrastructure for smart environments. In Proceedings of the 1st International Workshop on Managing Interactions in Smart Environments (MANSE '99), Dublin, Ireland, pages 114-128, December 1999
-
(1999)
Proceedings of the 1st International Workshop on Managing Interactions in Smart Environments (MANSE '99)
, pp. 114-128
-
-
Dey, A.K.1
Salber, D.2
Abowd, G.D.3
-
11
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
Amir Herzberg, Yosi Mass, and Joris Mihaeli. Access control meets public key infrastructure, or: Assigning roles to strangers. In Proceedings of the IEEE Symposium on Security and Privacy, pages 2-14, 2000
-
(2000)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
-
16
-
-
84892293750
-
-
Sun Microsystems, Software Development Kit
-
Sun Microsystems. Java 2 standard edition. Software Development Kit. http://java.sun.com
-
Java 2 Standard Edition
-
-
-
19
-
-
19744362258
-
The future of integrated design of ubiquitous computing in combined real & virtual worlds
-
ACM
-
Daniel M. Russell and Mark Weiser. The future of integrated design of ubiquitous computing in combined real & virtual worlds. In Communications of the ACM, page 275. ACM, 1998
-
(1998)
Communications of the ACM
, pp. 275
-
-
Russell, D.M.1
Weiser, M.2
-
20
-
-
0030086382
-
Role based access control models
-
February
-
Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role based access control models. In IEEE Computer, volume 2, February 1996
-
(1996)
IEEE Computer
, vol.2
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
21
-
-
0024714097
-
Integrating security in a large distributed system
-
August
-
M. Satyanarayanan. Integrating security in a large distributed system. ACM Transactions on Computer Systems, 7:247-280, August 1989
-
(1989)
ACM Transactions on Computer Systems
, vol.7
, pp. 247-280
-
-
Satyanarayanan, M.1
|