-
3
-
-
84944792110
-
TRBAC: A Temporal Role-Based Access Control Model
-
Aug, to appear
-
Bertino, E., Bonatti, P., and Ferrari, E.: TRBAC: A Temporal Role-Based Access Control Model. ACM Transactions on Info. and System Security, 4:3, (Aug. 2001) to appear
-
(2001)
ACM Transactions on Info. and System Security
, vol.4
, Issue.3
-
-
Bertino, E.1
Bonatti, P.2
Ferrari, E.3
-
4
-
-
0001809810
-
The Ponder Policy Specification Language
-
Springer LNCS 1995
-
Damianou, N., Dulay, N., Lupu, E., and Sloman, M.: The Ponder Policy Specification Language. Int. Workshop on Policy, Jan. 2001, Springer LNCS 1995
-
(2001)
Int. Workshop on Policy
, vol.Jan
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
6
-
-
84992227458
-
A Proposed Standard for Role-Based Access Control
-
August, to appear
-
Ferraiolo, D.F., Sandhu, R., Gavrila, D., Kuhn, D.R. and Chandramouli, R.: A Proposed Standard for Role-Based Access Control. ACM Transactions on Information and System Security, V. 4, No 3, (August 2001) to appear
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, D.3
Kuhn, D.R.4
Chandramouli, R.5
-
7
-
-
0033724294
-
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
-
OaklandMay
-
Herzberg, A., Mass, Y., Mihaeli, J., Naor, D. and Ravid, Y.: Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. IEEE Symposium on Security and Privacy, Oakland (May 2000)
-
(2000)
IEEE Symposium on Security and Privacy
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
Naor, D.4
Ravid, Y.5
-
8
-
-
0039848243
-
Managing trust between collaborating companies using outsourced role based access control
-
Hildmann, T. and Barholdt, J.: Managing trust between collaborating companies using outsourced role based access control. In Proc. of 4th ACM Workshop on Role-Based Access Control. 1999 (105–111)
-
(1999)
Proc. Of 4Th ACM Workshop on Role-Based Access Control
, pp. 105-111
-
-
Hildmann, T.1
Barholdt, J.2
-
9
-
-
1942443370
-
Tower: A Language for Role Based Access Control
-
Bristol, UK, Springer LNCS 1995
-
Hitchens, M. and Varadharajan, V.: Tower: A Language for Role Based Access Control. Int. Workshop on Policy, Bristol, UK, January 2001, Springer LNCS 1995
-
(2001)
Int. Workshop on Policy
, vol.January
-
-
Hitchens, M.1
Varadharajan, V.2
-
11
-
-
0242528825
-
On the Increasing Importance of Constraints
-
Fairfax, Virginia (Oct. 28–2 9
-
Jaeger, T.: On the Increasing Importance of Constraints. Proc. 4th ACM Workshop on Role- Based Access Control, Fairfax, Virginia (Oct. 28–2 9, 1999) 33–42
-
(1999)
Proc. 4Th ACM Workshop on Role- Based Access Control
, pp. 33-42
-
-
Jaeger, T.1
-
13
-
-
84884311106
-
Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies
-
May
-
Osborn, S., Sandhu, R. and Munawer, Q.: Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Trans. on Information and System Security, V. 3, No 2, (May 2000) 85–106
-
(2000)
ACM Trans. On Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
14
-
-
0030086382
-
Role-Based Access Control Models
-
Feb
-
Sandhu, R., Coyne, E., Feinstein, H. and Youman, C.: Role-Based Access Control Models. IEEE Computer, V. 29, No 2. (Feb. 1996) 38–47
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
16
-
-
0001549660
-
The ARBAC97 Model for Role-Based Administration of Roles
-
Feb. 99
-
Sandhu, R., Bhamidipati, V. and Munawer, Q.: The ARBAC97 Model for Role-Based Administration of Roles. ACM Trans. on Info. and System Security, 2:1, (Feb. 99) 105–135
-
ACM Trans. On Info. and System Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
17
-
-
0033645573
-
Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way
-
Berlin. (July 26–2 8
-
Sandhu, R.: Engineering Authority and Trust in Cyberspace: The OM-AM and RBAC Way. Proc. 5th ACM Workshop on RBAC, Berlin. (July 26–2 8, 2000) 111–119
-
(2000)
Proc. 5Th ACM Workshop on RBAC
, pp. 111-119
-
-
Sandhu, R.1
-
19
-
-
0002841051
-
Task-based Authorization Controls (TBAC): Models for Active and Enterprise-Oriented Authorization Management
-
Chapman & Hall
-
Thomas, R. and Sandhu, R.: Task-based Authorization Controls (TBAC): Models for Active and Enterprise-Oriented Authorization Management. In Database Security XI: Status and Prospects, Chapman & Hall 1998. 262–275
-
(1998)
Database Security XI: Status and Prospects
, pp. 262-275
-
-
Thomas, R.1
Sandhu, R.2
|