-
1
-
-
84944039217
-
Translating role-based access control policy within context
-
volume 1995 of Lecture Notes in Computer Science, Springer-Verlag
-
J. Bacon, M. Lloyd, and K. Moody. Translating role-based access control policy within context. In Proceedings of Policy 2001, Policies for Distributed Systems and Networks, volume 1995 of Lecture Notes in Computer Science, pages 107–119. Springer-Verlag, 2001
-
(2001)
Proceedings of Policy 2001, Policies for Distributed Systems and Networks
, pp. 107-119
-
-
Bacon, J.1
Lloyd, M.2
Moody, K.3
-
2
-
-
0033897228
-
Generic support for distributed applications
-
March
-
J. Bacon, K. Moody, J. Bates, R. Hayton, C. Ma, A. McNeil, O. Seidel, and M. Spiteri. Generic support for distributed applications. IEEE Computer, pages 68–76, March 2000.
-
(2000)
IEEE Computer
, pp. 68-76
-
-
Bacon, J.1
Moody, K.2
Bates, J.3
Hayton, R.4
Ma, C.5
McNeil, A.6
Seidel, O.7
Spiteri, M.8
-
5
-
-
0141876269
-
Generalized role-based access control for securing future applications
-
Baltimore, MD, October
-
M. J. Covington, M. J. Moyer, and M. Ahamad. Generalized role-based access control for securing future applications. In 23rd National Information Systems Security Conference, Baltimore, MD, October 2000.
-
(2000)
23Rd National Information Systems Security Conference
-
-
Covington, M.J.1
Moyer, M.J.2
Ahamad, M.3
-
6
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate intranet
-
Feb
-
D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn. A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security, 2(1):34–64, Feb 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 34-64
-
-
Ferraiolo, D.F.1
Barkley, J.F.2
Kuhn, D.R.3
-
7
-
-
0031365182
-
Role templates for content-based access control
-
Fairfax, Virginia, November
-
L. Giuri and P. Iglio. Role templates for content-based access control. In Second ACM Workshop on Role-Based Access Control, pages 153–159, Fairfax, Virginia, November 1997.
-
(1997)
Second ACM Workshop on Role-Based Access Control
, pp. 153-159
-
-
Giuri, L.1
Iglio, P.2
-
9
-
-
0031650454
-
OASIS: Access Control in an Open, Distributed Environment
-
Oakland, CA, May, IEEE
-
R. Hayton, J. Bacon, and K. Moody. OASIS: Access Control in an Open, Distributed Environment. In Proceedings of IEEE Symposium on Security and Privacy, pages 3–14, Oakland, CA, May 1998. IEEE.
-
(1998)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 3-14
-
-
Hayton, R.1
Bacon, J.2
Moody, K.3
-
10
-
-
84944075856
-
An architecture for distributed OASIS services
-
volume 1795 of Lecture Notes in Computer Science
-
J. Hine, W. Yao, J. Bacon, and K. Moody. An architecture for distributed OASIS services. In Middleware 2000, volume 1795 of Lecture Notes in Computer Science, pages 104–120, 2000.
-
(2000)
Middleware 2000
, pp. 104-120
-
-
Hine, J.1
Yao, W.2
Bacon, J.3
Moody, K.4
-
12
-
-
0010573970
-
Access rights administration in role-based security systems
-
J. Biskup, M. Morgernstern, and C. Landwehr, editors
-
M. Nyanchama and S. Osborn. Access rights administration in role-based security systems. In J. Biskup, M. Morgernstern, and C. Landwehr, editors, Database Security VIII: Status and Prospects, 1995.
-
(1995)
Database Security VIII: Status and Prospects
-
-
Nyanchama, M.1
Osborn, S.2
-
15
-
-
0030086382
-
Role-Based Access Control Models
-
Feb
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-Based Access Control Models. Computer, 29(2):38–47, Feb. 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
16
-
-
0030644642
-
Separation of duty in role-based environments
-
Rockport, Massachusetts, June
-
R. T. Simon and M. E. Zurko. Separation of duty in role-based environments. In 10th IEEE Computer Security Foundations Workshop, pages 183–194, Rockport, Massachusetts, June 1997.
-
(1997)
10Th IEEE Computer Security Foundations Workshop
, pp. 183-194
-
-
Simon, R.T.1
Zurko, M.E.2
-
17
-
-
0035790651
-
A Model of OASIS Role-Based Access Control and its Support for Active Security
-
Chantilly, VA, May
-
W. Yao, K. Moody, J. Bacon. A Model of OASIS Role-Based Access Control and its Support for Active Security. In Proceedings, Sixth ACM Symposium on Access Control Models and Technologies (SACMAT), pages 171–181, Chantilly, VA, May 2001
-
(2001)
Proceedings, Sixth ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 171-181
-
-
Yao, W.1
Moody, K.2
Bacon, J.3
|