-
1
-
-
0027667638
-
A Calculus For Access Control in Distributed Systems
-
Sept.
-
Abadi, M., Bubrows, M., Lampson, B., and Plotkin, G. 1993. A Calculus For Access Control in Distributed Systems. Acm Trans. Program. Lang. Syst. 15, 4 (Sept.), 706-734.
-
(1993)
Acm Trans. Program. Lang. Syst.
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Bubrows, M.2
Lampson, B.3
Plotkin, G.4
-
2
-
-
85024272843
-
Special Section: How To Use Key Escrow
-
ACM
-
ACM. 1996. Special Section: How To Use Key Escrow. Commun. Acm 39, 3, 32-60.
-
(1996)
Commun. Acm
, vol.39
, Issue.3
, pp. 32-60
-
-
-
3
-
-
0029700344
-
Decentralized Trust Management
-
(Oakland, Ca, May)
-
Blaze, M., Feigenbaum, J., and Lacy, J. 1997. Decentralized Trust Management. In Proceedings of the 1996 Ieee Symposium on Security and Privacy (Oakland, Ca, May), 164-173.
-
(1997)
Proceedings of the 1996 Ieee Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
6
-
-
0001619596
-
Flexible Support For Multiple Access Control Policies
-
June
-
Jajodia, S., Samarati, P., Sapino, M. L., and Subrahmanian, V. S. 1992. Flexible Support For Multiple Access Control Policies. Acm Trans. Database Syst. 26, 2 (June), 214-260.
-
(1992)
Acm Trans. Database Syst.
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
7
-
-
84976834054
-
Authentication in Distributed Systems: Theory and Practice
-
(Nov.)
-
Lampson, B., Abadi, M., Burrows, M., and Wobber, E. 1992. Authentication in Distributed Systems: Theory and Practice. Acm Trans. Comput. Syst. 10, 4 (Nov.), 265-310.
-
(1992)
Acm Trans. Comput. Syst.
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
8
-
-
0032671779
-
A Logic-Based Knowledge Representation For Authorization With Delegation
-
(Mordano, Italy, June)
-
Li, N., Feigenbaum, J., and Grosof, B. 1999. A Logic-Based Knowledge Representation For Authorization With Delegation. In Proceedings of the 12Th Computer Security Foundations Workshop (Mordano, Italy, June), 162-174.
-
(1999)
Proceedings of the 12Th Computer Security Foundations Workshop
, pp. 162-174
-
-
Li, N.1
Feigenbaum, J.2
Grosof, B.3
-
11
-
-
85028758941
-
Fair Public-Key Cryptosystems
-
E. Brickell Ed., Lncs 740 Springer-Verlag
-
Micali, S. 1992. Fair Public-Key Cryptosystems. In Advances in Cryptology-Proceedings of Crypto'92, E. Brickell Ed., Lncs 740, 113-138. Springer-Verlag.
-
(1992)
Advances in Cryptology-Proceedings of Crypto'92
, pp. 113-138
-
-
Micali, S.1
-
13
-
-
85024286826
-
-
(Feb.).
-
Inf. Syst. Secur. 4, 1 (Feb.).
-
Inf. Syst. Secur.
, vol.4
, Issue.1
-
-
-
14
-
-
84949486483
-
Binding Identities and Attributes Using Digitally Signed Certificates
-
(New Orleans, La, Dec.)
-
Park, J. and Sandhu, R. 2000. Binding Identities and Attributes Using Digitally Signed Certificates. In Proceedings of the 16Th Annual Computer Security Applications Conference (New Orleans, La, Dec.), 120-127.
-
(2000)
Proceedings of the 16Th Annual Computer Security Applications Conference
, pp. 120-127
-
-
Park, J.1
Sandhu, R.2
-
15
-
-
0030376048
-
The Key Management Service
-
Reiter, M. K., Franklin, M. K., Lacy, J. B., and Wright, R. N. 1996. The ^ Key Management Service. J. Comput. Secur. 4, 4, 267-287.
-
(1996)
J. Comput. Secur.
, vol.4
, Issue.4
, pp. 267-287
-
-
Reiter, M.K.1
Franklin, M.K.2
Lacy, J.B.3
Wright, R.N.4
-
16
-
-
0016555241
-
The Protection of Information in Computer Systems
-
(Sept.)
-
Saltzer, J. H. and Schroeder, M. D. 1975. The Protection of Information in Computer Systems. Proc. Ieee 63, 9 (Sept.), 1278-1308.
-
(1975)
Proc. Ieee
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
17
-
-
0037848141
-
Access Control: Policies, Models, and Mechanisms
-
R. Focardi and R. Gorrieri Eds., Lncs 2171 Springer-Verlag.
-
Samarati, P. and De Capitani Di Vimercati, S. 2001. Access Control: Policies, Models, and Mechanisms. In Foundations of Security Analysis and Design. R. Focardi and R. Gorrieri Eds., Lncs 2171. Springer-Verlag.
-
(2001)
Foundations of Security Analysis and Design.
-
-
Samarati, P.1
De Capitani Di Vimercati, S.2
-
19
-
-
0030086382
-
Role-Based Access Control Models
-
(Feb.)
-
Sandhu, R., Coyne, E., Feinstein, H., Youman, C. 1996. Role-Based Access Control Models. Ieee Computer 29, 2 (Feb.), 38-47.
-
(1996)
Ieee Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
20
-
-
0037510581
-
Authentication, Access Control, and Intrusion Detection
-
A. Tucker Ed., Crc Press
-
Sandhu, R. and Samarati, P. 1997. Authentication, Access Control, and Intrusion Detection. In The Computer Science and Engineering Handbook. A. Tucker Ed., Crc Press.
-
(1997)
The Computer Science and Engineering Handbook.
-
-
Sandhu, R.1
Samarati, P.2
-
21
-
-
84992227458
-
Proposed Nist Standard For Role-Based Access Control
-
(Aug.).
-
Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, R., and Chandramouli, R. 2001. Proposed Nist Standard For Role-Based Access Control Acm Trans. Inf. Syst. Secur. 4, 3 (Aug.).
-
(2001)
Acm Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, R.4
Chandramouli, R.5
-
22
-
-
0031338080
-
Using Digital Credentials on the World Wide Web
-
Winslett, M., Ching, N., Jones, V., and Slepchin, I. 1997. Using Digital Credentials on the World Wide Web. J. Comput. Secur. 5, 3, 255-267.
-
(1997)
J. Comput. Secur.
, vol.5
, Issue.3
, pp. 255-267
-
-
Winslett, M.1
Ching, N.2
Jones, V.3
Slepchin, I.4
-
23
-
-
84974750564
-
Authorizations in Distributed Systems: A New Approach
-
Woo, T. Y. C. and Lam, S. S. 1993. Authorizations in Distributed Systems: A New Approach. J. Comput. Secur. 2 (2, 3), 107-136.
-
(1993)
J. Comput. Secur.
, vol.2
, Issue.2-3
, pp. 107-136
-
-
Woo, T.Y.C.1
Lam, S.S.2
|