-
2
-
-
84912554772
-
Professional social networking
-
R. D. Rowley, "Professional social networking," Current psychiatry reports, vol. 16, no. 12, pp. 1-6, 2014.
-
(2014)
Current Psychiatry Reports
, vol.16
, Issue.12
, pp. 1-6
-
-
Rowley, R.D.1
-
3
-
-
33746261302
-
Using technology to transform communities of practice into knowledge-building communities
-
C. M. Hoadley and P. G. Kilner, "Using technology to transform communities of practice into knowledge-building communities," ACM SIGGROUP Bulletin, vol. 25, no. 1, pp. 31-40, 2005.
-
(2005)
ACM SIGGROUP Bulletin
, vol.25
, Issue.1
, pp. 31-40
-
-
Hoadley, C.M.1
Kilner, P.G.2
-
4
-
-
84922983375
-
Catt: A cloud based authorization framework with trust and temporal aspects
-
E. Zahoor, O. Perrin, and A. Bouchami, "Catt: A cloud based authorization framework with trust and temporal aspects," in Collaborative Computing: Networking, Applications and Worksharing (Collaborate-Com), 2014 International Conference on. IEEE, 2014, pp. 285-294.
-
(2014)
Collaborative Computing: Networking, Applications and Worksharing (Collaborate-Com), 2014 International Conference On. IEEE
, pp. 285-294
-
-
Zahoor, E.1
Perrin, O.2
Bouchami, A.3
-
7
-
-
84992227458
-
Proposed nist standard for role-based access control
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, "Proposed nist standard for role-based access control," ACM Transactions on Information and System Security (TISSEC), vol. 4, no. 3, pp. 224-274, 2001.
-
(2001)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
8
-
-
0030086382
-
Rolebased access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Rolebased access control models," Computer, vol. 29, no. 2, pp. 38-47, 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
9
-
-
19344364618
-
Role-based access control
-
R. S. Sandhu, "Role-based access control," Advances in computers, vol. 46, pp. 237-286, 1998.
-
(1998)
Advances in Computers
, vol.46
, pp. 237-286
-
-
Sandhu, R.S.1
-
10
-
-
30344473624
-
Federated identity management
-
S. S. Shim, G. Bhalla, and V. Pendyala, "Federated identity management," Computer, vol. 38, no. 12, pp. 120-122, 2005.
-
(2005)
Computer
, vol.38
, Issue.12
, pp. 120-122
-
-
Shim, S.S.1
Bhalla, G.2
Pendyala, V.3
-
13
-
-
26944487962
-
Context-aware access control mechanism for ubiquitous applications
-
Springer
-
Y.-G. Kim, C.-J. Mon, D. Jeong, J.-O. Lee, C.-Y. Song, and D.-K. Baik, "Context-aware access control mechanism for ubiquitous applications," in Advances in Web Intelligence. Springer, 2005, pp. 236-242.
-
(2005)
Advances in Web Intelligence
, pp. 236-242
-
-
Kim, Y.-G.1
Mon, C.-J.2
Jeong, D.3
Lee, J.-O.4
Song, C.-Y.5
Baik, D.-K.6
-
14
-
-
0035791053
-
Securing context-aware applications using environment roles
-
M. J. Covington, W. Long, S. Srinivasan, A. K. Dev, M. Ahamad, and G. D. Abowd, "Securing context-aware applications using environment roles," in Proceedings of the sixth ACM symposium on Access control models and technologies. ACM, 2001, pp. 10-20.
-
(2001)
Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies. ACM
, pp. 10-20
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dev, A.K.4
Ahamad, M.5
Abowd, G.D.6
-
18
-
-
0012204227
-
A survey of current research on online communities of practice
-
C. M. Johnson, "A survey of current research on online communities of practice," The internet and higher education, vol. 4, no. 1, pp. 45-60, 2001.
-
(2001)
The Internet and Higher Education
, vol.4
, Issue.1
, pp. 45-60
-
-
Johnson, C.M.1
-
21
-
-
77954482365
-
Risk-based access control systems built on fuzzy inferences
-
Q. Ni, E. Bertino, and J. Lobo, "Risk-based access control systems built on fuzzy inferences," in Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM, 2010, pp. 250-260.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. ACM
, pp. 250-260
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
-
22
-
-
85139863684
-
Risk-based security decisions under uncertainty
-
I. Molloy, L. Dickens, C. Morisset, P.-C. Cheng, J. Lobo, and A. Russo, "Risk-based security decisions under uncertainty," in Proceedings of the second ACM conference on Data and Application Security and Privacy. ACM, 2012, pp. 157-168.
-
(2012)
Proceedings of the Second ACM Conference on Data and Application Security and Privacy. ACM
, pp. 157-168
-
-
Molloy, I.1
Dickens, L.2
Morisset, C.3
Cheng, P.-C.4
Lobo, J.5
Russo, A.6
-
23
-
-
84906226881
-
Collac: Collaborative access control
-
S. Damen, J. den Hartog, and N. Zannone, "Collac: Collaborative access control," in Collaboration Technologies and Systems (CTS), 2014 International Conference on. IEEE, 2014, pp. 142-149.
-
(2014)
Collaboration Technologies and Systems (CTS), 2014 International Conference On. IEEE
, pp. 142-149
-
-
Damen, S.1
Den Hartog, J.2
Zannone, N.3
-
25
-
-
85030710652
-
Relationship-based access control: Its expression and enforcement through hybrid logic
-
G. Bruns, P. W. Fong, I. Siahaan, and M. Huth, "Relationship-based access control: its expression and enforcement through hybrid logic," in Proceedings of the second ACM conference on Data and Application Security and Privacy. ACM, 2012, pp. 117-124.
-
(2012)
Proceedings of the Second ACM Conference on Data and Application Security and Privacy. ACM
, pp. 117-124
-
-
Bruns, G.1
Fong, P.W.2
Siahaan, I.3
Huth, M.4
-
27
-
-
84857558409
-
Collaborative access control in on-line social networks
-
B. Carminati and E. Ferrari, "Collaborative access control in on-line social networks," in Collaborative computing: networking, applications and worksharing (CollaborateCom), 2011 7th international conference on. IEEE, 2011, pp. 231-240.
-
(2011)
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference On. IEEE
, pp. 231-240
-
-
Carminati, B.1
Ferrari, E.2
-
28
-
-
70350406398
-
Enforcing access control in web-based social networks
-
B. Carminati, E. Ferrari, and A. Perego, "Enforcing access control in web-based social networks," ACM Trans. Inf. Syst. Secur., vol. 13, no. 1, 2009. [Online]. Available: http://doi.acm.org/10.1145/1609956.1609962
-
(2009)
ACM Trans. Inf. Syst. Secur
, vol.13
, Issue.1
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
29
-
-
77952407814
-
Organization based access control
-
A. A. E. Kalam, R. Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miege, C. Saurel, and G. Trouessin, "Organization based access control," in Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003. IEEE 4th International Workshop on. IEEE, 2003, pp. 120-131.
-
(2003)
Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003. IEEE 4th International Workshop On. IEEE
, pp. 120-131
-
-
Kalam, A.A.E.1
Baida, R.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miege, A.7
Saurel, C.8
Trouessin, G.9
-
32
-
-
80455140352
-
An attribute based framework for risk-adaptive access control models
-
S. Kandala, R. Sandhu, and V. Bhamidipati, "An attribute based framework for risk-adaptive access control models," in Availability, Reliability and Security (ARES), 2011 Sixth International Conference on. IEEE, 2011, pp. 236-241.
-
(2011)
Availability, Reliability and Security (ARES), 2011 Sixth International Conference On. IEEE
, pp. 236-241
-
-
Kandala, S.1
Sandhu, R.2
Bhamidipati, V.3
-
33
-
-
24944456051
-
Risk models for trust-based access control (tbac)
-
Springer
-
N. Dimmock, J. Bacon, D. Ingram, and K. Moody, "Risk models for trust-based access control (tbac)," in Trust Management. Springer, 2005, pp. 364-371.
-
(2005)
Trust Management
, pp. 364-371
-
-
Dimmock, N.1
Bacon, J.2
Ingram, D.3
Moody, K.4
|