-
1
-
-
77952407814
-
Organization Based Access Control
-
Italie, June
-
A. Abou El Kalam, R. E. Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miège, C. Saurel, and G. Trouessin. Organization Based Access Control. In Policy’03, Como, Italie, June 2003.
-
Policy’03, Como
, pp. 2003
-
-
Abou El Kalam, A.1
Baida, R.E.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miège, A.7
Saurel, C.8
Trouessin, G.9
-
4
-
-
34250616065
-
-
Thomas Wason ed., Version 1.2
-
S. Cantor, J. Hodges, J. Kemp, and P. Thompson. Liberty ID-FF Architecture Overview. Thomas Wason ed., https://www.projectliberty.org/resources/specifications.php#box1, 2005. Version 1.2.
-
(2005)
Liberty ID-FF Architecture Overview
-
-
Cantor, S.1
Hodges, J.2
Kemp, J.3
Thompson, P.4
-
5
-
-
33751017347
-
A formal approach to specify and deploy a network security policy
-
Toulouse, France, 26-27 August
-
F. Cuppens, N. Cuppens-Boulahia, T. Sans, and A. Miège. A formal approach to specify and deploy a network security policy. In Second Workshop FAST, Toulouse, France, 26-27 August, 2004.
-
(2004)
Second Workshop FAST
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Sans, T.3
Miège, A.4
-
7
-
-
0017918929
-
Spheres of Control
-
T. Davies. Spheres of Control. IBM Systems Journal, 17:179–198, 1978.
-
(1978)
IBM Systems Journal
, vol.17
, pp. 179-198
-
-
Davies, T.1
-
9
-
-
0032218229
-
A Security Architecture for Computational Grids
-
San Francisco, CA
-
I. Foster, C. Kesselman, G. Tsudik, and S. Tuecke. A Security Architecture for Computational Grids. In 5th Conference on Computer and Communications Security, pages 83–91, San Francisco, CA, 1998.
-
(1998)
5Th Conference on Computer and Communications Security
, pp. 83-91
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
10
-
-
0001832779
-
Access Control System Meets Public Infrastructure, Or: Assigning Roles to Strangers
-
A. Hersberg, Y. Mihaeli, D. Naor, and Y. Ravid. Access Control System Meets Public Infrastructure, Or: Assigning Roles to Strangers. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2000.
-
(2000)
In IEEE Symposium on Security and Privacy, Oakland, CA, May
-
-
Hersberg, A.1
Mihaeli, Y.2
Naor, D.3
Ravid, Y.4
-
12
-
-
34547977332
-
Extending HP Identity Management Solutions to Enforce Privacy Policies and Obligations for Regulatory Compliance by Enterprises
-
July 10-13
-
M. C. Mont, R. Thyne, K. Chan, and P. Bramhall. Extending HP Identity Management Solutions to Enforce Privacy Policies and Obligations for Regulatory Compliance by Enterprises. In 12th HP OpenView University Association Workshop, July 10-13 2005.
-
(2005)
12Th HP Openview University Association Workshop
-
-
Mont, M.C.1
Thyne, R.2
Chan, K.3
Bramhall, P.4
-
14
-
-
0041848577
-
Microsoft.Net passport: A security analysis
-
R. Oppliger. Microsoft.net passport: A security analysis. Computer, 36(7):29–35, 2003.
-
(2003)
Computer
, vol.36
, Issue.7
, pp. 29-35
-
-
Oppliger, R.1
-
16
-
-
33845866983
-
The Community Authorization Service: Status and Future
-
La Jolia, CA, March
-
L. Pearlman, C. Kesselman, V. Weich, I. Foster, and S. Tuecke. The Community Authorization Service: Status and Future. In CHEP03, La Jolia, CA, March 2003.
-
(2003)
CHEP03
-
-
Pearlman, L.1
Kesselman, C.2
Weich, V.3
Foster, I.4
Tuecke, S.5
-
17
-
-
0242709333
-
Information Sharing and Security in Dynamic Coalitions
-
C. Philips, T. C. Ting, and S. Demurjian. Information Sharing and Security in Dynamic Coalitions. In SACMAT, Monterey, CA, June 2002.
-
(2002)
In SACMAT, Monterey, CA, June
-
-
Philips, C.1
Ting, T.C.2
Demurjian, S.3
-
19
-
-
0030086382
-
Role-Based Access Control Models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-Based Access Control Models. Computer, 29(2):38–47, 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
21
-
-
84866906784
-
A Credential-Based Approach for Facilitating Automatic Resource Sharing among Ah-Hoc Dynamic Coalitions
-
CT, August
-
J. Warner, V. Atluri, and R. Mukkamala. A Credential-Based Approach for Facilitating Automatic Resource Sharing among Ah-Hoc Dynamic Coalitions. In 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, August 2005.
-
(2005)
19Th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs
-
-
Warner, J.1
Atluri, V.2
Mukkamala, R.3
-
22
-
-
1642327001
-
Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negociations
-
February
-
T. Yu, M. Winslett, and K. Seamons. Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negociations. ACM Transactions and Information System Security, 6(1), February 2003.
-
(2003)
ACM Transactions and Information System Security
, vol.6
, Issue.1
-
-
Yu, T.1
Winslett, M.2
Seamons, K.3
|