-
2
-
-
1142309815
-
Provisions and obligations in policy management and security applications
-
C. Bettini, S. Jajodia, X. S. Wang, and D. Wijesekera. Provisions and obligations in policy management and security applications. In Proceedings of the 28th international conference on Very Large Data Bases, pages 502-513, 2002.
-
(2002)
Proceedings of the 28th international conference on Very Large Data Bases
, pp. 502-513
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
3
-
-
0345829056
-
Provisions and obligations in policy rule management
-
C. Bettini, S. Jajodia, X. S. Wang, and D. Wijesekera. Provisions and obligations in policy rule management. J. Netw. Syst. Manage., 11: 351-372, 2003.
-
(2003)
J. Netw. Syst. Manage.
, vol.11
, pp. 351-372
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
5
-
-
34547346853
-
On the modeling and analysis of obligations
-
K. Irwin, T. Yu, and W. H. Winsborough. On the modeling and analysis of obligations. In Proceedings of the 13th ACM conference on Computer and communications security, CCS '06, pages 134-143, 2006.
-
(2006)
Proceedings of the 13th ACM conference on Computer and communications security, CCS '06
, pp. 134-143
-
-
Irwin, K.1
Yu, T.2
Winsborough, W.H.3
-
8
-
-
57349136722
-
A general obligation model and continuity: Enhanced policy enforcement engine for usage control
-
B. Katt, X. Zhang, R. Breu, M. Hafner, and J.-P. Seifert. A general obligation model and continuity: Enhanced policy enforcement engine for usage control. In Proceedings of the 13th ACM symposium on Access control models and technologies, pages 123-132, 2008.
-
(2008)
Proceedings of the 13th ACM symposium on Access control models and technologies
, pp. 123-132
-
-
Katt, B.1
Zhang, X.2
Breu, R.3
Hafner, M.4
Seifert, J.-P.5
-
13
-
-
3142523603
-
The UCONABC usage control model
-
February
-
J. Park and R. Sandhu. The UCONABC usage control model. ACM Trans. Inf. Syst. Secur., 7 (1): 128-174, February 2004.
-
(2004)
ACM Trans. Inf. Syst. Secur.
, vol.7
, Issue.1
, pp. 128-174
-
-
Park, J.1
Sandhu, R.2
-
14
-
-
77954470017
-
Toward practical authorization-dependent user obligation systems
-
M. Pontual, O. Chowdhury, W. H. Winsborough, T. Yu, and K. Irwin. Toward practical authorization-dependent user obligation systems. In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010.
-
(2010)
Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10
-
-
Pontual, M.1
Chowdhury, O.2
Winsborough, W.H.3
Yu, T.4
Irwin, K.5
-
15
-
-
0016555241
-
The protection of information in computer systems
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63 (9), 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
17
-
-
33745905108
-
-
Sun
-
Sun. Sun's XACML implementation. Avaiable at http://sunxacml. sourceforge. net/index. html.
-
Sun's XACML implementation
-
-
-
18
-
-
51249107480
-
Extensible access control markup language (XACML) version 2. 0
-
X. TC. Extensible access control markup language (XACML) version 2. 0. OASIS Standard, 2005. Avaiable at http://www. oasis-open. org/committees/xacml/.
-
(2005)
OASIS Standard
-
-
-
20
-
-
37149051976
-
KAoS policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement
-
A. Uszok, J. Bradshaw, R. Jeffers, N. Suri, P. Hayes, M. Breedy, L. Bunch, M. Johnson, S. Kulkarni, and J. Lott. KAoS policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement. In Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY '03, 2003.
-
(2003)
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY '03
-
-
Uszok, A.1
Bradshaw, J.2
Jeffers, R.3
Suri, N.4
Hayes, P.5
Breedy, M.6
Bunch, L.7
Johnson, M.8
Kulkarni, S.9
Lott, J.10
-
21
-
-
33745450500
-
Formal model and policy specification of usage control
-
November
-
X. Zhang, F. Parisi-Presicce, R. Sandhu, and J. Park. Formal model and policy specification of usage control. ACM Trans. Inf. Syst. Secur., 8 (4): 351-387, November 2005.
-
(2005)
ACM Trans. Inf. Syst. Secur.
, vol.8
, Issue.4
, pp. 351-387
-
-
Zhang, X.1
Parisi-Presicce, F.2
Sandhu, R.3
Park, J.4
|