Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
A calculus for access control in distributed systems
ACM Transactions on Programming Languages and Systems (TOPLAS)
Role-Based Access Control Models
Computer
Access control for large collections
ACM Transactions on Information Systems (TOIS)
A rule-based framework for role based delegation
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A model of OASIS role-based access control and its support for active security
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A role-based delegation framework for healthcare information systems
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
WISE '02 Proceedings of the 3rd International Conference on Web Information Systems Engineering
A flexible payment scheme and its permission-role assignment
ACSC '03 Proceedings of the 26th Australasian computer science conference - Volume 16
Framework for role-based delegation models
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
A Logic-based Knowledge Representation for Authorization with Delegation
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
ADC '03 Proceedings of the 14th Australasian database conference - Volume 17
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A Practically Implementable and Tractable Delegation Logic
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
A Consumer Scalable Anonymity Payment Scheme with Role-Based Access Control
WISE '01 Proceedings of the Second International Conference on Web Information Systems Engineering (WISE'01) Volume 1 - Volume 1
Authorization algorithms for the mobility of user-role relationship
ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
Advanced Permission-Role Relationship in Role-Based Access Control
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
A methodology to minimise excessively permissive security configurations
ACS'08 Proceedings of the 8th conference on Applied computer scince
Hi-index | 0.00 |
Information sharing on distributed collaboration usually occurs in broad, highly dynamic network-based environments, and formally accessing the resources in a secure manner poses a difficult and vital challenge. Our research is to develop a systematic methodology for information sharing in distributed collaborative environments. It will ensure sensitive information and information assurance requirements, and incorporate new security constrains and policies raised by emerging technologies. We will create a new rule-based framework to identify and address issues of sharing in collaborative environments; and to specify and enforce security rules to support identified issues while minimizing the risks of information sharing through the framework.