Role-Based Access Control Models
Computer
PKI: A Wiley Tech Brief
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations
Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure
Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure
RBAC Policies in XML for X.509 Based Privilege Management
SEC '02 Proceedings of the IFIP TC11 17th International Conference on Information Security: Visions and Perspectives
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI
ISC '02 Proceedings of the 5th International Conference on Information Security
The PERMIS X.509 role based privilege management infrastructure
Future Generation Computer Systems - Special section: Selected papers from the TERENA networking conference 2002
An access control model for dynamic client-side content
Proceedings of the eighth ACM symposium on Access control models and technologies
Access control and trust in the use of widely distributed services
Software—Practice & Experience - Special issue: Middleware
Policy Storage for Role-Based Access Control Systems
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
An XACML-based Policy Management and Authorization Service for Globus Resources
GRID '03 Proceedings of the 4th International Workshop on Grid Computing
First experiences using XACML for access control in distributed systems
Proceedings of the 2003 ACM workshop on XML security
Key Management for Encrypted Data Storage in Distributed Systems
SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
Content-triggered trust negotiation
ACM Transactions on Information and System Security (TISSEC)
X-RDR: a role-based delegation processor for web-based information systems
ACM SIGOPS Operating Systems Review
A delegation framework for federated identity management
Proceedings of the 2005 workshop on Digital identity management
An integrated approach to federated identity and privilege management in open systems
Communications of the ACM - Spam and the ongoing battle for the inbox
X-FEDERATE: A Policy Engineering Framework for Federated Access Management
IEEE Transactions on Software Engineering
Security-by-contract for web services
Proceedings of the 2007 ACM workshop on Secure web services
RB-GACA: an RBAC based grid access control architecture
International Journal of Grid and Utility Computing
On the design, implementation and application of an authorisation architecture for web services
International Journal of Information and Computer Security
A trust domain management schema for multiple grid environments
Proceedings of the 2nd international conference on Scalable information systems
Secure grid monitoring, a web-based framework
Proceedings of the first international conference on Networks for grid applications
Controlling Usage in Business Process Workflows through Fine-Grained Security Policies
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Security views for outsourced business processes
Proceedings of the 2008 ACM workshop on Secure web services
Achieving DRBAC Authorization in Multi-trust Domains with MAS Architecture and PMI
Agent Computing and Multi-Agent Systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Extending access control models with break-glass
Proceedings of the 14th ACM symposium on Access control models and technologies
Toward Trustworthy Web Services - Approaches, Weaknesses and Trust-By-Contract Framework
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
An ecosystem for user centric learning: revolution or evolution?
Proceedings of the International Conference on Management of Emergent Digital EcoSystems
A negotiation-based trust establishment service for CROWN grid
International Journal of Autonomous and Adaptive Communications Systems
A flexible delegation processor for web-based information systems
Computer Standards & Interfaces
A role-based XACML administration and delegation profile and its enforcement architecture
Proceedings of the 2009 ACM workshop on Secure web services
Deployment of grids through integrated configuration management
PDCN '08 Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks
SAML-based federated authentication and authorization scheme for cross-domain grid services
PDCN '08 Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks
Enhancing security in grids through self-restricted delegation of rights with user-based policies
PDCN '08 Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks
Authentication and access control using trust collaboration in pervasive grid environments
GPC'07 Proceedings of the 2nd international conference on Advances in grid and pervasive computing
Security requirements analysis for large-scale distributed file systems
Euro-Par'06 Proceedings of the CoreGRID 2006, UNICORE Summit 2006, Petascale Computational Biology and Bioinformatics conference on Parallel processing
Analysis of ANSI RBAC Support in COM+
Computer Standards & Interfaces
Context adapted certificate using morph template signature for pervasive environments
UCS'07 Proceedings of the 4th international conference on Ubiquitous computing systems
A classification of delegation schemes for attribute authority
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
Extending the globus architecture with role-based trust management
EUROCAST'07 Proceedings of the 11th international conference on Computer aided systems theory
Enhancing Java security with history based access control
Foundations of security analysis and design IV
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Activity-oriented access control to ubiquitous hospital information and services
Information Sciences: an International Journal
TrustBus'10 Proceedings of the 7th international conference on Trust, privacy and security in digital business
Resource management with X.509 inter-domain authorization certificates (InterAC)
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
A dynamic security framework for ambient intelligent systems: a smart-home based eHealth application
Transactions on computational science X
Dynamic authorization of grid based on trust mechanism
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
Using XACML for privacy control in SAML-based identity federations
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Policy-based integration of user and provider-sided identity management
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Towards a secure and practical multifunctional smart card
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
A novel authorization mechanism for service-oriented virtual organization
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
VO-sec: an access control framework for dynamic virtual organization
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Towards a risk management perspective on AAIs
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Authentication and authorisation infrastructures in b2c e-commerce
EC-Web'05 Proceedings of the 6th international conference on E-Commerce and Web Technologies
A fine-grained and x.509-based access control system for globus
ODBASE'06/OTM'06 Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part II
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
WAC'04 Proceedings of the First international IFIP conference on Autonomic Communication
An XML standards based authorization framework for mobile agents
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Development of a grid infrastructure for functional genomics
LSGRID'04 Proceedings of the First international conference on Life Science Grid
An architecture for privacy-aware inter-domain identity management
DSOM'05 Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management
Recognition of authority in virtual organisations
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
X316 security toolbox for new generation of certificate
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Journal of Network and Computer Applications
IWAAL'12 Proceedings of the 4th international conference on Ambient Assisted Living and Home Care
Nephele: Scalable Access Control for Federated File Services
Journal of Grid Computing
Future Generation Computer Systems
Policy-driven role-based access management for ad-hoc collaboration
Journal of Computer Security
Hi-index | 0.00 |