|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 280 occurrences of 129 keywords
|
|
|
Results
Found 368 publication records. Showing 368 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
287 | Nuo Li, JeeHyun Hwang, Tao Xie 0001 |
Multiple-implementation testing for XACML implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAV-WEB ![In: Proceedings of the 2008 Workshop on Testing, Analysis, and Verification of Web Services and Applications, held in conjunction with the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2008), TAV-WEB 2008, Seattle, Washington, USA, July 21, 2008, pp. 27-33, 2008, ACM, 978-1-60558-053-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
multiple-implementation testing, policy decision point, testing, XACML, access control policy |
163 | Rodolfo Ferrini, Elisa Bertino |
Supporting RBAC with XACML+OWL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings, pp. 145-154, 2009, ACM, 978-1-60558-537-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
OWL ontology, XACML, access control model, rbac |
138 | Min Xu, Duminda Wijesekera |
A role-based XACML administration and delegation profile and its enforcement architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 6th ACM Workshop On Secure Web Services, SWS 2009, Chicago, Illinois, USA, November 13, 2009, pp. 53-60, 2009, ACM, 978-1-60558-789-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
arbac, access control, authorization, delegation, xacml, web service security, administration, rbac |
138 | Alex X. Liu, Fei Chen 0001, JeeHyun Hwang, Tao Xie 0001 |
Xengine: a fast and scalable XACML policy evaluation engine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS 2008, Annapolis, MD, USA, June 2-6, 2008, pp. 265-276, 2008, ACM, 978-1-60558-005-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
policy decision point (PDP), policy enforcement point (PEP), access control, web server, XACML, policy evaluation |
107 | Pietro Mazzoleni, Elisa Bertino, Bruno Crispo |
XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 219-227, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security policies integration, web services, distributed systems, content distributed networks, XACML |
107 | Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie 0001 |
Conformance Checking of Access Control Policies Specified in XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: 31st Annual International Computer Software and Applications Conference, COMPSAC 2007, Beijing, China, July 24-27, 2007. Volume 2, pp. 275-280, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
100 | Fatih Turkmen, Bruno Crispo |
Performance evaluation of XACML PDP implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 5th ACM Workshop On Secure Web Services, SWS 2008, Alexandria, VA, USA, October 31, 2008, pp. 37-44, 2008, ACM, 978-1-60558-292-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
performance, access control, xacml, pdp |
100 | Philip Miseldine |
Automated xacml policy reconfiguration for evaluation optimisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS ![In: Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, SESS 2008, Leipzig, Germany, May 17-18, 2008, pp. 1-8, 2008, ACM, 978-1-60558-042-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
performance, evaluation, xacml |
100 | David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen |
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, pp. 67-86, 2006, Springer, 3-540-47820-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Delegation of Authority, Policies, XACML, Attributes, Credentials, PDP |
88 | Bernard Stepien, Amy P. Felty, Stan Matwin |
A Non-technical User-Oriented Display Notation for XACML Conditions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MCETECH ![In: E-Technologies: Innovation in an Open World, 4th International Conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009. Proceedings, pp. 53-64, 2009, Springer, 978-3-642-01186-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
rule editor, Access control, XACML, notation |
88 | Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar |
An extended RBAC profile of XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006, pp. 13-22, 2006, ACM, 1-59593-546-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
access control, RBAC, XACML, OrBAC |
88 | Nan Zhang 0003, Mark Ryan 0001, Dimitar P. Guelev |
Synthesising verified access control systems in XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004, pp. 56-65, 2004, ACM, 1-58113-971-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
access control policy language, XACML, access control model |
82 | George Hsieh, Keith Foster, Gerald Emamali, Gregory Patrick, Lisa M. Marvel |
Using XACML for Embedded and Fine-Grained Access Control Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 462-468, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
75 | Diala Abi Haidar, Nora Cuppens-Boulahia, Frédéric Cuppens, Hervé Debar |
XeNA: an access negotiation framework using XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. des Télécommunications ![In: Ann. des Télécommunications 64(1-2), pp. 155-169, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Access control, Interoperability, RBAC, Trust management, XACML, OrBAC |
75 | Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino |
XACML Policy Integration Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 11(1), pp. 4:1-4:29, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security policies integration, Web Services, Distributed Systems, SOA, Content Distributed Networks, XACML |
75 | Yuri Demchenko, Oscar Koeroo, Cees de Laat, Håkon Sagehaug |
Extending XACML authorisation model to support policy obligations handling in distributed application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MGC ![In: Proceedings of the 6th International Workshop on Middleware for Grid Computing (MGC 2008), held at the ACM/IFIP/USENIX 9th International Middleware Conference, December 1-5, Leuven, Belgium, pp. 5, 2008, ACM, 978-1-60558-365-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
complex resource provisioning, generic AAA authorisation framework, policy obligations, reference model for policy obligations handling, XACML |
70 | Günter Karjoth, Andreas Schade, Els Van Herreweghen |
Implementing ACL-Based Policies in XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 183-192, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
70 | Xiao Feng Li, Dengguo Feng |
Composing Administrative Scope of Delegation Policies based on extended XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 16-20 October 2006, Hong Kong, China, pp. 467-470, 2006, IEEE Computer Society, 0-7695-2558-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
70 | Ludwig Seitz, Erik Rissanen, Thomas Sandholm, Babak Sadighi Firozabadi, Olle Mulmo |
Policy administration control and delegation using XACML and Delegent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 6th IEEE/ACM International Conference on Grid Computing (GRID 2005), November 13-14, 2005, Seattle, Washington, USA, Proceedings, pp. 49-54, 2005, IEEE Computer Society, 0-7803-9493-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
70 | Emir Toktar, Edgard Jamhour, Carlos Maziero |
RSVP Policy Control using XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 7-9 June 2004, Yorktown Heights, NY, USA, pp. 87-, 2004, IEEE Computer Society, 0-7695-2141-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
68 | Vladimir Kolovski, James A. Hendler, Bijan Parsia |
Analyzing web access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007, pp. 677-686, 2007, ACM, 978-1-59593-654-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
access control, description logics, XACML, policy analysis |
63 | David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen |
Adding support to XACML for multi-domain user to user dynamic delegation of authority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(2), pp. 137-152, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Delegation of authority, Credential validation service, RBAC, XACML |
63 | Prathima Rao, Dan Lin 0001, Elisa Bertino, Ninghui Li, Jorge Lobo 0001 |
An algebra for fine-grained integration of XACML policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings, pp. 63-72, 2009, ACM, 978-1-60558-537-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
policy integration, access control, XACML |
63 | Mario Lischka, Yukiko Endo, Manuel Sánchez Cuenca |
Deductive policies with XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 6th ACM Workshop On Secure Web Services, SWS 2009, Chicago, Illinois, USA, November 13, 2009, pp. 37-44, 2009, ACM, 978-1-60558-789-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
xacml, deduction |
63 | Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera, Anil Nerode |
Evaluating distributed xacml policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 4th ACM Workshop On Secure Web Services, SWS 2007, Fairfax, VA, USA, November 2, 2007, pp. 99-110, 2007, ACM, 978-1-59593-892-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
XACML, web services security, distributed evaluation |
57 | Ja'far Alqatawna, Erik Rissanen, Babak Sadighi Firozabadi |
Overriding of Access Control in XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 87-95, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
57 | Prathima Rao, Dan Lin 0001, Elisa Bertino |
XACML Function Annotations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 178-182, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
57 | Claudio A. Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati |
Offline Expansion of XACML Policies Based on P3P Metadata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWE ![In: Web Engineering, 5th International Conference, ICWE 2005, Sydney, Australia, July 27-29, 2005, Proceedings, pp. 363-374, 2005, Springer, 3-540-27996-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
56 | Andrea Rota, Stuart Short, Mohammad Ashiqur Rahaman |
XML secure views using semantic access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT/ICDT Workshops ![In: Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, Switzerland, March 22-26, 2010, 2010, ACM, 978-1-60558-990-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
ontology, XML, access control, filtering, OWL, XACML |
56 | Prathima Rao, Dan Lin 0001, Elisa Bertino, Ninghui Li, Jorge Lobo 0001 |
EXAM: An Environment for Access Control Policy Analysis and Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2-4 June 2008, Palisades, New York, USA, pp. 238-240, 2008, IEEE Computer Society, 978-0-7695-3133-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
XACML, Policy Analysis |
56 | Jongil Jeong, Weehyuk Yu, Dongkyoo Shin, Dongil Shin, Kiyoung Moon, Jaeseung Lee |
Integration of Single Sign-On and Role-Based Access Control Profiles for Grid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb ![In: Frontiers of WWW Research and Development - APWeb 2006, 8th Asia-Pacific Web Conference, Harbin, China, January 16-18, 2006, Proceedings, pp. 880-885, 2006, Springer, 3-540-31142-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Grid, role-based access control, XACML, single sign-on, SAML |
50 | Erik Rissanen, David Brossard, Adriaan Slabbert |
Distributed Access Control Management - A XACML-Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSOC/ServiceWave ![In: Service-Oriented Computing, 7th International Joint Conference, ICSOC-ServiceWave 2009, Stockholm, Sweden, November 24-27, 2009. Proceedings, pp. 639-640, 2009, 978-3-642-10382-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, SOA, access control, authorization, XACML |
50 | Maha Aburahma, Reinhard Stumptner |
Modeling location attributes using XACML-RBAC model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoMM ![In: MoMM'2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 251-254, 2009, ACM, 978-1-60558-659-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
access control, location-based services, RBAC, XACML |
50 | Patrick C. K. Hung, Jude Andrade, Yongming Chen, Ranny Huang, Miguel Vargas Martin, Yi Zheng |
Research Issues of Privacy Access Control Model for Mobile Ad Hoc Healthcare Applications with XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (2) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 2, May 21-23, 2007, Niagara Falls, Canada, pp. 582-587, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Privacy, mobile ad-hoc network, Role Based Access Control, XACML, Healthcare Applications |
50 | Anne H. Anderson |
A comparison of two privacy policy languages: EPAL and XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006, pp. 53-60, 2006, ACM, 1-59593-546-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
XACML, privacy policy, policy language, EPAL |
50 | Jeremy W. Bryans |
Reasoning about XACML policies using CSP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 2nd ACM Workshop On Secure Web Services, SWS 2005, Fairfax, VA, USA, November 11, 2005, pp. 28-35, 2005, ACM, 1-59593-234-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
santic models, access control, CSP, XACML |
50 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings, pp. 143-144, 2011, ACM, 978-1-4503-0688-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
50 | David F. Ferraiolo, Vijay Atluri |
A meta model for access control: why is it needed and is it even possible to achieve? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 153-154, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
50 | Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali |
Behavioral attestation for web services (BA4WS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 5th ACM Workshop On Secure Web Services, SWS 2008, Alexandria, VA, USA, October 31, 2008, pp. 21-28, 2008, ACM, 978-1-60558-292-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
behavioral attestation, web services, remote attestation |
45 | Thomas Scheffler, Stefan Geiß, Bettina Schnor |
An Implementation of a Privacy Enforcement Scheme based on the Java Security Framework using XACML Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 157-171, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Manuel Sánchez, Óscar Cánovas Reverte, Gabriel López 0001, Antonio Fernandez Gómez-Skarmeta |
Managing the lifecycle of XACML delegation policies in federated environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 717-721, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera |
Securing Workflows with XACML, RDF and BPEL. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings, pp. 330-345, 2008, Springer, 978-3-540-70566-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Christian Wolter, Andreas Schaad, Christoph Meinel |
Deriving XACML Policies from Business Process Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE Workshops ![In: Web Information Systems Engineering - WISE 2007 Workshops, WISE 2007 International Workshops, Nancy, France, December 3, 2007, Proceedings, pp. 142-153, 2007, Springer, 978-3-540-77009-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Policy Definition, Separation of Duties Business Process Modeling, eXtensible Access Control Markup Language, Integration, Enforcement |
45 | Jeremy W. Bryans, John S. Fitzgerald |
Formal Engineering of XACML Access Control Policies in VDM++. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICFEM ![In: Formal Methods and Software Engineering, 9th International Conference on Formal Engineering Methods, ICFEM 2007, Boca Raton, FL, USA, November 14-15, 2007, Proceedings, pp. 37-56, 2007, Springer, 978-3-540-76648-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera |
XACML Policies for Exclusive Resource Usage. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings, pp. 275-290, 2007, Springer, 978-3-540-73533-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Romain Laborde, Thierry Desprats |
Dealing with Stable Environmental Conditions in XACML Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSNC ![In: Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), August 25-31, 2007, Cap Esterel, French Riviera, France, pp. 63, 2007, IEEE Computer Society, 0-7695-2938-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Vivying S. Y. Cheng, Patrick C. K. Hung, Dickson K. W. Chiu |
Enabling Web Services Policy Negotiation with Privacy preserved using XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 33, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Xuebing Qing, Carlisle Adams |
XACML-Based Policy-Driven Access Control for Mobile Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada, pp. 643-646, 2006, IEEE, 1-4244-0038-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Dong Seong Kim 0001, Taek-Hyun Shin, Byungil Lee, Jong Sou Park |
Access Control and Authorization for Security of RFID Multi-domain Using SAML and XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 887-893, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Chunxiao Ye, Zhongfu Wu |
Using XML and XACML to Support Attribute Based Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Fifth International Conference on Computer and Information Technology (CIT 2005), 21-23 September 2005, Shanghai, China, pp. 751-756, 2005, IEEE Computer Society, 0-7695-2432-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Wolfgang Hommel |
Using XACML for Privacy Control in SAML-Based Identity Federations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 160-169, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Rajeev Gupta, Manish Bhide |
A Generic XACML Based Declarative Authorization Scheme for Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, pp. 44-63, 2005, Springer, 3-540-28963-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis G. Kafura, Sumit Shah |
First experiences using XACML for access control in distributed systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
XML Security ![In: Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, pp. 25-37, 2003, ACM, 1-58113-777-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
access control decision, access control enforcement, authorization, policy language, distributed system security, policy management |
43 | Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa Bertino, Prathima Rao, Jorge Lobo 0001, Dan Lin 0001 |
Access control policy combining: theory meets practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings, pp. 135-144, 2009, ACM, 978-1-60558-537-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
policy combination, xacml |
43 | Jongil Jeong, Dongil Shin, Dongkyoo Shin |
An XML-Based Security Architecture for Integrating Single Sign-On and Rule-Based Access Control in Mobile and Ubiquitous Web Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (2) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part II, pp. 1357-1366, 2006, Springer, 3-540-48273-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
access control, mobile device, RBAC, XACML, single sign-on, SAML |
43 | Guillermo Navarro 0001, Joan Borrell |
An XML Standards Based Authorization Framework for Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MADNES ![In: Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers, pp. 54-66, 2005, Springer, 3-540-36646-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Access Control, Mobile Agents, Authorization, XACML, SAML |
39 | Ki Young Lee, Aleum Kim, Ye Eun Jeon, Jeong-Joon Kim, Yong Soon Im, Gyoo-Seok Choi, Sang-Bong Park, Yun Sik Lim, Jeong Jin Kang |
Spatio-temporal XACML: the expansion of XACML for access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Secur. Networks ![In: Int. J. Secur. Networks 10(1), pp. 56-63, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
39 | Um-e-Ghazia, Rahat Masood, Muhammad Awais Shibli, Muhammad Bilal |
Usage Control Model Specification in XACML Policy Language - XACML Policy Engine of UCON. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIM ![In: Computer Information Systems and Industrial Management - 11th IFIP TC 8 International Conference, CISIM 2012, Venice, Italy, September 26-28, 2012. Proceedings, pp. 68-79, 2012, Springer, 978-3-642-33259-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
38 | Christopher Alm, Roland Illig |
Translating High-Level Authorization Constraints to XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERVICES ![In: 6th World Congress on Services, SERVICES 2010, Miami, Florida, USA, July 5-10, 2010, pp. 629-636, 2010, IEEE Computer Society, 978-0-7695-4129-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
OPL, RBAC, Translation, XACML, Separation of Duty |
38 | Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Gregory Neven, Stefano Paraboschi, Franz-Stefan Preiss, Pierangela Samarati, Mario Verdicchio |
Enabling Privacy-preserving Credential-based Access Control with XACML and SAML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 1090-1095, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, Access control, XACML, SAML, anonymous credentials |
37 | Regina N. Hebig, Christoph Meinel, Michael Menzel 0001, Ivonne Thomas, Robert Warschofsky |
A Web Service Architecture for Decentralised Identity- and Attribute-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: IEEE International Conference on Web Services, ICWS 2009, Los Angeles, CA, USA, 6-10 July 2009, pp. 551-558, 2009, IEEE Computer Society, 978-0-7695-3709-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Fatih Tekbacak, Tugkan Tuglular, Oguz Dikenelli |
An Architecture for Verification of Access Control Policies with Multi Agent System Ontologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2, pp. 52-55, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Emir Toktar, Edgard Jamhour, Carlos Maziero |
A XML Policy-Based Approach for RSVP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICT ![In: Telecommunications and Networking - ICT 2004, 11th International Conference on Telecommunications, Fortaleza, Brazil, August 1-6, 2004, Proceedings, pp. 1204-1209, 2004, Springer, 3-540-22571-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Martin Karusseit, Tiziana Margaria, Holger Willebrandt |
Policy expression and checking in XACML, WS-Policies, and the jABC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAV-WEB ![In: Proceedings of the 2008 Workshop on Testing, Analysis, and Verification of Web Services and Applications, held in conjunction with the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2008), TAV-WEB 2008, Seattle, Washington, USA, July 21, 2008, pp. 20-26, 2008, ACM, 978-1-60558-053-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
model checking, access control, validation, policies |
32 | Yuri Demchenko, Leon Gommans, Cees de Laat |
Using SAML and XACML for Complex Authorisation Scenarios in Dynamic Resource Provisioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 254-262, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Carlos Alberto Kamienski, Joseane Farias Fidalgo, Ramide Dantas, Djamel Sadok, Börje Ohlman |
XACML-Based Composition Policies for Ambient Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 77-86, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Yuri Demchenko, Leon Gommans, Cees de Laat |
Using SAML and XACML for Complex Resource Provisioning in Grid Based Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 183-187, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
32 | Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, Seth Proctor |
Privacy Preserving Trust Authorization Framework Using XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006), 26-29 June 2006, Buffalo, New York, USA, Proceedings, pp. 673-678, 2006, IEEE Computer Society, 0-7695-2593-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
32 | Andreas Matheus |
How to Declare Access Control Policies for XML Structured Information Objects using OASIS' eXtensible Access Control Markup Language (XACML). ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Flutra Osmani, Adriaan Slabbert |
A scalable distributed security infrastructure for industrial control and sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 84-89, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
decentralized security, industrial control and sensor networks, PKI, IEEE 802.15.4, XACML |
31 | Haibo Shen |
A Semantic-Aware Attribute-Based Access Control Model for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP ![In: Algorithms and Architectures for Parallel Processing, 9th International Conference, ICA3PP 2009, Taipei, Taiwan, June 8-11, 2009. Proceedings, pp. 693-703, 2009, Springer, 978-3-642-03094-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Ontology, Web Services, XACML, Attribute-Based Access Control, Semantic Web Technologies |
31 | Kyu Il Kim, Won Gil Choi, Eun-Ju Lee, Ung-Mo Kim |
A Secure Delegation Model Based on Multi-agent in Pervasive Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, Third KES International Symposium, KES-AMSTA 2009, Uppsala, Sweden, June 3-5, 2009. Proceedings, pp. 304-313, 2009, Springer, 978-3-642-01664-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Delegation, XACML, SAML, Pervasive Environment |
31 | Ludwig Seitz, Göran Selander, Erik Rissanen, Cao Ling, Babak Sadighi |
Decentralized Access Control Management for Network Configuration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Syst. Manag. ![In: J. Netw. Syst. Manag. 16(3), pp. 303-316, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
XPath, XACML, NETCONF |
31 | Wolfgang Hommel |
Using Policy-Based Management for Privacy-Enhancing Data Access and Usage Control in Grid Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 19-22 May 2008, Lyon, France, pp. 621-626, 2008, IEEE Computer Society, 978-0-7695-3156-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privacy, Grid, XACML, Policy-based Management |
31 | Andreas Sjöholm, Ludwig Seitz, Babak Sadighi |
Secure communication for ad-hoc, federated groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA, pp. 48-58, 2008, ACM, 978-1-60558-066-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
tree-based group, access control, authorization, XACML, secure group communication, Diffie-Hellman |
31 | Dana Al Kukhun, Florence Sèdes |
Adaptive Solutions for Access Control within Pervasive Healthcare Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOST ![In: Smart Homes and Health Telematics, 6th International Conference, ICOST 2008, Ames, IA, USA, June 28-July 2, 2008, Proceedings, pp. 42-53, 2008, Springer, 978-3-540-69914-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
adaptation, Access control, pervasive computing, XACML |
31 | Hannah K. Lee, Heiko Luedemann |
lightweight decentralized authorization model for inter-domain collaborations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 4th ACM Workshop On Secure Web Services, SWS 2007, Fairfax, VA, USA, November 2, 2007, pp. 83-89, 2007, ACM, 978-1-59593-892-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
dRBAC, inter-domain collaborations, e-government, XACML, authorization policy |
31 | Sebastian Fritsch, Vangelis Karatsiolis, Marcus Lippert, Alexander Wiesmaier, Johannes Buchmann 0001 |
Towards Secure Electronic Workflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 154-168, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Workflow Security, Digitize Workflows, XACML, XPDL, Workflow Engine |
31 | Evan Martin |
Automated test generation for access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA Companion ![In: Companion to the 21th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2006, October 22-26, 2006, Portland, Oregon, USA, pp. 752-753, 2006, ACM, 1-59593-491-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
test generation, XACML, access control policy |
31 | Casey K. Fung, Patrick C. K. Hung, William M. Kearns, Stephen A. Uczekaj |
Dynamic Regeneration of Workflow Specification with Access Control Requirements in MANET. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2006 IEEE International Conference on Web Services (ICWS 2006), 18-22 September 2006, Chicago, Illinois, USA, pp. 761-769, 2006, IEEE Computer Society, 0-7695-2669-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Web services, MANET, Access Control, Exceptional Handling, BPEL, Survivability, XACML, Attack tree |
31 | Jing Jin, Gail-Joon Ahn |
Role-based access management for ad-hoc collaborative sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 200-209, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
XACML-based policy framework, access control, information sharing, ad-hoc collaboration |
31 | Hee-Young Lim, Young-Gab Kim, Chang-Joo Moon, Doo-Kwon Baik |
Bundle Authentication and Authorization Using XML Security in the OSGi Service Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 14-16 July 2005, Jeju Island, South Korea, pp. 502-507, 2005, IEEE Computer Society, 0-7695-2296-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Authentication, Authorization, OSGi, Home network, XACML, XML security, XML signature |
31 | Andreas Matheus |
Declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 21-28, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
object-based access restriction, spatial access control, XACML, geospatial, ACM proceedings |
31 | Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyerovich, Michael Carl Tschantz |
Verification and change-impact analysis of access-control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 27th International Conference on Software Engineering (ICSE 2005), 15-21 May 2005, St. Louis, Missouri, USA, pp. 196-205, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
verification, XACML, decision diagram, change-impact analysis, access-control policies |
25 | Apurva Mohan, Douglas M. Blough |
An attribute-based authorization policy framework with dynamic conflict resolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDtrust 2010, Gaithersburg, Maryland, USA, April 13-15, 2010, pp. 37-50, 2010, ACM, 978-1-60558-895-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
attribute-based authorization, conflict resolution, authorization policy |
25 | Graham Hughes, Tevfik Bultan |
Automated verification of access control policies using a SAT solver. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Tools Technol. Transf. ![In: Int. J. Softw. Tools Technol. Transf. 10(6), pp. 503-520, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Access control, Automated verification |
25 | Vineela Muppavarapu, Soon Myoung Chung |
Semantic-Based Access Control for Grid Data Resources in Open Grid Services Architecture - Data Access and Integration (OGSA-DAI). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTAI (2) ![In: 20th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2008), November 3-5, 2008, Dayton, Ohio, USA, Volume 2, pp. 315-322, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Jan Paul Kolter, Rolf Schillinger, Günther Pernul |
A Privacy-Enhanced Attribute-Based Access Control System. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings, pp. 129-143, 2007, Springer, 978-3-540-73533-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Evan Martin |
Testing and Analysis of Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE Companion ![In: 29th International Conference on Software Engineering (ICSE 2007), Minneapolis, MN, USA, May 20-26, 2007, Companion Volume, pp. 75-76, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Jun Feng, Glenn S. Wasson, Marty Humphrey |
Resource usage policy expression and enforcement in grid computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 8th IEEE/ACM International Conference on Grid Computing (GRID 2007), September 19-21, 2007, Austin, Texas, USA, Proceedings, pp. 66-73, 2007, IEEE Computer Society, 1-4244-1560-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Steffen Kolarczyk, Manuel Koch, Klaus-Peter Löhr, Karl Pauls |
SecTOOL - Supporting Requirements Engineering for Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETRICS ![In: Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings, pp. 254-267, 2006, Springer, 3-540-34640-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Evan Martin, Tao Xie 0001, Ting Yu 0001 |
Defining and Measuring Policy Coverage in Testing Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 139-158, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Kailash Bhoopalam, Kurt Maly, Frank McCown, Ravi Mukkamala, Mohammad Zubair |
A Standards-Based Approach for Supporting Dynamic Access Policies for a Federated Digital Library. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICADL ![In: Digital Libraries: Implementing Strategies and Sharing Experiences, 8th International Conference on Asian Digital Libraries, ICADL 2005, Bangkok, Thailand, December 12-15, 2005, Proceedings, pp. 242-252, 2005, Springer, 3-540-30850-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
access control, metadata, content management |
25 | Elisa Bertino, Anna Cinzia Squicciarini |
A Flexible Access Control Model for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FQAS ![In: Flexible Query Answering Systems, 6th International Conference, FQAS 2004, Lyon, France, June 24-26, 2004, Proceedings, pp. 13-16, 2004, Springer, 3-540-22160-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Tanjila Mawla, Maanak Gupta, Ravi S. Sandhu |
Specification and Enforcement of Activity Dependency Policies using XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.10092, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Hamed Arshad, Ross Horne, Christian Johansen, Olaf Owe, Tim A. C. Willemse |
XACML2mCRL2: Automatic transformation of XACML policies into mCRL2 specifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. Comput. Program. ![In: Sci. Comput. Program. 232, pp. 103046, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Arghavan Hosseinzadeh, Jessica Chwalek, Robin Brandstädter |
Policy-Driven XACML-Based Architecture for Dynamic Enforcement of Multiparty Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISSP ![In: Proceedings of the 10th International Conference on Information Systems Security and Privacy, ICISSP 2024, Rome, Italy, February 26-28, 2024., pp. 81-89, 2024, SCITEPRESS, 978-989-758-683-5. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
20 | A. Kousalya, Namkyun Baik |
Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Intell. Networks ![In: Int. J. Intell. Networks 4, pp. 62-67, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng |
XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-independent Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.12819, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Manal Lamri, Sabri Lyazid |
XACML-based semantic rules language and ontological model for reconciling semantic differences of access control rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Ad Hoc Ubiquitous Comput. ![In: Int. J. Ad Hoc Ubiquitous Comput. 43(1), pp. 1-17, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 368 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|