Changes between Version 48 and Version 49 of Internal/Rbac/RbacResources


Ignore:
Timestamp:
Sep 19, 2006, 2:26:17 PM (18 years ago)
Author:
hedinger
Comment:

Legend:

Unmodified
Added
Removed
Modified
  • Internal/Rbac/RbacResources

    v48 v49  
    4545  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/sdarticle.pdf AMH06]] Gail-Joon Ahn, Badrinath Mohan, and Seng-Phil Hong. Secure information sharing using role-based delegation. ''Journal of Network and Computer Applications'', 2006. In press.
    4646
     47  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/xacmlmsg36.pdf And04]] Anne Anderson. Re: [xacml] ANSI INCITS 359-2004 etc. e-mail to Robin Cover of Isogen, April 2004. http://lists.oasis-open.org/archives/xacml/200404/msg00036.html.
     48
    4749  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/p43-ahn.pdf AS99]] Gail-Joon Ahn and Ravi Sandhu. The RSL99 Language for Role-Based Separation of Duty Constraints. In ''RBAC '99: Proceedings of the Fourth ACM Workshop on Role-Based Access Control'', pages 43--54, New York, NY, USA, 1999. ACM Press.
    4850
     
    301303  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/STAT_RBAC_Paper.pdf Har06]] Harris Corp. Role-Based Access Control In Network Vulnerability Management. Technical report, Harris Corp., March 2006.
    302304
     305  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/sg246647.pdf HJLE06]] Alicia Harvey, Travis Jeanneret, Thiam Cheng Lee, Rangarajan S. Manavalan, and Marty Trice. ''Administering and Implementing WebSphere Business Integration Server V4.3''. IBM Redbook. IBM International Technical Support Organization, ibm.com/redbooks, first edition, April 2006.
     306
    303307  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/hallyn.pdf HK00]] Serge E. Hallyn and Phil Kearns. Domain and Type Enforcement for Linux. In ''Proceedings of the 4th Annual Linux Showcase and Conference'', pages 247--260. The USENIX Association, October 2000.
    304308
     
    403407  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/01004366.pdf LMW02]] Ninghui Li, John C. Mitchell, and William H. Winsborough. Design of a Role-based Trust-management Framework. In ''Proceedings of the 2002 IEEE Symposium on Security and Privacy'', pages 114--130, 2002.
    404408
     409  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/2004-03.pdf LMWE04]] Ninghui Li, John C. Mitchell, William H. Winsborough, Kent E. Seamons, Michael Halcrow, and Jared Jacobson. RTML: A Role-based Trust-management Markup Language. Technical Report TR 2004-3, Purdue University CERIAS, 2004.
     410
    405411  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/00800059.pdf LN99]] !HyungHyo Lee and !BongNam Noh. An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach. In ''Proceedings of the 1999 International Workshop on Parallel Processing'', pages 179--184, Washington, DC, USA, September 1999. IEEE Computer Society.
    406412
     
    455461  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/p33-neumann.pdf NS02]] Gustaf Neumann and Mark Strembeck. A Scenario-driven Role Engineering Process for Functional RBAC Roles. In ''SACMAT '02: Proceedings of the Seventh ACM Symposium on Access Control Models and Technologies'', pages 33--42, New York, NY, USA, 2002. ACM Press.
    456462
     463  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/p65-strembeck.pdf NS03]] Gustaf Neumann and Mark Strembeck. An Approach to Engineer and Enforce Context Constraints in an RBAC Environment. In ''SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies'', pages 65--79, New York, NY, USA, 2003. ACM Press.
     464
    457465  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/IC_TECH_REPORT_200131.pdf NW01]] Txomin Nieva and Alain Wegmann. A Role-based Use Case Model for Remote Data Acquisition Systems. Technical Report DSC/201/031, Institute for Computer Communications and Applications (ICA), Swiss Federal Institute of Technology, Lausanne, Switzerland, 2001.
    458466
     467  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/neumann00xotcl.pdf NZ00]] Gustaf Neumann and Uwe Zdun. XOTcl: An Object-Oriented Scripting Language. In ''Proceedings of the Seventh USENIX Conference'', pages 163--174, February 2000.
     468
    459469  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/cd-xacml-rbac-profile-01.pdf OAS04]] OASIS Technical Committee. XACML Profile for Role Based Access, February 2004.
    460470
     
    657667  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/01454322.pdf Str05]] Mark Strembeck. Embedding Policy Rules for Software-Based Systems in a Requirements Context. In ''Sixth IEEE International Workshop on Policies for Distributed Systems and Networks'', pages 235--238, June 2005.
    658668
     669  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/xoRBAC-API-Reference.pdf Str06]] Mark Strembeck. ''xoRBAC API Reference''. www.XOTcl.org, 0.6.2 edition, April 2006.
     670
    659671  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/stoupa04xmlbased.pdf SVLT04]] Konstantina Stoupa, Athena Vakali, Fang Li, and Ioannis Tsoukalas. XML-Based Revocation and Delegation in a Distributed Environment. In Wolfgang Lindner, Marco Mesiti, Can Türker, Yannis Tzitzikas, and Athena Vakali, editors, ''Lecture Notes in Computer Science, Current Trends in Database Technology - EDBT 2004'', volume 3268, pages 299--308. Springer, Berlin / Heidelberg, March 2004.
    660672
     
    717729  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/p351-zhang.pdf ZPPSP05]] Xinwen Zhang, Francesco Parisi-Presicce, Ravi Sandhu, and Jaehong Park. Formal Model and Policy Specification of Usage Control. ''ACM Trans. Inf. Syst. Secur.'', 8(4):351--387, 2005.
    718730
     731  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/schema-based-xml-security.pdf ZPS03]] Xinwen Zhang, Jaehong Park, and Ravi Sandhu. Schema Based XML Security: RBAC Approach. In ''Proceedings of the Seventeenth Annual IFIP WG 11.3 Working Conference on Data and Applications Security'', pages 1--15, August 2003.
     732
    719733  [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/RBAC-1.pdf ZWCJ02]] John Zao, Hoetech Wee, Jonathan Chu, and Daniel Jackson. RBAC Schema Verification Using Lightweight Formal Model and Constraint Analysis. Technical report, MIT, 2002.
    720734