A provenance-based access control model for dynamic separation of duties
暂无分享,去创建一个
[1] Ravi Sandhu,et al. Transaction control expressions for separation of duties , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[2] Xin Jin,et al. A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC , 2012, DBSec.
[3] Paul T. Groth,et al. Security Issues in a SOA-Based Provenance System , 2006, IPAW.
[4] David F. Ferraiolo,et al. On the formal definition of separation-of-duty policies and their composition , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[5] J. Carroll,et al. Jena: implementing the semantic web recommendations , 2004, WWW Alt. '04.
[6] Jaehong Park,et al. Integrated provenance data for access control in group-centric collaboration , 2012, 2012 IEEE 13th International Conference on Information Reuse & Integration (IRI).
[7] Marianne Winslett,et al. Introducing secure provenance: problems and challenges , 2007, StorageSS '07.
[8] Thomas Heinis,et al. Efficient lineage tracking for scientific workflows , 2008, SIGMOD Conference.
[9] Adriane Chapman,et al. Efficient provenance storage , 2008, SIGMOD Conference.
[10] Margo I. Seltzer,et al. Provenance-Aware Storage Systems , 2006, USENIX ATC, General Track.
[11] E. Prud hommeaux,et al. SPARQL query language for RDF , 2011 .
[12] Bhavani M. Thuraisingham,et al. A language for provenance access control , 2011, CODASPY '11.
[13] Jaehong Park,et al. Dependency Path Patterns as the Foundation of Access Control in Provenance-aware Systems , 2012, TaPP.
[14] James Cheney,et al. Provenance management in curated databases , 2006, SIGMOD Conference.
[15] Jaehong Park,et al. Engineering access control policies for provenance-aware systems , 2013, CODASPY '13.
[16] Yogesh L. Simmhan,et al. The Open Provenance Model core specification (v1.1) , 2011, Future Gener. Comput. Syst..
[17] Shouhuai Xu,et al. An Access Control Language for a General Provenance Model , 2009, Secure Data Management.
[18] Margo I. Seltzer,et al. Securing Provenance , 2008, HotSec.
[19] Marianne Winslett,et al. Preventing history forgery with secure provenance , 2009, TOS.
[20] Elisa Bertino,et al. Supporting RBAC with XACML+OWL , 2009, SACMAT '09.
[21] Adriane Chapman,et al. PLUS: A provenance manager for integrated information , 2011, 2011 IEEE International Conference on Information Reuse & Integration.
[22] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[23] Jaehong Park,et al. A provenance-based access control model , 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust.
[24] Mary Ellen Zurko,et al. Separation of duty in role-based environments , 1997, Proceedings 10th Computer Security Foundations Workshop.
[25] Jaehong Park,et al. The UCONABC usage control model , 2004, TSEC.
[26] Yolanda Gil,et al. PROV-DM: The PROV Data Model , 2013 .
[27] Kevin R. B. Butler,et al. Towards secure provenance-based access control in cloud environments , 2013, CODASPY.