A posteriori compliance control
暂无分享,去创建一个
[1] Carl A. Gunter,et al. Policy-directed certificate retrieval , 2000, Softw. Pract. Exp..
[2] Ninghui Li,et al. Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[3] Ninghui Li,et al. Distributed Credential Chain Discovery in Trust Management , 2003, J. Comput. Secur..
[4] Jaehong Park,et al. Towards usage control models: beyond traditional access control , 2002, SACMAT '02.
[5] Stephen Weeks,et al. Understanding trust management systems , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[6] Elisa Bertino,et al. A unified framework for enforcing multiple access control policies , 1997, SIGMOD '97.
[7] Jaehong Park,et al. Originator Control in Usage Control , 2002, POLICY.
[8] Trevor Jim,et al. SD3: a trust management system with certified evaluation , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[9] Xin Wang,et al. XrML -- eXtensible rights Markup Language , 2002, XMLSEC '02.
[10] Jerry den Hartog,et al. An audit logic for accountability , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).
[11] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[12] R. Sandhu,et al. Access control: principles and practice , 1994, IEEE Commun. Mag..
[13] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[14] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.
[15] J. Feigenbaum,et al. The KeyNote trust management system version2, IETF RFC 2704 , 1999 .
[16] Butler W. Lampson,et al. SPKI Certificate Theory , 1999, RFC.
[17] Ronald L. Rivest,et al. Certificate Chain Discovery in SPKI/SDSI , 2002, J. Comput. Secur..
[18] Joan Feigenbaum,et al. Delegation logic: A logic-based approach to distributed authorization , 2003, TSEC.
[19] Martín Abadi,et al. Logic in access control , 2003, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings..
[20] Carl A. Gunter,et al. Models and languages for digital rights , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.
[21] Peter Sewell,et al. Cassandra: flexible trust management, applied to electronic health records , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[22] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[23] Andrew W. Appel,et al. Proof-carrying authentication , 1999, CCS '99.
[24] Elisa Bertino,et al. A logical framework for reasoning about access control models , 2001, SACMAT '01.