Cassandra: distributed access control policies with tunable expressiveness
暂无分享,去创建一个
[1] Michael J. Maher,et al. Constraint Logic Programming: A Survey , 1994, J. Log. Program..
[2] Ninghui Li,et al. Distributed credential chain discovery in trust management: extended abstract , 2001, CCS '01.
[3] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[4] Naomi Baker,et al. Deeniteness Analysis for Clp(r) , 1993 .
[5] Marianne Winslett,et al. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation , 2003, TSEC.
[6] Jean Bacon,et al. A model of OASIS role-based access control and its support for active security , 2002, ACM Trans. Inf. Syst. Secur..
[7] Joan Feigenbaum,et al. KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.
[8] Bart Kuijpers,et al. Introduction to constraint databases , 2002, SGMD.
[9] Ravi S. Sandhu,et al. Rationale for the RBAC96 family of access control models , 1996, RBAC '95.
[10] Ninghui Li,et al. DATALOG with Constraints: A Foundation for Trust Management Languages , 2003, PADL.
[11] K.E. Seamons,et al. Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[12] Jean Bacon,et al. A model of OASIS role-based access control and its support for active security , 2001, TSEC.
[13] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[14] Peter Sewell,et al. Cassandra: flexible trust management, applied to electronic health records , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[15] Ronald L. Rivest,et al. Certificate Chain Discovery in SPKI/SDSI , 2002, J. Comput. Secur..
[16] Peter J. Stuckey,et al. Flexible access control policy specification with constraint logic programming , 2003, TSEC.
[17] Ronald L. Rivest,et al. Can We Eliminate Certificate Revocations Lists? , 1998, Financial Cryptography.
[18] Ninghui Li,et al. Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[19] Carl A. Gunter,et al. Policy‐directed certificate retrieval , 2000 .
[20] Peter J. Stuckey,et al. Memoing Evaluation for Constraint Extensions of Datalog , 1997 .
[21] Ninghui Li,et al. Towards practical automated trust negotiation , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[22] Trevor Jim,et al. SD3: a trust management system with certified evaluation , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[23] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.