Building a Distributed Semantic-aware Security Architecture
暂无分享,去创建一个
[1] William E. Johnston,et al. Authorization and attribute certificates for widely distributed access control , 1998, Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253).
[2] Rolf Oppliger,et al. Authentication and authorization infrastructures (AAIs): a comparative survey , 2004, Comput. Secur..
[3] Jos de Bruijn,et al. Web Service Modeling Ontology , 2005, Appl. Ontology.
[4] Joon S. Park,et al. Smart Certi cates: Extending X.509 for Secure Attribute Services on the Web , 1999 .
[5] Francis G. McCabe,et al. Reference Model for Service Oriented Architecture 1.0 , 2006 .
[6] Andreas Matheus,et al. How to Declare Access Control Policies for XML Structured Information Objects using OASIS' eXtensible Access Control Markup Language (XACML) , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[7] Elisa Bertino,et al. A Content-Based Authorization Model for Digital Libraries , 2002, IEEE Trans. Knowl. Data Eng..
[8] James A. Hendler,et al. The Semantic Web" in Scientific American , 2001 .
[9] Nora Kamprath,et al. Supporting attribute-based access control with ontologies , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[10] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[11] David W. Chadwick,et al. Role-Based Access Control With X.509 Attribute Certificates , 2003, IEEE Internet Comput..
[12] Ravi S. Sandhu,et al. Peer-to-peer access control architecture using trusted computing technology , 2005, SACMAT '05.
[13] Tal Garfinkel,et al. Terra: a virtual machine-based platform for trusted computing , 2003, SOSP '03.
[14] LouAnna Notargiacomo,et al. Beyond the pale of MAC and DAC-defining new forms of access control , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[15] Eduardo B. Fernandez,et al. Patterns for session-based access control , 2006, PLoP '06.
[16] Siani Pearson,et al. Trusted Computing Platforms: TCPA Technology in Context , 2002 .
[17] José A. Montenegro,et al. A Practical Approach of X.509 Attribute Certificate Framework as Support to Obtain Privilege Delegation , 2004, EuroPKI.
[18] Tim Moses,et al. EXtensible Access Control Markup Language (XACML) version 1 , 2003 .
[19] Günther Pernul,et al. ABAC - Ein Referenzmodell für attributbasierte Zugriffskontrolle , 2005, Sicherheit.