Changes between Version 83 and Version 84 of Internal/Rbac/RbacResources
- Timestamp:
- Oct 6, 2006, 8:56:36 PM (18 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
Internal/Rbac/RbacResources
v83 v84 45 45 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/ANSI+INCITS+359-2004.pdf Ame04]] American National Standards Institute Inc. American National Standard for Information Technology - Role Based Access Control. ANSI INCITS 359-2004, February 2004. 46 46 47 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/sdarticle.pdf AMH06]] Gail-Joon Ahn, Badrinath Mohan, and Seng-Phil Hong. Secure information sharing using role-based delegation. ''Journal of Network and Computer Applications'', 2006. In press.47 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/sdarticle.pdf AMH06]] Gail-Joon Ahn, Badrinath Mohan, and Seng-Phil Hong. Towards secure information sharing using role-based delegation. ''Journal of Network and Computer Applications'', 2006. In press. 48 48 49 49 [[http://lists.oasis-open.org/archives/xacml/200404/msg00036.html And04]] Anne Anderson. Re: [xacml] ANSI INCITS 359-2004 etc. e-mail to Robin Cover of Isogen, April 2004. … … 299 299 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/00630829.pdf GDS97]] Mats Gustafsson, Benoit Deligny, and Nahid Shahmehri. Using NFS to Implement Role-Based Access Control. In ''WET-ICE '97: Proceedings of the 6th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises'', pages 299--304, Washington, DC, USA, 1997. IEEE Computer Society. 300 300 301 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/gao-etal-2004.pdf GDYE04]] Shu Gao, Yi Deng, Huiqin Yu, Xudong He, Konstan in Beznosov, and Kendra Cooper. Applying Aspect-Orientation in Designing Security Systems: A Case Study. In ''Proceedings of the Sixteenth International Conference on Software Engineering and Knowledge Engineering'', 2004.301 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/gao-etal-2004.pdf GDYE04]] Shu Gao, Yi Deng, Huiqin Yu, Xudong He, Konstantin Beznosov, and Kendra Cooper. Applying Aspect-Orientation in Designing Security Systems: A Case Study. In ''Proceedings of the Sixteenth International Conference on Software Engineering and Knowledge Engineering'', 2004. 302 302 303 303 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/00674833.pdf GGF98]] Virgi D. Gligor, Serban I. Gavrila, and David Ferraiolo. On the Formal Definition of Separation-of-Duty Policies and Their Composition. In ''Proceedings of the 19th IEEE Computer Society Symposium on Research in Security and Privacy'', pages 1--12, Washington, DC, USA, May 1998. IEEE Computer Society. … … 329 329 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/cs1050005.pdf Gov04]] Government Reform Committee. Report of the Best Practices and Metrics Teams. Technical Report CS1/05-0005, United States House of Representatives, November 2004. Corporate Information Security Working Group of the Subcommittee on Technology, Information Policy, Intergovernmental Relations and the Census of the Government Reform Committee. 330 330 331 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/01665170.pdf GOvE06]] Sachin Ganu, Maximilian Ott, Ivan Šeškar, Dipankar Raychaudhuri, and Sanjoy Paul. Architecture and Framework for Supporting Open-Access Multi-user Wireless Experimentation. In ''Proceedings of the First International Conference on Communication System Software and Middleware, Comsware 2006'', pages 1--9, New York, NY USA, January 2006. IEEE Communiations Society. 332 331 333 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/01624027.pdf GPR06]] Zvi Gutterman, Benny Pinkas, and Tzachy Reinman. Analysis of the Linux Random Number Generator. Cryptology ePrint Archive, Report 2006/086, 2006. url = http://eprint.iacr.org/. 332 334 … … 337 339 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/STAT_RBAC_Paper.pdf Har06]] Harris Corp. Role-Based Access Control In Network Vulnerability Management. Technical report, Harris Corp., March 2006. 338 340 341 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/exposed.pdf Hat03]] Brian Hatch. Linux File Permission Confusion pt 2. Hacking Linux Exposed web site, April 2003. http://www.hackinglinuxexposed.com/articles/20030424.html. 342 339 343 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/341.pdf Hil97]] Burkhard Hilchenbach. Observations on the Real-World Implementation of Role-Based Access Control. In ''Proceedings of the 20th National Information Systems Security Conference'', pages 341--352, October 1997. 340 344 … … 439 443 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/p18-lampson.pdf Lam71]] Butler W. Lampson. Protection. In ''Proceedings of the Fifth Princeton Symposium on Information Sciences and Systems'', pages 437--443, Princeton, NJ, USA, March 1971. 440 444 441 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/waveset_WP_HIPAA_Compliance.pdf Lan03]] Doug Landoll. Achieving HIPAA Compliance with I ndentity Management from Waveset. Technical report, Waveset Technologies, Inc., 2003.445 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/waveset_WP_HIPAA_Compliance.pdf Lan03]] Doug Landoll. Achieving HIPAA Compliance with Identity Management from Waveset. Technical report, Waveset Technologies, Inc., 2003. 442 446 443 447 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/aboutRBACStandard.pdf LBB06]] Ninghui Li, Ji-Won Byun, and Elisa Bertino. A Critique of the ANSI Standard on Role Based Access Control. ''IEEE Security and Privacy'', 2006. Revision under review. … … 545 549 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/p113-oh.pdf OSZ06]] Sejong Oh, Ravi Sandhu, and Xinwen Zhang. An Effective Role Administration Model Using Organization Structure. ''ACM Trans. Inf. Syst. Secur.'', 9(2):113--137, 2006. 546 550 551 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/orbit-software-architecture-v2-1.pdf OvSS05]] Maximilian Ott, Ivan Šeškar, Robert J. Siracusa, and Manpreet Singh. ORBIT Testbed Software Architecture: Supporting Experiments as a Service. In ''Proceedings of the First International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, Tridentcom 2005'', pages 136--145, New York, NY USA, February 2005. IEEE Communiations Society. 552 547 553 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/diss-jean.pdf Par99]] Joon S. Park. ''Secure Attribute Services on the Web''. PhD thesis, George Mason University, 1999. Dissertation Director: Dr. Ravi Sandhu. 548 554 … … 609 615 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/p103-roeckle.pdf RSW00]] Haio Roeckle, Gerhard Schimpf, and Rupert Weidinger. Process-Oriented Approach for Role-Finding to Implement Role-Based Security Administration in a Large Industrial Organization. In ''RBAC '00: Proceedings of the Fifth ACM Workshop on Role-Based Access Control'', pages 103--110, New York, NY, USA, 2000. ACM Press. 610 616 611 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/01607578.pdf RY05]] Indrakshi Ray and Lijun Yu. Short Paper: Towards a Location-Aware Role-Based Access Control Model. In ''Proceedings of the 1st IEEE Conference on Security and Privacy for Emerging Areas in Commmunication Networks'', pages 234--236, Los Alamitos, CA, USA, September 2005. IEEE Computer Society. 617 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/Orbit_WCNC_05_final.pdf RvOE05]] Dipankar Raychaudhuri, Ivan Šeškar, Maximilian Ott, Sachin Ganu, Kishore Ramachandran, Haris Kremo, Robert J. Siracusa, Hang Liu, and Manpreet Singh. Overview of the ORBIT Radio Grid Testbed for Evaluation of Next-Generation Wireless Network Protocols. In ''Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC 2005)'', volume 3, pages 1664--1669, New York, NY USA, March 2005. IEEE Communiations Society. 618 619 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/01607578.pdf RY05]] Indrakshi Ray and Lijun Yu. Short Paper: Towards a Location-Aware Role-Based Access Control Model. In ''Proceedings of the 1st IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks'', pages 234--236, Los Alamitos, CA, USA, September 2005. IEEE Computer Society. 612 620 613 621 [[http://www.developerdotstar.com/community/node/482 S06]] Ifti S. Implementing RBAC on .Net. developer dot star web site, May 2006. … … 755 763 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/draft-rbac-implementation-std-v01.pdf Tec06]] INCITS Committee on Information Technology Standards. DRAFT Role Based Access Control Implementation Standard, January 2006. 756 764 757 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/sg244986.pdf TEGE04]] Steven Tuttle, Ami Ehlenberger, Ramakrishna Gorthi, Jay Leiserson, Richard Macbeth, Nathan Owen, Sunil Ranahandola, Michael Storrs, and Chunhui Yang. ''Understanding LDAP Des gn and Implementation''. IBM Redbook. IBM International Technical Support Organization, ibm.com/redbooks, second edition, June 2004.765 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/sg244986.pdf TEGE04]] Steven Tuttle, Ami Ehlenberger, Ramakrishna Gorthi, Jay Leiserson, Richard Macbeth, Nathan Owen, Sunil Ranahandola, Michael Storrs, and Chunhui Yang. ''Understanding LDAP Design and Implementation''. IBM Redbook. IBM International Technical Support Organization, ibm.com/redbooks, second edition, June 2004. 758 766 759 767 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/p13-thomas.pdf Tho97]] Roshan K. Thomas. Team-Based Access Control (TMAC): A Primitive for Applying Role-Based Access Controls in Collaborative Environments. In ''RBAC '97: Proceedings of the Second ACM Workshop on Role-Based Access Control'', pages 13--19, New York, NY, USA, 1997. ACM Press. … … 769 777 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/b93tba.pdf TS93]] Roshan K. Thomas and Ravi S. Sandhu. Task-Based Authorization: A Paradigm for Flexible and Adaptable Access Control in Distributed Applications (Extended Abstract). In ''Proceedings of the 16th NIST-NCSC National Computer Security Conference'', pages 409--415, September 1993. 770 778 771 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/i97tbac.pdf TS98]] Roshan K. Thomas and Ravi S. Sandhu. Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Aut orization Management. In ''Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI'', pages 166--181, London, UK, 1998. Chapman & Hall, Ltd.779 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/i97tbac.pdf TS98]] Roshan K. Thomas and Ravi S. Sandhu. Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Authorization Management. In ''Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI'', pages 166--181, London, UK, 1998. Chapman & Hall, Ltd. 772 780 773 781 [[http://orbit-lab.org/attachment/wiki/Internal/Rbac/RbacResources/p405-vuong.pdf VSD01]] Nathan N. Vuong, Geoffrey S. Smith, and Yi Deng. Managing Security Policies in a Distributed Environment Using eXtensible Markup Language (XML). In ''SAC '01: Proceedings of the 2001 ACM Symposium on Applied Computing'', pages 405--411, New York, NY, USA, 2001. ACM Press.