Information Technology Reference
In-Depth Information
References
1. Ferraiolo, D. F., Sandhu, R., Bavrila, S., Kuhn, D. R., Chandramouli, R.: Proposed NIST
Standard for Role-Based Access Control, ACM Transactions on Information and System
Security, 4(3), (2001) 224-274
2. ITI (Information Technology Industry Council), Role Based Access Control ITU/T. Rec-
ommendation X.509, ISO/IEC 9594-8, Information Technology Open Systems Interconnec-
tion - The Directory: Public-Key and Attribute Certificate Frameworks (2003)
3. English, C., Nixon, P., Terzis, S., McGetrtrick, A., Lowe, H.: Dynamic Trust Models for
Ubiquitous Computing Environments. Workshop on Security in Ubiquitous Computing
(2002)
4. Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization. IETF
RFC 3281 (2002)
5. Yang, S.: Role Based Access Control Supporting Coherent Caching of Privilege Delegation
Which Utilizes Group Key. The Journal of Suwon Information Technology, Vol. 3 (2004)
6. Joshi, J.B.D., Bertino, E., Ghafoor, A.: Temporal hierarchies and inheritance semantics for
GTRBAC. Proceedings of the seventh ACM symposium on Access control models and
technologies, Monterey, California, USA (2002) 74 - 83
7. Goldberg, A., Buff, R., Schmitt, A.: Secure Web Server Performance Dramatically Im-
proved by Caching SSL Session Keys. Workshop on Internet Server Performance held in
conjunction with SIGMETRICS '98 (1998)
8. Setia, S., Zhu, S., Jajodia, S.: A Comparative Performance Analysis of Reliable Group Re-
key Transport Protocols for Secure Multicast, proc. of the Performance (2002)
9. Rafaeli, S., Hutchison, D.: A Survey of Key Management for Secure Group Communica-
tion. ACM Computing Surveys, Vol. 35, No. 3 (2003)
 
Search WWH ::




Custom Search