RBAC Framework for Web Based Services in Work Flow Foundation
Abstract
Keywords
Full Text:
PDFReferences
H.Khambhammettu , ―On delegation and workflow execution models,‖ in proceedings of 21st ACM Symposium on Applied Computing, pp. 2137-2144, 2008.
L.Chen , ―On spatio-temporal constraints and inheritance in role-based control,‖ in Proceedings of ACM Symposium on information, computer and communications security (ASIACCS 08), pp. 205-216, 2008.
H.khambhammettu, ―Delegation and satisfiability in Workflow system,‖ in Proceedings of 13th ACM Symposium on Access Control Models and Technologies, pp. 31-40, 2008.
Q. Wei, K.Beznosov and M. Ripeanu ,― Auhtorization recycling in RBAC systems,‖ in Proceedings of 13th ACM Symposium on Access Control Models and Technologies, pp. 63-72, 2008.
M. Dekker and S.Etalle, ― RBAC administration in distributed systems,‖ in proceedings of 13th ACM Symposium on Access Control Models and Technologies, pp. 93-102, 2008.
SHEN Hai-bo and HONG Fan,‖An Attribute-Based Access Control Model for Web Services,‖ Proceedings of the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT'06), pp.74-79, Dec.2006.
Qiang Duan Inf. Sci. & Technol. Dept., Pennsylvania State Univ., Abington, PA, USA, ‖Modeling and Analysis of End-to-End Quality of Service Provisioning in Virtualization-Based Future Internet,‖ Computer Communications and Networks (ICCCN), 2010 Proceedings of 19th International Conference, Issue: 2-5, pp. 1-6, Aug. 2010.
Min Xu1, Duminda Wijesekera1 and Xinwen Zhang,‖Runtime Administration of RBAC Profile for XACML,‖ IETRANSACTIONS ON SERVICES COMPUTING Vol. PP, pp.1-1, 2010.
R. Dongwan Shin Dept. of Comput. Sci., New Mexico Tech, Socorro, NM,‖ Controlled sharing of identity attributes for better privacy Lopes,‖ Collaborative Computing: Networking, Applications and Worksharing, 2007. CollaborateCom 2007. International Conference, Issue: 12-15, pp. 2-7, Nov. 2007.
Jin, Z.P. Jian Xu Ming Xu Ning Zheng Comput. Sci. Dept.,Hangzhou Dianzi Technol. Univ., Hangzhou, China, ―An Attribute-Oriented Model for Identity Management,‖ International Conference e-Education, e-Business, e-Management, and e-Learning, 2010. IC4E '10, Issue: 22-24, pp. 440-444, Jan 2010.
Sakai, R.Osaka Electro-Commun. Univ., Neyagawa, ―Flexible identity based attribute encryption from identity based broadcast encryption,‖ International Symposium on Information Theory and Its Applications, 2008. ISITA 2008. Issue: 7-10, pp. 1-4, Dec. 2008.
Qinqin Ni Weizhen Sun Xu Liang. Dept. of Comput. Sci. & Technol., Capital Normal Univ., Beijing, China.‖ Using RBAC to Enforce Solaris System Security,‖ IEEE International Conference on e-Business Engineering, 2008. ICEBE '08. Issue: 22-24, pp. 455, Oct. 2008.
Xu Heng Sch. of Manage., Henan Univ. of Technol., Zhengzhou, China.‖ Knowledge Sharing Model in Collaborative Product Design Based on Role-Based Access Control and Ontology,‖Security & Privacy, IEEE. Issue: 1, Vol: 6, pp. 84,Jan - Feb. 2008.
Bertino, E. Terzi, E. Kamra, A. Vakali, A. Purdue Univ., West Lafayette.‖ Intrusion detection in RBAC-administered databases,‖2nd International Conference on e-Business and Information System Security (EBISS), 2010‖PP. 1, 27 May. 2010.
Wei Shi Jian Wu Ying Li Zhaohui Wu Bo Wang Zhejiang Univ., Hangzhou.‖ Using Improved FOAF to Enhance BPEL-extracted RBAC Capability,‖ 21st Annual Conference on Computer Security Applications. Issue: 5-9, pp. 10, Dec. 2005.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.