Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/286884.286908acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article
Free access

Role and task-based access control in the PerDiS groupware platform

Published: 01 October 1998 Publication History
First page of PDF

References

[1]
Atluri, V. and Huang, W-K., An Authorization Model for Workflows, Proceedings of the Fifth European Symposium on Research in Computer Security, Rome, Italy, and Lecture Notes in Computer Science, No. 1146, Springer- Verlag, September, 1996
[2]
Coulouris, G. and Dollimore, J., Security requirements for cooperative work: a model and its system implications, 6th SIGOPS European Workshop, Dagstuhl, Sept 1994.
[3]
Coulouris, G. and Dollimore, J., A Security Model for Cooperative Work. Tech. Report 674, Dept. of CS, Queen Mary and Westfield College, August 1994. ftp://ftp.dcs.qmw.ac.uk/pub/distrib/publicatio ns/TR674-Revised-Security-Model.ps.gz.
[4]
Coulouris, G., Dollimore, J. and Roberts, M., Secure communication for distributed objects in non-uniform trust environments. ECOOP Workshop on Distributed Object Security, Brussels, July 1998. http://ww w'dcs'qmw'ac'uk/research/distrib/p erdis/papers/secure-communication.ps
[5]
Greif, I. and Sarin, S. Data Sharing in Group Work, In Proceedings of First Conference on Computer Supported Cooperative Work, (Austin Texas). ACM New York, December 1986. Pages 175-183.
[6]
Lampson, B.W., Abadi, M., Burrows, M. and Wobber, E. Authentication in Distributed systems: Theory and Practice. A CM Trans. on Computer Systems, 10, 4, Nov. 1992. Pages 265-310.
[7]
Sandhu, R.S., Access Control: the Neglected Frontier. Proc. First Australian Conference on information Security and Privacy, Springer 1996.
[8]
Shen, H.H. and Dewan, P., Access Control for Collaborative Environments, Proceeding of A CM CSCW '92. Pages 51-58.
[9]
R. Thomas, R. and Sandhu, R., Conceptual foundations for a model of task-based authorizations, Proceedings of the Computer Security Foundations Workshop VII, Fanconia, New Hampshire, IEEE Press, 1994.
[10]
van Doorn, L., Abadi, M., Burrows, M, and Wobber,E., Secure Network Objects, Proceedings of the IEEE Security and Privacy Conference, Oakland CA, May 1996.
[11]
Wobber, E., Abadi, M., Burrows, M. and Lampson, B.W., Authentication in the TAOS operating system, A CM Operating Systems Review, December 1993. Pages 256-269.

Cited By

View all
  • (2024)The Access Control Technology of Domestic Gateway in Nuclear Safety-Level DCS SystemNew Energy Power Generation Automation and Intelligent Technology10.1007/978-981-97-7051-9_46(549-560)Online publication date: 5-Sep-2024
  • (2019)A Secure and Efficient Digital-Data-Sharing System for Cloud EnvironmentsSensors10.3390/s1912281719:12(2817)Online publication date: 24-Jun-2019
  • (2014)How to guarantee compliance between workflows and product lifecycles?Information Systems10.1016/j.is.2014.01.00642(195-215)Online publication date: 1-Jun-2014
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
RBAC '98: Proceedings of the third ACM workshop on Role-based access control
October 1998
121 pages
ISBN:1581131135
DOI:10.1145/286884
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 October 1998

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

RBAC98
Sponsor:
RBAC98: Third ACM Workshop on Role-Based Access Control
October 22 - 23, 1998
Virginia, Fairfax, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)69
  • Downloads (Last 6 weeks)10
Reflects downloads up to 21 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)The Access Control Technology of Domestic Gateway in Nuclear Safety-Level DCS SystemNew Energy Power Generation Automation and Intelligent Technology10.1007/978-981-97-7051-9_46(549-560)Online publication date: 5-Sep-2024
  • (2019)A Secure and Efficient Digital-Data-Sharing System for Cloud EnvironmentsSensors10.3390/s1912281719:12(2817)Online publication date: 24-Jun-2019
  • (2014)How to guarantee compliance between workflows and product lifecycles?Information Systems10.1016/j.is.2014.01.00642(195-215)Online publication date: 1-Jun-2014
  • (2012)The Research and Development of Digital Platform Supporting Gun Virtual Prototype DesignAdvanced Materials Research10.4028/www.scientific.net/AMR.482-484.2055482-484(2055-2059)Online publication date: Feb-2012
  • (2011)A dynamic workflow authorization method based on participant expression rules2011 IEEE International Conference on Computer Science and Automation Engineering10.1109/CSAE.2011.5952865(345-349)Online publication date: Jun-2011
  • (2010)A dynamic web service-based trust and reputation scheme for scientific workflowsProceedings of the 12th International Conference on Information Integration and Web-based Applications & Services10.1145/1967486.1967499(56-63)Online publication date: 8-Nov-2010
  • (2010)Hierarchical and dynamic security access control for collaborative design in virtual enterprise2010 2nd IEEE International Conference on Information Management and Engineering10.1109/ICIME.2010.5477976(723-726)Online publication date: Apr-2010
  • (2009)Access Control Architecture Design Issues in Enterprise Collaborative Environment2009 International Conference on Management and Service Science10.1109/ICMSS.2009.5301672(1-4)Online publication date: Sep-2009
  • (2008)A Workflow-Based Access Control Framework for e-Health ApplicationsProceedings of the 22nd International Conference on Advanced Information Networking and Applications - Workshops10.1109/WAINA.2008.131(111-120)Online publication date: 25-Mar-2008
  • (2008)Multi-hierarchy and fine-grained task-role-based access control in collaborative environments2008 IEEE International Conference on Industrial Engineering and Engineering Management10.1109/IEEM.2008.4738140(1591-1595)Online publication date: Dec-2008
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media