The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

David F. Ferraiolo: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Pablo Galiasso, Oliver Bremer, John Hale, Sujeet Shenoi, David F. Ferraiolo, Vincent C. Hu
    Policy Mediation for Multi-Enterprise Environments. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:100-106 [Conf]
  2. Vincent C. Hu, David F. Ferraiolo, Karen Scarfone
    Access Control Policy Combinations for the Grid Using the Policy Machine. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2007, pp:225-232 [Conf]
  3. Vincent C. Hu, Deborah A. Frincke, David F. Ferraiolo
    The Policy Machine for Security Policy Management. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science (2), 2001, pp:494-506 [Conf]
  4. David F. Ferraiolo, John F. Barkley
    Specifying and managing role-based access control within a corporate intranet. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:77-82 [Conf]
  5. David F. Ferraiolo, D. Richard Kuhn
    Future directions in role-based access control. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
  6. David Ferriaolo
    User's Perspectives (Panel Session). [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:67- [Conf]
  7. David Ferriaolo
    Products and Tools (Panel Session). [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:131- [Conf]
  8. Ravi S. Sandhu, David F. Ferraiolo, D. Richard Kuhn
    The NIST model for role-based access control: towards a unified standard. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 2000, pp:47-63 [Conf]
  9. David F. Ferraiolo
    An argument for the role-based access control model. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:142-143 [Conf]
  10. David F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila
    The role control center: features and case studies. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:12-20 [Conf]
  11. David F. Ferraiolo, Serban I. Gavrila, Vincent C. Hu, D. Richard Kuhn
    Composing and combining policies under the policy machine. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:11-20 [Conf]
  12. Timothy Fraser, David F. Ferraiolo, Mikel L. Matthews, Casey Schaufler, Stephen Smalley, Robert Watson
    Panel: which access control technique will provide the greatest overall benefit-Abstract. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:141- [Conf]
  13. Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
    The Computational Complexity of Enforceability Validation for Generic Access Control Rules. [Citation Graph (0, 0)][DBLP]
    SUTC (1), 2006, pp:260-267 [Conf]
  14. David F. Ferraiolo, John F. Barkley, D. Richard Kuhn
    A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1999, v:2, n:1, pp:34-64 [Journal]
  15. David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn, Ramaswamy Chandramouli
    Proposed NIST standard for role-based access control. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2001, v:4, n:3, pp:224-274 [Journal]

  16. A meta model for access control: why is it needed and is it even possible to achieve? [Citation Graph (, )][DBLP]


  17. On the Formal Definition of Separation-of-Duty Policies and their Composition. [Citation Graph (, )][DBLP]


  18. A trust domain management schema for multiple grid environments. [Citation Graph (, )][DBLP]


  19. Role-Based Access Controls [Citation Graph (, )][DBLP]


Search in 0.020secs, Finished in 0.021secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002