|
Search the dblp DataBase
David F. Ferraiolo:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Pablo Galiasso, Oliver Bremer, John Hale, Sujeet Shenoi, David F. Ferraiolo, Vincent C. Hu
Policy Mediation for Multi-Enterprise Environments. [Citation Graph (0, 0)][DBLP] ACSAC, 2000, pp:100-106 [Conf]
- Vincent C. Hu, David F. Ferraiolo, Karen Scarfone
Access Control Policy Combinations for the Grid Using the Policy Machine. [Citation Graph (0, 0)][DBLP] CCGRID, 2007, pp:225-232 [Conf]
- Vincent C. Hu, Deborah A. Frincke, David F. Ferraiolo
The Policy Machine for Security Policy Management. [Citation Graph (0, 0)][DBLP] International Conference on Computational Science (2), 2001, pp:494-506 [Conf]
- David F. Ferraiolo, John F. Barkley
Specifying and managing role-based access control within a corporate intranet. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1997, pp:77-82 [Conf]
- David F. Ferraiolo, D. Richard Kuhn
Future directions in role-based access control. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1995, pp:- [Conf]
- David Ferriaolo
User's Perspectives (Panel Session). [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1999, pp:67- [Conf]
- David Ferriaolo
Products and Tools (Panel Session). [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1999, pp:131- [Conf]
- Ravi S. Sandhu, David F. Ferraiolo, D. Richard Kuhn
The NIST model for role-based access control: towards a unified standard. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 2000, pp:47-63 [Conf]
- David F. Ferraiolo
An argument for the role-based access control model. [Citation Graph (0, 0)][DBLP] SACMAT, 2001, pp:142-143 [Conf]
- David F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila
The role control center: features and case studies. [Citation Graph (0, 0)][DBLP] SACMAT, 2003, pp:12-20 [Conf]
- David F. Ferraiolo, Serban I. Gavrila, Vincent C. Hu, D. Richard Kuhn
Composing and combining policies under the policy machine. [Citation Graph (0, 0)][DBLP] SACMAT, 2005, pp:11-20 [Conf]
- Timothy Fraser, David F. Ferraiolo, Mikel L. Matthews, Casey Schaufler, Stephen Smalley, Robert Watson
Panel: which access control technique will provide the greatest overall benefit-Abstract. [Citation Graph (0, 0)][DBLP] SACMAT, 2001, pp:141- [Conf]
- Vincent C. Hu, D. Richard Kuhn, David F. Ferraiolo
The Computational Complexity of Enforceability Validation for Generic Access Control Rules. [Citation Graph (0, 0)][DBLP] SUTC (1), 2006, pp:260-267 [Conf]
- David F. Ferraiolo, John F. Barkley, D. Richard Kuhn
A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 1999, v:2, n:1, pp:34-64 [Journal]
- David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn, Ramaswamy Chandramouli
Proposed NIST standard for role-based access control. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2001, v:4, n:3, pp:224-274 [Journal]
A meta model for access control: why is it needed and is it even possible to achieve? [Citation Graph (, )][DBLP]
On the Formal Definition of Separation-of-Duty Policies and their Composition. [Citation Graph (, )][DBLP]
A trust domain management schema for multiple grid environments. [Citation Graph (, )][DBLP]
Role-Based Access Controls [Citation Graph (, )][DBLP]
Search in 0.004secs, Finished in 0.005secs
|