XACML

Results: 149



#Item
1Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

Add to Reading List

Source URL: www.cs.bham.ac.uk

Language: English - Date: 2009-02-25 10:33:24
    2Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

    Synthesising Verified Access Control Systems in XACML Nan Zhang School of Computer Science University of Birmingham Birmingham, UK, B15 2TT

    Add to Reading List

    Source URL: www.cs.bham.ac.uk.

    Language: English - Date: 2009-02-25 10:33:24
      32  SAML 2.0 profile of XACML v2.0 3

      2 SAML 2.0 profile of XACML v2.0 3

      Add to Reading List

      Source URL: docs.oasis-open.org

      - Date: 2005-05-27 14:38:23
        4Draft NISTIR 8112, Attribute Metadata

        Draft NISTIR 8112, Attribute Metadata

        Add to Reading List

        Source URL: csrc.nist.gov

        Language: English - Date: 2016-08-01 15:13:29
        5Information Visualization for Rule-based Resource Access Control Jaime Montemayor, Andrew Freeman, John Gersh, Thomas Llanso, Dennis Patrone The Johns Hopkins University Applied Physics LaboratoryJohns Hopkins Roa

        Information Visualization for Rule-based Resource Access Control Jaime Montemayor, Andrew Freeman, John Gersh, Thomas Llanso, Dennis Patrone The Johns Hopkins University Applied Physics LaboratoryJohns Hopkins Roa

        Add to Reading List

        Source URL: cups.cs.cmu.edu

        Language: English - Date: 2006-06-02 15:04:21
        6A Toolchain for Model-Based Design and Testing of Access Control Systems Said Daoudagh1 , Donia El Kateb2 , Francesca Lonetti1 , Eda Marchetti1 and Tejeddine Mouelhi3 1 Istituto  di Scienza e Tecnologie dell’Informazio

        A Toolchain for Model-Based Design and Testing of Access Control Systems Said Daoudagh1 , Donia El Kateb2 , Francesca Lonetti1 , Eda Marchetti1 and Tejeddine Mouelhi3 1 Istituto di Scienza e Tecnologie dell’Informazio

        Add to Reading List

        Source URL: www.itrust.lu

        Language: English - Date: 2015-03-09 10:06:50
        7Producing Hook Placements to Enforce Expected Access Control Policies No Author Given No Institute Given  Abstract. Many security-sensitive programs manage resources on behalf of mutually distrusting clients. To control

        Producing Hook Placements to Enforce Expected Access Control Policies No Author Given No Institute Given Abstract. Many security-sensitive programs manage resources on behalf of mutually distrusting clients. To control

        Add to Reading List

        Source URL: www.cse.psu.edu

        Language: English - Date: 2014-11-18 10:12:45
        8Milestone MJRA1.3: Design for the integration of an Attribute Management Tool

        Milestone MJRA1.3: Design for the integration of an Attribute Management Tool

        Add to Reading List

        Source URL: aarc-project.eu

        Language: English - Date: 2016-07-21 05:59:16
        9Security Enforcement for Multi-Cloud Platforms K. Kritikos (FORTH), T. Kirkham (STFC), B. Kryza (AGH) & P. Massonet (CETIC

        Security Enforcement for Multi-Cloud Platforms K. Kritikos (FORTH), T. Kirkham (STFC), B. Kryza (AGH) & P. Massonet (CETIC

        Add to Reading List

        Source URL: cf2015.holacloud.eu

        Language: English - Date: 2015-10-12 10:38:44
        10IHE Work Item Proposal (Detailed) 1. Proposed Work Item: Patient Privacy Policy Query Proposal Editor: IHE Suisse Tony Schaller (Technical Project Manager)

        IHE Work Item Proposal (Detailed) 1. Proposed Work Item: Patient Privacy Policy Query Proposal Editor: IHE Suisse Tony Schaller (Technical Project Manager)

        Add to Reading List

        Source URL: www.ihe-suisse.ch

        Language: English - Date: 2016-05-17 20:50:28