Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/319171.319185acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
Article
Free access

Napoleon: network application policy environment

Published: 28 October 1999 Publication History
First page of PDF

References

[1]
D. Thomsen, R. O'Brien, J. Bogle. "Role Based Access Control Framework for Network Enterprises," Proceedings of the 14th annual Computer Security Applications Conference, pp. 50-58, December 1998.
[2]
R. Orfali, D. Harkey, "Client/Server Programming with Java and CORBA," Wiley, New York, 1998.
[3]
R. Sandhu, Q. Munawer. "The RRA97 Model for Role-Based Administration of Role Hierarchies," Proceedings of the 14th annual Computer Security Applications Conference, pp. 39- 49, December t998.
[4]
T. Keefe, "Mapping Napoleon Concepts to CORBASEC V2," internal report, Secure Computing Corporation, November 1998.
[5]
D. Sterne, G. Tally, C. McDonell, P. Pasturel, D. Sames, D. Sherman, E. Sebes, "Scalable Access Control for Distributed Object Systems," to appear in Proceedings of the 8th USENIX Security Symposium, Washington, DC, August 1999.
[6]
R. Awischus, "Role Based Access Control with the Security Administration Manager (SAM)," Proceedings of the second ACM Workshop on Role-Based Access Control, pp. 61-68, November 1997.
[7]
M. Zurko, R. Simmon, "User-Centered Security," New Security Paradigms Workshop, September 1996.
[8]
R. Sessions, "COM and DCOM: Microsoft's vision for Distributed Objects," Wiley, New York, December 1997.

Cited By

View all
  • (2011)Practical policy patternsProceedings of the first ACM conference on Data and application security and privacy10.1145/1943513.1943543(225-230)Online publication date: 21-Feb-2011
  • (2009)Building a Responsibility Model Including Accountability, Capability and Commitment2009 International Conference on Availability, Reliability and Security10.1109/ARES.2009.45(412-419)Online publication date: Mar-2009
  • (2008)Preliminary Literature Review of Policy Engineering Methods; Toward Responsibility Concept2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications10.1109/ICTTA.2008.4529912(1-6)Online publication date: Apr-2008
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
RBAC '99: Proceedings of the fourth ACM workshop on Role-based access control
October 1999
160 pages
ISBN:1581131801
DOI:10.1145/319171
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 28 October 1999

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

RBAC99
Sponsor:
RBAC99: Fourth ACM Workshop on Role-Based Access Control
October 28 - 29, 1999
Virginia, Fairfax, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)37
  • Downloads (Last 6 weeks)4
Reflects downloads up to 01 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2011)Practical policy patternsProceedings of the first ACM conference on Data and application security and privacy10.1145/1943513.1943543(225-230)Online publication date: 21-Feb-2011
  • (2009)Building a Responsibility Model Including Accountability, Capability and Commitment2009 International Conference on Availability, Reliability and Security10.1109/ARES.2009.45(412-419)Online publication date: Mar-2009
  • (2008)Preliminary Literature Review of Policy Engineering Methods; Toward Responsibility Concept2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications10.1109/ICTTA.2008.4529912(1-6)Online publication date: Apr-2008
  • (2008)Homonymous role in role‐based discretionary access controlWireless Communications and Mobile Computing10.1002/wcm.7009:9(1287-1300)Online publication date: 20-Oct-2008
  • (2007)Requirements for scalable access control and security management architecturesACM Transactions on Internet Technology10.1145/1239971.12399727:2(8-es)Online publication date: 1-May-2007
  • (2007)Classification Model for Access Control Constraints2007 IEEE International Performance, Computing, and Communications Conference10.1109/PCCC.2007.358921(410-417)Online publication date: Apr-2007
  • (2007)User Feedback in Probabilistic IntegrationProceedings of the 18th International Conference on Database and Expert Systems Applications10.1109/DEXA.2007.146(377-381)Online publication date: 3-Sep-2007
  • (2004)MesmerizeProceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 3210.5555/976440.976445(37-42)Online publication date: 1-Jan-2004
  • (2002)Advanced features for enterprise-wide role-based access control18th Annual Computer Security Applications Conference, 2002. Proceedings.10.1109/CSAC.2002.1176305(333-342)Online publication date: 2002
  • (2001)Checkmate network security modelingProceedings DARPA Information Survivability Conference and Exposition II. DISCEX'0110.1109/DISCEX.2001.932217(214-226)Online publication date: 2001
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media