14
Homeland Security Presidential Directive 12 (HSPD-
12), 27 August 2004.
15
ITU-T X.509 (formerly CCITT X.509) or ISO/IEC/ITU
9594-8,X.509v3, 1996.
16
ISO/IEC 9594-1:1993, X. 500, 1991.
REFERENCES
Abadi, M. B., et al (1993). A calculus for access control in
distributed systems. ACM Transactions on
Programming Languages and Systems, Vol. 15(No. 4),
706-734.
Baskerville, R., and Siponen, Milo. (2002). An
information security meta-policy for emergent
organizations. Logistics Information Management,
Vol. 15(No. 5/6), 337-346.
Bell, D. E. (1994, February 1994). Modeling the
"multipolicy machine". Paper presented at the New
Security Paradigms Workshop, Little Compton, RI,
US.
Bertino, E. C., et al (2001, 3-4 May, 2001). A logical
framework for reasoning about access control models.
Paper presented at the SACMAT'01, Chantilly, VA,
USA.
Brézillon, P., and Mostéfaoui, Ghita Kouadri. (2004).
Context-based security policies: A new modeling
approach. Paper presented at the Second IEEE Annual
Conference on Pervasive Computing and
Communications Workshops (PERCOMW'04).
Ferraiolo, D. and. Kuhn., D.M. (1995, October 1999).
Role-based access controls. Paper presented at the
Fifteenth Annual National Computer Security
Conference (NCSC), Baltimore, MD.
Gligor, V. (1995). Characteristics of role-based access
control. Paper presented at the Proceedings of the first
ACM Workshop on Role-based access control,
Gaithersburg, MD, USA.
Government, U.S. (2001) Defense Authorization Act,
Government Information Security Reform Act
(GISRA), U.S. Congress, 106 Sess.(2001).
Government, U. S. (2003). The 9/11 commission report,
final report of the National commission on terrorist
attacks upon the United States. New York, NY: W.W.
Norton & Company Inc.
Hafmann, U.; and Kuhnhauser, Winfried. (1999).
Embedding security policies into a distributed
computing environment. SIGOPS Operating System
Review, Vol. 33(No. 2), pp. 51-64.
Han, Y. F., Liu; Hong, Zhang. (2000). An object-oriented
model of access control based on role. ACM SIGSOFT
Software Engineering Notes, Vol. 25(No.2), 64-68.
Hosmer, H. H. (1991, 3 December 1991). Metapolicies I.
Paper presented at the ACM SIGSAC Special
Workshop on Data Management Security and Privacy
Standards, San Antonio, TX.
Hosmer, H. H. (1993). The multipolicy paradigm for
trusted systems. Paper presented at the New Security
Paradigms Workshop, Little Compton, RI, US.
Jaeger Trent, et al (2003). Policy management using
access control spaces. ACM Transactions on
Information and System Security (TISSEC), Vol. 6(No.
3), 327-364.
Jaeger, Trent. Treadwell., Jonathon. (2001). Practical
safety in flexible access control models. ACM
Transactions on Information and System Security, Vol.
4(No. 2), pp. 158-190.
International Committee for IT Standards/ANSI. (2004).
Information technology -- role based access control:
ANSI/INCITS.
Park, J. S.; et al (2004, 2-4 June). A composite RBAC
approach for large, complex organizations. Paper
presented at the SACMAT'04, Yorktown Heights, NY,
U.S.
Press, Microsoft. (2004). Microsoft Encarta dictionary for
Office 2003, Windows XP edition.
Sandhu, R. (2004).
A logical specification for usage
control. Paper presented at the Proceedings of the
ninth ACM symposium on Access control models and
technologies, Yorktown Heights, New York, USA.
Sandhu, R. et al (1996). Role-based access control models.
IEEE Computer, Vol. 29(No. 2), pp. 38-47.
Sandhu, R.;et al (2000, 26-27 July 2000). The NISTt model
for role-based access control: Towards a united
standard. Paper presented at the Fifth ACM Workshop
on Role-based Access Control, Berlin, Germany.
Schell, R. R. (1979). Computer security -- the Achilles'
heel of the electronic air force. Air University Review,
Vol. XXX(No. 2), pp. 16-33.
Strembeck, M. &. N., Gustaf. (2004). An integrated
approach to engineer and enforce context constraints
in RBAC environments. ACM Transactions on
Information and System Security, Vol. 7(No. 3), 392-
427.
U.S. Government, National Institute of Standards and
Technology. (2005). NIST special publication 800-73,
interfaces for personal identity verification (Draft
Standard), 31 January 2005 Washington, DC:
Department of Commerce.
Wang, H. J.,et al (2004). Security policy reconciliation in
distributed computing environments. Paper presented
at the Fifth IEEE International Workshop on Policies
for Distributed Systems and Networks (Policy'04).
METAPOLICIES AND CONTEXT-BASED ACCESS CONTROL
359