Author:
Chadwick David W,Otenko Sassa,Nguyen Tuan Anh
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. See, http://dictionary.reference.com/search?q=delegate
2. OASIS. Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V2.0 (January 15, 2005)
3. ISO 9594-8/ITU-T Rec. X.509, The Directory: Public-key and attribute certificate frameworks (2001)
4. Cantor, S.: Shibboleth Architecture, Protocols and Profiles, Working Draft 02 (September 22, 2004), see: http://shibboleth.internet2.edu/
5. Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and System Security 4(3), 224–274 (2001)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A joint sharing approach for online privacy preservation;World Wide Web;2021-04-24
2. Access Control;Computing Handbook, Third Edition;2014-05-08
3. Privacy on the Internet;Computer and Information Security Handbook;2013
4. On a taxonomy of delegation;Computers & Security;2010-07
5. Federated identity management in mobile dynamic virtual organizations;Identity in the Information Society;2009-12