David F. Ferraiolo
According to our database1,
David F. Ferraiolo
authored at least 36 papers
between 1995 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
A New Approach to Data Sharing and Distributed Ledger Technology: A Clinical Trial Use Case.
IEEE Netw., 2021
A Trusted Federated System to Share Granular Data Among Disparate Database Resources.
Computer, 2021
2018
2017
Int. J. Crit. Infrastructure Prot., 2017
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017
2016
Proceedings of the Ninth IEEE International Conference on Software Testing, 2016
Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC).
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016
2015
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015
2014
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014
2013
2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
The Policy Machine: A novel architecture and framework for access control policy specification and enforcement.
J. Syst. Archit., 2011
2010
Specification of attribute relations for access control policies and constraints using Policy Machine.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
2009
2008
A meta model for access control: why is it needed and is it even possible to achieve?
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
2007
RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control".
IEEE Secur. Priv., 2007
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 2007
2006
The Computational Complexity of Enforceability Validation for Generic Access Control Rules.
Proceedings of the IEEE International Conference on Sensor Networks, 2006
2005
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005
2003
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
2001
ACM Trans. Inf. Syst. Secur., 2001
Panel: which access control technique will provide the greatest overall benefit-Abstract.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001
Proceedings of the Computational Science - ICCS 2001, 2001
2000
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
1999
A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet.
ACM Trans. Inf. Syst. Secur., 1999
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999
1998
Proceedings of the Security and Privacy, 1998
1997
Proceedings of the Second Workshop on Role-Based Access Control, 1997
1995
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995