David F. Ferraiolo

According to our database1, David F. Ferraiolo authored at least 36 papers between 1995 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
A New Approach to Data Sharing and Distributed Ledger Technology: A Clinical Trial Use Case.
IEEE Netw., 2021

A Trusted Federated System to Share Granular Data Among Disparate Database Resources.
Computer, 2021

2018
Access Control for Emerging Distributed Systems.
Computer, 2018

2017
Wind farm security: attack surface, targets, scenarios and mitigation.
Int. J. Crit. Infrastructure Prot., 2017

Imposing Fine-grain Next Generation Access Control over Database Queries.
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017

2016
Pseudo-Exhaustive Testing of Attribute Based Access Control Rules.
Proceedings of the Ninth IEEE International Conference on Software Testing, 2016

Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC).
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016

2015
Attribute-Based Access Control.
Computer, 2015

Implementing and Managing Policy Rules in Attribute Based Access Control.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

2014
On the unification of access control and data services.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

An Access Control scheme for Big Data processing.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

2013
Enabling an Enterprise-Wide, Data-Centric Operating Environment.
Computer, 2013

2012
A Matter of Policy.
IT Prof., 2012

2011
Role-Based Access Control.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

The Policy Machine: A novel architecture and framework for access control policy specification and enforcement.
J. Syst. Archit., 2011

2010
Specification of attribute relations for access control policies and constraints using Policy Machine.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Role-Based Access Controls
CoRR, 2009

2008
A meta model for access control: why is it needed and is it even possible to achieve?
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

2007
RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control".
IEEE Secur. Priv., 2007

A trust domain management schema for multiple grid environments.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Access Control Policy Combinations for the Grid Using the Policy Machine.
Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 2007

2006
The Computational Complexity of Enforceability Validation for Generic Access Control Rules.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

2005
Composing and combining policies under the policy machine.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

2003
The role control center: features and case studies.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

2001
Proposed NIST standard for role-based access control.
ACM Trans. Inf. Syst. Secur., 2001

Panel: which access control technique will provide the greatest overall benefit-Abstract.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

An argument for the role-based access control model.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

The Policy Machine for Security Policy Management.
Proceedings of the Computational Science - ICCS 2001, 2001

2000
The NIST model for role-based access control: towards a unified standard.
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000

Policy Mediation for Multi-Enterprise Environments.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet.
ACM Trans. Inf. Syst. Secur., 1999

Products and Tools (Panel Session).
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999

User's Perspectives (Panel Session).
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999

1998
On the Formal Definition of Separation-of-Duty Policies and their Composition.
Proceedings of the Security and Privacy, 1998

1997
Specifying and managing role-based access control within a corporate intranet.
Proceedings of the Second Workshop on Role-Based Access Control, 1997

1995
Future directions in role-based access control.
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995


  Loading...