Guide to attribute based access control (abac) definition and considerations (draft) VC Hu, D Ferraiolo, R Kuhn, AR Friedman, AJ Lang, MM Cogdell, ... NIST special publication 800 (162), 1-54, 2013 | 1389 | 2013 |
Attribute-based access control VC Hu, DR Kuhn, DF Ferraiolo, J Voas Computer 48 (2), 85-88, 2015 | 667 | 2015 |
Assessment of access control systems VC Hu, D Ferraiolo, DR Kuhn US Department of Commerce, National Institute of Standards and Technology, 2006 | 334 | 2006 |
An overview of issues in testing intrusion detection systems P Mell, V Hu, R Lippmann, J Haines, M Zissman | 236 | 2003 |
Introduction to public key technology and the federal PKI infrastructure DR Kuhn, VC Hu, WT Polk, SJ Chang National Institute of Standards and Technology, 2001 | 194 | 2001 |
Extensible access control markup language (XACML) and next generation access control (NGAC) D Ferraiolo, R Chandramouli, R Kuhn, V Hu Proceedings of the 2016 ACM International Workshop on Attribute Based Access …, 2016 | 143 | 2016 |
Conformance checking of access control policies specified in XACML VC Hu, E Martin, JH Hwang, T Xie 31st Annual International Computer Software and Applications Conference …, 2007 | 84 | 2007 |
Guidelines for access control system evaluation metrics VC Hu, KA Kent US Department of Commerce, National Institute of Standards and Technology, 2012 | 76 | 2012 |
Model checking for verification of mandatory access control models and properties VC Hu, DR Kuhn, T Xie, JH Hwang International Journal of Software Engineering and Knowledge Engineering 21 …, 2011 | 69 | 2011 |
Security policy verification for multi-domains in cloud systems A Gouglidis, I Mavridis, VC Hu International Journal of Information Security 13, 97-111, 2014 | 64 | 2014 |
ACPT: A tool for modeling and verifying access control policies JH Hwang, T Xie, V Hu, M Altunay 2010 IEEE International Symposium on Policies for Distributed Systems and …, 2010 | 57 | 2010 |
An access control scheme for big data processing VC Hu, T Grance, DF Ferraiolo, DR Kuhn 10th IEEE International Conference on Collaborative Computing: Networking …, 2014 | 56 | 2014 |
Composing and combining policies under the policy machine DF Ferraiolo, S Gavrila, V Hu, DR Kuhn Proceedings of the tenth ACM symposium on Access control models and …, 2005 | 56 | 2005 |
A comparison of attribute based access control (ABAC) standards for data service applications D Ferraiolo, R Chandramouli, V Hu, R Kuhn NIST Special Publication 800 (2016), 178, 2016 | 53 | 2016 |
Attribute-Based Access Control VC Hu, DF Ferraiolo, R Chandramouli, DR Kuhn Artech House, 2017 | 44 | 2017 |
Verification and test methods for access control policies/models VC Hu, R Kuhn, D Yaga NIST Special Publication 800 (192), 800-192, 2017 | 40 | 2017 |
Property verification for generic access control models VC Hu, DR Kuhn, T Xie 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2008 | 39 | 2008 |
Assessing quality of policy properties in verification of access control policies E Martin, JH Hwang, T Xie, V Hu 2008 Annual Computer Security Applications Conference (ACSAC), 163-172, 2008 | 38 | 2008 |
Access control for emerging distributed systems VC Hu, DR Kuhn, DF Ferraiolo Computer 51 (10), 100-103, 2018 | 36 | 2018 |
Policy mediation for multi-enterprise environments P Galiasso, O Bremer, J Hale, S Shenoi, D Ferraiola, V Hu Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00 …, 2000 | 25 | 2000 |