A Secure Task Delegation Model for Workflows, 2008 Second International Conference on Emerging Security Information, Systems and Technologies, 2008. ,
DOI : 10.1109/SECURWARE.2008.21
URL : https://hal.archives-ouvertes.fr/inria-00334755
Supporting conditional delegation in secure workflow management systems, Proceedings of the tenth ACM symposium on Access control models and technologies , SACMAT '05, 2005. ,
DOI : 10.1145/1063979.1063990
Framework for role-based delegation models, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00), 2000. ,
DOI : 10.1109/ACSAC.2000.898870
A rule-based framework for role-based delegation and revocation, ACM Transactions on Information and System Security, vol.6, issue.3, pp.404-441, 2003. ,
DOI : 10.1145/937527.937530
Specifying and enforcing access control policies for xml document sources, pp.139-151, 2000. ,
Using authority certificates to create management structures, Security Protocols, 9th International Workshop, pp.134-145, 2001. ,
The permis x.509 role based privilege management infrastructure, Future Generation Comp. Syst, vol.19, issue.2, pp.277-289, 2003. ,
Policy administration control and delegation using XACML and Delegent, The 6th IEEE/ACM International Workshop on Grid Computing, 2005., pp.49-54, 2005. ,
DOI : 10.1109/GRID.2005.1542723
Flexible and Manageable Delegation of Authority in RBAC, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), pp.453-458, 2007. ,
DOI : 10.1109/AINAW.2007.187
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains, Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference Proceedings, pp.67-86, 2006. ,
DOI : 10.3233/JCS-2003-11102
A framework for organisational control principles, 18th Annual Computer Security Applications Conference, 2002. Proceedings., 2003. ,
DOI : 10.1109/CSAC.2002.1176294
Delegent authorisation system, OASIS XACML InterOp Demo. RSA Conference, pp.7-11, 2008. ,
Delegation in rolebased access control, Proceedings of the Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, pp.174-191, 2006. ,