Jason Crampton
Jason Crampton
Professor of Information Security, Royal Holloway, University of London
Dirección de correo verificada de rhul.ac.uk - Página principal
Título
Citado por
Citado por
Año
Administrative scope: A foundation for role-based administrative models
J Crampton, G Loizou
ACM Transactions on Information and System Security (TISSEC) 6 (2), 201-231, 2003
1902003
On key assignment for hierarchical access control
J Crampton, K Martin, P Wild
19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-111, 2006
1712006
Specifying and enforcing constraints in role-based access control
J Crampton
Proceedings of the Eighth ACM symposium on Access control models and …, 2003
1582003
A reference monitor for workflow systems with constrained task execution
J Crampton
Proceedings of the tenth ACM symposium on Access control models and …, 2005
1482005
Delegation in role-based access control
J Crampton, H Khambhammettu
International Journal of Information Security 7 (2), 123-136, 2008
1462008
The interpretation and utility of three cohesion metrics for object-oriented design
S Counsell, S Swift, J Crampton
ACM Transactions on Software Engineering and Methodology (TOSEM) 15 (2), 123-149, 2006
1432006
The consistency of task-based authorization constraints in workflow
K Tan, J Crampton, CA Gunter
Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 155-169, 2004
1322004
Risk-aware role-based access control
L Chen, J Crampton
International Workshop on Security and Trust Management, 140-156, 2011
1152011
Access control and authorization constraints for WS-BPEL
E Bertino, J Crampton, F Paci
2006 IEEE International Conference on Web Services (ICWS'06), 275-284, 2006
1052006
The monitorability of service-level agreements for application-service provision
J Skene, A Skene, J Crampton, W Emmerich
Proceedings of the 6th International Workshop on Software and Performance, 3-14, 2007
1022007
Delegation in role-based access control
J Crampton, H Khambhammettu
European Symposium on Research in Computer Security, 174-191, 2006
892006
Understanding and developing role-based administrative models
J Crampton
Proceedings of the 12th ACM conference on Computer and communications …, 2005
782005
On permissions, inheritance and role hierarchies
J Crampton
Proceedings of the 10th ACM conference on Computer and communications …, 2003
732003
Delegation and satisfiability in workflow systems
J Crampton, H Khambhammettu
Proceedings of the 13th ACM symposium on Access control models and …, 2008
722008
PTaCL: A language for attribute-based access control in open systems
J Crampton, C Morisset
International Conference on Principles of Security and Trust, 390-409, 2012
712012
An access-control framework for WS-BPEL
F Paci, E Bertino, J Crampton
International Journal of Web Services Research (IJWSR) 5 (3), 20-43, 2008
702008
Inter-domain role mapping and least privilege
L Chen, J Crampton
Proceedings of the 12th ACM symposium on Access control models and …, 2007
572007
Path conditions and principal matching: a new approach to access control
J Crampton, J Sellwood
Proceedings of the 19th ACM symposium on Access control models and …, 2014
552014
On the parameterized complexity and kernelization of the workflow satisfiability problem
J Crampton, G Gutin, A Yeo
ACM Transactions on Information and System Security (TISSEC) 16 (1), 1-31, 2013
552013
Administrative scope and role hierarchy operations
J Crampton
Proceedings of the seventh ACM symposium on Access control models and …, 2002
532002
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20