Administrative scope: A foundation for role-based administrative models J Crampton, G Loizou ACM Transactions on Information and System Security (TISSEC) 6 (2), 201-231, 2003 | 197 | 2003 |
On key assignment for hierarchical access control J Crampton, K Martin, P Wild 19th IEEE Computer Security Foundations Workshop (CSFW'06), 14 pp.-111, 2006 | 179 | 2006 |
Specifying and enforcing constraints in role-based access control J Crampton Proceedings of the Eighth ACM symposium on Access control models and …, 2003 | 173 | 2003 |
Delegation in role-based access control J Crampton, H Khambhammettu International Journal of Information Security 7, 123-136, 2008 | 158 | 2008 |
The interpretation and utility of three cohesion metrics for object-oriented design S Counsell, S Swift, J Crampton ACM Transactions on Software Engineering and Methodology (TOSEM) 15 (2), 123-149, 2006 | 158 | 2006 |
A reference monitor for workflow systems with constrained task execution J Crampton Proceedings of the tenth ACM symposium on Access control models and …, 2005 | 158 | 2005 |
The consistency of task-based authorization constraints in workflow K Tan, J Crampton, CA Gunter Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004., 155-169, 2004 | 147 | 2004 |
Risk-aware role-based access control L Chen, J Crampton Security and Trust Management: 7th International Workshop, STM 2011 …, 2012 | 124 | 2012 |
Access control and authorization constraints for WS-BPEL E Bertino, J Crampton, F Paci 2006 IEEE International Conference on Web Services (ICWS'06), 275-284, 2006 | 108 | 2006 |
The monitorability of service-level agreements for application-service provision J Skene, A Skene, J Crampton, W Emmerich Proceedings of the 6th International Workshop on Software and Performance, 3-14, 2007 | 106 | 2007 |
Delegation in role-based access control J Crampton, H Khambhammettu Computer Security–ESORICS 2006: 11th European Symposium on Research in …, 2006 | 96 | 2006 |
PTaCL: A language for attribute-based access control in open systems J Crampton, C Morisset Principles of Security and Trust: First International Conference, POST 2012 …, 2012 | 83 | 2012 |
Path conditions and principal matching: a new approach to access control J Crampton, J Sellwood Proceedings of the 19th ACM symposium on Access control models and …, 2014 | 81 | 2014 |
Delegation and satisfiability in workflow systems J Crampton, H Khambhammettu Proceedings of the 13th ACM symposium on Access control models and …, 2008 | 75 | 2008 |
On permissions, inheritance and role hierarchies J Crampton Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 75 | 2003 |
Understanding and developing role-based administrative models J Crampton Proceedings of the 12th ACM conference on Computer and communications …, 2005 | 74 | 2005 |
An access-control framework for WS-BPEL F Paci, E Bertino, J Crampton International Journal of Web Services Research (IJWSR) 5 (3), 20-43, 2008 | 71 | 2008 |
On the parameterized complexity and kernelization of the workflow satisfiability problem J Crampton, G Gutin, A Yeo ACM Transactions on Information and System Security (TISSEC) 16 (1), 1-31, 2013 | 66 | 2013 |
Inter-domain role mapping and least privilege L Chen, J Crampton Proceedings of the 12th ACM symposium on Access control models and …, 2007 | 65 | 2007 |
Rgfga: An efficient representation and crossover for grouping genetic algorithms A Tucker, J Crampton, S Swift Evolutionary Computation 13 (4), 477-499, 2005 | 55 | 2005 |