Guide to attribute based access control (abac) definition and considerations (draft) VC Hu, D Ferraiolo, R Kuhn, AR Friedman, AJ Lang, MM Cogdell, ... NIST special publication 800 (162), 1-54, 2013 | 1427 | 2013 |
Attribute-based access control VC Hu, DR Kuhn, DF Ferraiolo, J Voas Computer 48 (2), 85-88, 2015 | 682 | 2015 |
Assessment of access control systems VC Hu, D Ferraiolo, DR Kuhn US Department of Commerce, National Institute of Standards and Technology, 2006 | 337 | 2006 |
An overview of issues in testing intrusion detection systems P Mell, V Hu, R Lippmann, J Haines, M Zissman | 238 | 2003 |
Introduction to public key technology and the federal PKI infrastructure DR Kuhn, VC Hu, WT Polk, SJ Chang National Institute of Standards and Technology, 2001 | 196 | 2001 |
Extensible access control markup language (XACML) and next generation access control (NGAC) D Ferraiolo, R Chandramouli, R Kuhn, V Hu Proceedings of the 2016 ACM International Workshop on Attribute Based Access …, 2016 | 151 | 2016 |
Conformance checking of access control policies specified in XACML VC Hu, E Martin, JH Hwang, T Xie 31st Annual International Computer Software and Applications Conference …, 2007 | 84 | 2007 |
Guidelines for access control system evaluation metrics VC Hu, KA Kent US Department of Commerce, National Institute of Standards and Technology, 2012 | 77 | 2012 |
Model checking for verification of mandatory access control models and properties VC Hu, DR Kuhn, T Xie, JH Hwang International Journal of Software Engineering and Knowledge Engineering 21 …, 2011 | 71 | 2011 |
Security policy verification for multi-domains in cloud systems A Gouglidis, I Mavridis, VC Hu International Journal of Information Security 13, 97-111, 2014 | 65 | 2014 |
ACPT: A tool for modeling and verifying access control policies JH Hwang, T Xie, V Hu, M Altunay 2010 IEEE International Symposium on Policies for Distributed Systems and …, 2010 | 59 | 2010 |
Composing and combining policies under the policy machine DF Ferraiolo, S Gavrila, V Hu, DR Kuhn Proceedings of the tenth ACM symposium on Access control models and …, 2005 | 56 | 2005 |
An access control scheme for big data processing VC Hu, T Grance, DF Ferraiolo, DR Kuhn 10th IEEE International Conference on Collaborative Computing: Networking …, 2014 | 55 | 2014 |
A comparison of attribute based access control (ABAC) standards for data service applications D Ferraiolo, R Chandramouli, V Hu, R Kuhn NIST Special Publication 800 (2016), 178, 2016 | 53 | 2016 |
Attribute-Based Access Control VC Hu, DF Ferraiolo, R Chandramouli, DR Kuhn Artech House, 2017 | 47 | 2017 |
Verification and test methods for access control policies/models VC Hu, R Kuhn, D Yaga NIST Special Publication 800 (192), 800-192, 2017 | 42 | 2017 |
Property verification for generic access control models VC Hu, DR Kuhn, T Xie 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2008 | 39 | 2008 |
Assessing quality of policy properties in verification of access control policies E Martin, JH Hwang, T Xie, V Hu 2008 Annual Computer Security Applications Conference (ACSAC), 163-172, 2008 | 38 | 2008 |
Access control for emerging distributed systems VC Hu, DR Kuhn, DF Ferraiolo Computer 51 (10), 100-103, 2018 | 37 | 2018 |
Blockchain for access control systems VC Hu, VC Hu US Department of Commerce, National Institute of Standards and Technology, 2022 | 25 | 2022 |