2008 |
36 | EE | Liang Chen,
Jason Crampton:
On spatio-temporal constraints and inheritance in role-based access control.
ASIACCS 2008: 205-216 |
35 | EE | Steve Barker,
David Chadwick,
Jason Crampton,
Emil Lupu,
Bhavani M. Thuraisingham:
Panel Session: What Are the Key Challenges in Distributed Security?.
DBSec 2008: 219-221 |
34 | EE | Jason Crampton,
Hemanth Khambhammettu:
On delegation and workflow execution models.
SAC 2008: 2137-2144 |
33 | EE | Jason Crampton,
Hemanth Khambhammettu:
Delegation and satisfiability in workflow systems.
SACMAT 2008: 31-40 |
32 | EE | Qiang Wei,
Jason Crampton,
Konstantin Beznosov,
Matei Ripeanu:
Authorization recycling in RBAC systems.
SACMAT 2008: 63-72 |
31 | EE | M. A. C. Dekker,
Jason Crampton,
Sandro Etalle:
RBAC administration in distributed systems.
SACMAT 2008: 93-102 |
30 | EE | Jason Crampton,
Hoon Wei Lim:
Role Signatures for Access Control in Open Distributed Systems.
SEC 2008: 205-220 |
29 | EE | Jason Crampton,
Hemanth Khambhammettu:
Delegation in role-based access control.
Int. J. Inf. Sec. 7(2): 123-136 (2008) |
28 | EE | Federica Paci,
Elisa Bertino,
Jason Crampton:
An Access-Control Framework for WS-BPEL.
Int. J. Web Service Res. 5(3): 20-43 (2008) |
2007 |
27 | EE | M. A. C. Dekker,
J. G. Cederquist,
Jason Crampton,
Sandro Etalle:
Extended privilege inheritance in RBAC.
ASIACCS 2007: 383-385 |
26 | EE | Allan Tucker,
Stephen Swift,
Jason Crampton:
Efficiency updates for the restricted growth function GA for grouping problems.
GECCO 2007: 1536 |
25 | EE | Stephen Swift,
Allan Tucker,
Jason Crampton,
David Garway-Heath:
An improved restricted growth function genetic algorithm for the consensus clustering of retinal nerve fibre data.
GECCO 2007: 2174-2181 |
24 | EE | Liang Chen,
Jason Crampton:
Applications of the Oriented Permission Role-Based Access Control Model.
IPCCC 2007: 387-394 |
23 | EE | Liang Chen,
Jason Crampton:
Inter-domain role mapping and least privilege.
SACMAT 2007: 157-162 |
22 | EE | Jason Crampton,
Hoon Wei Lim,
Kenneth G. Paterson:
What can identity-based cryptography offer to web services?
SWS 2007: 26-36 |
21 | EE | James Skene,
Allan Skene,
Jason Crampton,
Wolfgang Emmerich:
The monitorability of service-level agreements for application-service provision.
WOSP 2007: 3-14 |
2006 |
20 | EE | Jason Crampton,
Keith M. Martin,
Peter R. Wild:
On Key Assignment for Hierarchical Access Control.
CSFW 2006: 98-111 |
19 | EE | Jason Crampton:
Discretionary and Mandatory Controls for Role-Based Administration.
DBSec 2006: 194-208 |
18 | EE | Jason Crampton,
Hemanth Khambhammettu:
Delegation in Role-Based Access Control.
ESORICS 2006: 174-191 |
17 | EE | Elisa Bertino,
Jason Crampton,
Federica Paci:
Access Control and Authorization Constraints for WS-BPEL.
ICWS 2006: 275-284 |
16 | EE | Jason Crampton,
Wing Leung,
Konstantin Beznosov:
The secondary and approximate authorization model and its application to Bell-LaPadula policies.
SACMAT 2006: 111-120 |
15 | EE | Steve Counsell,
Stephen Swift,
Jason Crampton:
The interpretation and utility of three cohesion metrics for object-oriented design.
ACM Trans. Softw. Eng. Methodol. 15(2): 123-149 (2006) |
2005 |
14 | EE | Jason Crampton:
Understanding and developing role-based administrative models.
ACM Conference on Computer and Communications Security 2005: 158-167 |
13 | EE | Stephen Swift,
Amy Shi,
Jason Crampton,
Allan Tucker:
ICARUS: intelligent coupon allocation for retailers using search.
Congress on Evolutionary Computation 2005: 182-189 |
12 | EE | Jason Crampton:
A reference monitor for workflow systems with constrained task execution.
SACMAT 2005: 38-47 |
11 | EE | Allan Tucker,
Jason Crampton,
Stephen Swift:
RGFGA: An Efficient Representation and Crossover for Grouping Genetic Algorithms.
Evolutionary Computation 13(4): 477-499 (2005) |
2004 |
10 | EE | Kaijun Tan,
Jason Crampton,
Carl A. Gunter:
The Consistency of Task-Based Authorization Constraints in Workflow Systems.
CSFW 2004: 155- |
9 | EE | Jason Crampton:
Applying hierarchical and role-based access control to XML documents.
SWS 2004: 37-46 |
2003 |
8 | EE | Jason Crampton:
On permissions, inheritance and role hierarchies.
ACM Conference on Computer and Communications Security 2003: 85-92 |
7 | EE | Jason Crampton:
Specifying and enforcing constraints in role-based access control.
SACMAT 2003: 43-50 |
6 | EE | Jason Crampton,
George Loizou:
Administrative scope: A foundation for role-based administrative models.
ACM Trans. Inf. Syst. Secur. 6(2): 201-231 (2003) |
5 | | Jason Crampton,
Hemanth Khambhammettu:
Access control in a distributed object environment using XML and roles.
South African Computer Journal 31: 2-8 (2003) |
2002 |
4 | EE | Jason Crampton:
Administrative scope and role hierarchy operations.
SACMAT 2002: 145-154 |
2001 |
3 | EE | Jason Crampton,
George Loizou,
Greg O'Shea:
A Logic of Access Control.
Comput. J. 44(1): 54-66 (2001) |
2 | EE | Jason Crampton,
George Loizou,
Greg O'Shea:
A Logic of Access Control.
Comput. J. 44(2): 137-149 (2001) |
1 | | Jason Crampton,
George Loizou:
Authorisation and antichains.
Operating Systems Review 35(3): 6-15 (2001) |