-
1
-
-
0023997325
-
Data diversity: An approach to software fault-tolerance
-
Ammann P.E., Knight J.C. Data diversity: an approach to software fault-tolerance. IEEE Transactions on Computers. 37(4):1988;418-425.
-
(1988)
IEEE Transactions on Computers
, vol.37
, Issue.4
, pp. 418-425
-
-
Ammann, P.E.1
Knight, J.C.2
-
2
-
-
0004115867
-
-
Macmillan, New York, November
-
C. Adams, S. Lloyd, Understanding Public-key Infrastructure: Concepts, Standards, and Deployment Considerations, Macmillan, New York, November 1999.
-
(1999)
Understanding Public-key Infrastructure: Concepts, Standards, and Deployment Considerations
-
-
Adams, C.1
Lloyd, S.2
-
5
-
-
85031576805
-
-
Department of Defense National Computer Security Center, Department of Defense Trusted Computer Systems Evaluation Criteria, DoD 5200.28-STD, December
-
Department of Defense National Computer Security Center, Department of Defense Trusted Computer Systems Evaluation Criteria, DoD 5200.28-STD, December 1985.
-
(1985)
-
-
-
9
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
S. Jajodia, P. Samarati, V.S. Subrahmanian, E. Bertino, A unified framework for enforcing multiple access control policies, in: Proceedings of the ACM SIGMOD International Conference on Management of Data Pages, 1997, pp. 474-485.
-
(1997)
In: Proceedings of the ACM SIGMOD International Conference on Management of Data Pages
, pp. 474-485
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
Bertino, E.4
-
12
-
-
0016522101
-
System structure for software fault tolerance
-
Randell B. System structure for software fault tolerance. IEEE Transactions on Software Engineering. SE-1(12):1995;220-232.
-
(1995)
IEEE Transactions on Software Engineering
, vol.1
, Issue.12
, pp. 220-232
-
-
Randell, B.1
-
13
-
-
0037986947
-
Decentralized group hierarchies in UNIX: An experiment and lessons learned
-
Crystal City, VA, October
-
R. Sandhu, G.-J. Ahn, Decentralized group hierarchies in UNIX: an experiment and lessons learned, in: Proceedings of 21st NIST-NCSC National Information Security Conference, Crystal City, VA, October 1998, pp. 486-502.
-
(1998)
In: Proceedings of 21st NIST-NCSC National Information Security Conference
, pp. 486-502
-
-
Sandhu, R.1
Ahn, G.-J.2
-
14
-
-
0342808132
-
Group hierarchies with decentralized user assignment in Windows NT
-
Las Vegas, NV, October
-
R. Sandhu, G.-J. Ahn, Group hierarchies with decentralized user assignment in Windows NT, in: Proceedings of IASTED Conference on Software Engineering, Las Vegas, NV, October 1998, pp. 352-355.
-
(1998)
In: Proceedings of IASTED Conference on Software Engineering
, pp. 352-355
-
-
Sandhu, R.1
Ahn, G.-J.2
-
15
-
-
0027699087
-
Lattice-based access control models
-
Sandhu R.S. Lattice-based access control models. IEEE Computer. 26(11):1993;9-19.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
17
-
-
0010422834
-
The URA97 model for role-based administration of user-role assignment
-
in: T.Y. Lin, X. Qian (Eds.) North-Holland, Amsterdam
-
R. Sandhu, V. Bhamidipati, The URA97 model for role-based administration of user-role assignment, in: T.Y. Lin, X. Qian (Eds.), Database Security XI: Status and Prospects, North-Holland, Amsterdam, 1997.
-
(1997)
Database Security XI: Status and Prospects
-
-
Sandhu, R.1
Bhamidipati, V.2
-
18
-
-
0030086382
-
Role-based access control models
-
Sandhu R.S., Coyne E.J., Feinstein H.L., Youman C.E. Role-based access control models. IEEE Computer. 29(2):1996;38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
20
-
-
0028513932
-
Access control: Principles and practice
-
Sandhu R.S., Samarati P. Access control: principles and practice. IEEE Communications. 32(9):1994;40-48.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.S.1
Samarati, P.2
-
21
-
-
0037510581
-
Authentication, access control and intrusion detection
-
E. Bertino. Boca Raton: CRC press
-
Sandhu R., Samarati P. Authentication, access control and intrusion detection. Bertino E. The Computer Science and Engineering Handbook. 1997;1929-1948 CRC press, Boca Raton.
-
(1997)
The Computer Science and Engineering Handbook
, pp. 1929-1948
-
-
Sandhu, R.1
Samarati, P.2
-
22
-
-
0029766635
-
Role-based security for distributed object systems
-
IEEE, New York
-
N. Yialelis, E. Lupu, M. Sloman, Role-based security for distributed object systems, in: Proceedings of the IEEE Fifth Workshops on Enabling Technology: Infrastructure for Collaborative Enterprise, IEEE, New York, 1996.
-
(1996)
In: Proceedings of the IEEE Fifth Workshops on Enabling Technology: Infrastructure for Collaborative Enterprise
-
-
Yialelis, N.1
Lupu, E.2
Sloman, M.3
|