-
1
-
-
0002539153
-
An extended petri net model for supporting workflow in a multilevel secure environment
-
P. Samarati, R.S. Sandhu (Eds.), Chapman and Hall, London
-
Atluri V., Huang W.K. An extended petri net model for supporting workflow in a multilevel secure environment. Samarati P., Sandhu R.S. Database Security X: Status and Prospects. 1997;240-258 Chapman and Hall, London.
-
(1997)
Database Security X: Status and Prospects
, pp. 240-258
-
-
Atluri, V.1
Huang, W.K.2
-
2
-
-
0028016985
-
About the enforcement of state dependent security specifications
-
T.F. Keefe, C.E. Landwehr (Eds.), Elsevier, Amsterdam
-
Biskup J., Eckert C. About the enforcement of state dependent security specifications. Keefe T.F., Landwehr C.E. Database Security VII: Status and Prospects. 1994;3-17 Elsevier, Amsterdam.
-
(1994)
Database Security VII: Status and Prospects
, pp. 3-17
-
-
Biskup, J.1
Eckert, C.2
-
5
-
-
0010570750
-
Software agents for role-based security
-
V. Atluri, J. Hale (Eds.), Kluwer Norwell
-
Demurjian S.A., He Y., Ting T.C., Saba M. Software agents for role-based security. Atluri V., Hale J. Research Advances in Database and Information Systems Security. 2000;79-93 Kluwer, Norwell.
-
(2000)
Research Advances in Database and Information Systems Security
, pp. 79-93
-
-
Demurjian, S.A.1
He, Y.2
Ting, T.C.3
Saba, M.4
-
6
-
-
84949751564
-
Security for mobile agents: Authentication and state appraisal
-
4th European Symp. on Research in Computer Security
-
W.M. Farmer, J.D. Guttman, V. Swurp, Security for mobile agents: Authentication and state appraisal, in: 4th European Symp. on Research in Computer Security, LNCS vol.1146, 1997, pp. 118-130.
-
(1997)
LNCS
, vol.1146
, pp. 118-130
-
-
Farmer, W.M.1
Guttman, J.D.2
Swurp, V.3
-
7
-
-
0033329699
-
Modelling, specifying and implementing workflow security in cyberspace
-
Gudes E., Olivier M.S., van de Riet R.P., Modelling, specifying and implementing workflow security in cyberspace. Journal of Computer Security. 7(4):1999;287-315.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.4
, pp. 287-315
-
-
Gudes, E.1
Olivier, M.S.2
Van de Riet, R.P.3
-
8
-
-
0003355701
-
Hypertext transfer protocol - HTTP/1.1
-
Internet Society
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, T. Berners-Lee, Hypertext Transfer Protocol - HTTP/1.1., RFC 2616, Internet Society, 1999.
-
(1999)
RFC
, vol.2616
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
11
-
-
0010608362
-
Distributed object technologies databases and security
-
T.Y. Lin, S. Qian (Eds.), Chapman and Hall, London
-
McCollum C.D., Faatz D.B., Herndon W.R., Sebes E.J., Thomas R.K. Distributed object technologies databases and security. Lin T.Y., Qian S. Database Security XI: Status and Prospects. 1998;17-31 Chapman and Hall, London.
-
(1998)
Database Security XI: Status and Prospects
, pp. 17-31
-
-
McCollum, C.D.1
Faatz, D.B.2
Herndon, W.R.3
Sebes, E.J.4
Thomas, R.K.5
-
13
-
-
0141450032
-
RBAC on the Web by secure cookies
-
V. Atluri, J. Hale (Eds.) Kluwer, Norwell
-
Park J., Sandhu R., Ghanta S. RBAC on the Web by secure cookies. Atluri V., Hale J. Research Advances in Database and Information Systems Security. 2000;49-62 Kluwer, Norwell.
-
(2000)
Research Advances in Database and Information Systems Security
, pp. 49-62
-
-
Park, J.1
Sandhu, R.2
Ghanta, S.3
-
15
-
-
0010574338
-
Designing security agents for the DOK federated system
-
T.Y. Lin, S. Qian (Eds.), Chapman and Hall, London
-
Tari Z. Designing security agents for the DOK federated system. Lin T.Y., Qian S. Database Security XI: Status and Prospects. 1998;35-59 Chapman and Hall, London.
-
(1998)
Database Security XI: Status and Prospects
, pp. 35-59
-
-
Tari, Z.1
-
16
-
-
0002851150
-
Web implementation of a security mediator for medical databases
-
T.Y. Lin, S. Qian (Eds.), Chapman and Hall, London
-
Wiederhold G., Billelo M., Donahue C. Web implementation of a security mediator for medical databases. Lin T.Y., Qian S. Database Security XI: Status and Prospects. 1998;60-67 Chapman and Hall, London.
-
(1998)
Database Security XI: Status and Prospects
, pp. 60-67
-
-
Wiederhold, G.1
Billelo, M.2
Donahue, C.3
|