-
1
-
-
0015672289
-
A note on the confinement problem
-
Lampson, B.W. "A Note on the Confinement Problem," Communications of ACM, 16:10, 1973, pp. 613-615.
-
(1973)
Communications of ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
2
-
-
0017517624
-
Certification of programs for secure information flow
-
July
-
Denning, D.E. and P.J. Denning. "Certification of Programs for Secure Information Flow," Communications of ACM, 20:7, July 1977, pp. 504-513.
-
(1977)
Communications of ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
3
-
-
0025065897
-
Integrating an object-oriented data model with multilevel security
-
IEEE Computer Society Press, May
-
Jajodia, S. and B. Kogan. "Integrating an Object-oriented Data Model with Multilevel Security." In Proc. 1990 Symposium on Research in Security & Privacy, IEEE Computer Society Press, May 1990, pp. 76-85.
-
(1990)
Proc. 1990 Symposium on Research in Security & Privacy
, pp. 76-85
-
-
Jajodia, S.1
Kogan, B.2
-
6
-
-
0030086382
-
Role-based access control models
-
February
-
Sandu, R., E.J. Coyne, H.L. Feinstem, and C.E. Youman. "Role-based Access Control Models," IEEE Computer, 29:2, February 1996, pp. 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandu, R.1
Coyne, E.J.2
Feinstem, H.L.3
Youman, C.E.4
-
7
-
-
0031341651
-
The ARBAC97 model for role-based administration of roles: Preliminary description and outline
-
Fairfax, Virginia, November
-
Sandhu, R. and V. Bhamidipati. "The ARBAC97 Model for Role-based Administration of Roles: Preliminary Description and Outline," Second ACM Workshop on Role-based Access Control, Fairfax, Virginia, November 1997, pp. 41-54.
-
(1997)
Second ACM Workshop on Role-based Access Control
, pp. 41-54
-
-
Sandhu, R.1
Bhamidipati, V.2
-
8
-
-
0031379041
-
A role-based access control model for protection domain derivation and management
-
Fairfax, Virginia, November
-
Jaeger, T. and Federquegiraud. "A Role-based Access Control Model for Protection Domain Derivation and Management," Second ACM Workshop on Role-based Access Control, Fairfax, Virginia, November 1997, pp. 95-108.
-
(1997)
Second ACM Workshop on Role-based Access Control
, pp. 95-108
-
-
Jaeger, T.1
Federquegiraud2
-
10
-
-
71449117058
-
An object-oriented RBAC model for distributed systems
-
WICSA 2001, The Netherlands, August
-
Zhang, C.N. and C. Yang. "An Object-oriented RBAC Model for Distributed Systems," 2001 IEEE/IFIP Conference on Software Architecture, WICSA 2001, The Netherlands, August 2001, pp. 24-32.
-
(2001)
2001 IEEE/IFIP Conference on Software Architecture
, pp. 24-32
-
-
Zhang, C.N.1
Yang, C.2
-
12
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
Osborn, S., R. Sandhu and Munawer. "Configuring Role-based Access Control to Enforce Mandatory and Discretionary Access Control Policies," ACM Transaction on Information and System Security, 3:2, 2000, pp. 85-106.
-
(2000)
ACM Transaction on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer3
-
13
-
-
50249183308
-
Role hierarchies and constraints for lattice-based access control
-
Computer Security-ESORICS, 96, Springer-Verlag
-
Sandhu, R. "Role Hierarchies and Constraints for Lattice-based Access Control," Computer Security-ESORICS, 96. Springer-Verlag, 1996, Lecture Notes 1146, pp. 65-79.
-
(1996)
Lecture Notes
, vol.1146
, pp. 65-79
-
-
Sandhu, R.1
-
14
-
-
1242349397
-
Modeling mandatory access control in role based security systems
-
Spooner, D., S. Demurjian, and J. Dobson (Eds.). Chapman & Hall
-
Nyanchama, M. and S.L. Osborn. "Modeling Mandatory Access Control in Role Based Security Systems." In Spooner, D., S. Demurjian, and J. Dobson (Eds.). Proceedings of the IFIP WG 11.3 Ninth Annual Working Conference on Database Security. Chapman & Hall, 1996, pp. 129-144.
-
(1996)
Proceedings of the IFIP WG 11.3 Ninth Annual Working Conference on Database Security
, pp. 129-144
-
-
Nyanchama, M.1
Osborn, S.L.2
-
15
-
-
84876661880
-
-
UML Resource Center
-
United Modeling Language. UML Resource Center, http:// www.rational.com.
-
United Modeling Language
-
-
-
16
-
-
0036851073
-
Designing of a complete model of object-oriented role-based access control system for distributed networks
-
accepted and will be published in September
-
Zhang, C.N. and C. Yang. "Designing of a Complete Model of Object-oriented Role-based Access Control System for Distributed Networks," Journal of Information Science and Engineering (JISE), accepted and will be published in September 2002.
-
(2002)
Journal of Information Science and Engineering (JISE)
-
-
Zhang, C.N.1
Yang, C.2
-
17
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
Denning, D.E. "A Lattice Model of Secure Information Flow," Communication of the ACM, 19:5, May 1976, pp. 236-243.
-
(1976)
Communication of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
18
-
-
84870374862
-
Information flow in inference for free
-
Potter, F. and S. Conchon. "Information Flow in Inference for Free," ICFP00, ACM, 2000, pp. 45-57.
-
(2000)
ICFP00, ACM
, pp. 45-57
-
-
Potter, F.1
Conchon, S.2
-
19
-
-
0034835461
-
A new type system for secure information flow
-
Cape Breton, Nova Scotia, June 2001, IEEE
-
Smith, G. "A New Type System for Secure Information Flow," Proc. 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, June 2001, IEEE, 2001, pp. 115-125.
-
(2001)
Proc. 14th IEEE Computer Security Foundations Workshop
, pp. 115-125
-
-
Smith, G.1
-
21
-
-
0025065897
-
Integrating an object-oriented data model with multilevel security
-
Oakland, CA, May
-
Jajodia, S. and B. Kogan. "Integrating an Object-oriented Data Model with Multilevel Security," Proc. IEEE Symp. On Security and Privacy, Oakland, CA, May 1990.
-
(1990)
Proc. IEEE Symp. On Security and Privacy
-
-
Jajodia, S.1
Kogan, B.2
|