-
1
-
-
0036510173
-
A content-based authorization model for digital libraries
-
ADAM, N., ATLURT, V., BERTINO, B., AND FERRARI, E. 2002. A Content-Based Authorization Model for Digital Libraries. IEEE Trans. Knowl. Data Eng. 14, 2 (March/April), 296-315.
-
(2002)
IEEE Trans. Knowl. Data Eng.
, vol.14
, Issue.2 MARCH-APRIL
, pp. 296-315
-
-
Adam, N.1
Atlurt, V.2
Bertino, B.3
Ferrari, E.4
-
2
-
-
84862389354
-
-
AGG. See http://tfs.cs.tu-berlin.de/agg/docu.html.
-
-
-
-
4
-
-
0033685030
-
A petri net based safety analysis of workflow authorization models
-
ATLURI, V. AND HUANG, W. 2000. A Petri Net Based Safety Analysis of Workflow Authorization Models. J. Comput. Secu. 8, 2&3.
-
(2000)
J. Comput. Secu.
, vol.8
, Issue.2-3
-
-
Atluri, V.1
Huang, W.2
-
5
-
-
0003400251
-
Secure computer systems: Unified exposition and multics interpretation
-
Hanscom Air Force Base, Bedford, MA
-
BELL, D. AND PADULA, L. L. 1975. Secure Computer Systems: Unified Exposition and Multics Interpretation. Tech. Rep. ESD-TR-75-306, Hanscom Air Force Base, Bedford, MA.
-
(1975)
Tech. Rep.
, vol.ESD-TR-75-306
-
-
Bell, D.1
Padula, L.L.2
-
6
-
-
0032153903
-
An access control mechanism supporting periodicity constraints and temporal reasoning
-
BERTINO, E., BETTINI, C., FERRARI, E., AND SAMARATI, P. 1998. An Access Control Mechanism Supporting Periodicity Constraints and Temporal Reasoning. ACM Trans. Database Syst. 23, 3, 231-285.
-
(1998)
ACM Trans. Database Syst.
, vol.23
, Issue.3
, pp. 231-285
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
7
-
-
0033725849
-
A logic-based approach for enforcing access control
-
BERTINO, E., BUCCAFURRI, F., FERRARI, E., AND RULLO, P. 2000. A Logic-Based Approach for Enforcing Access Control. J. Comput. Secu. 8, 2&3.
-
(2000)
J. Comput. Secu.
, vol.8
, Issue.2-3
-
-
Bertino, E.1
Buccafurri, F.2
Ferrari, E.3
Rullo, P.4
-
8
-
-
84893074859
-
A system to specify and manage multipolicy access control models
-
BERTINO, E., CATANIA, B., FERRARI, E., AND PERLASCA, P. 2002. A System to Specify and Manage Multipolicy Access Control Models. In Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks.
-
(2002)
Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
9
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow managenent systems
-
BERTINO, E., FERRARI, E., AND ATLURI, V. 1999. The Specification and Enforcement of Authorization Constraints in Workflow Managenent Systems. ACM Trans. Inform. Syst. Secu. 2, 1, 65-104.
-
(1999)
ACM Trans. Inform. Syst. Secu.
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
10
-
-
0030732547
-
An extended authorization model
-
BERTINO, E., SAMARATI, P., AND JAJODIA, S. 1997. An Extended Authorization Model. IEEE Trans. Knowl. Data Engi. 9, 1 (January/February).
-
(1997)
IEEE Trans. Knowl. Data Engi.
, vol.9
, Issue.1 JANUARY-FEBRUARY
-
-
Bertino, E.1
Samarati, P.2
Jajodia, S.3
-
11
-
-
0004190705
-
-
Addison-Wesley
-
CASTANO, S., FUGINI, M., MARTELLA, G., AND SAMARATI, P. 1995. Database Security. Addison-Wesley.
-
(1995)
Database Security
-
-
Castano, S.1
Fugini, M.2
Martella, G.3
Samarati, P.4
-
12
-
-
84862389352
-
-
CORAL
-
CORAL. See ftp.cs.wisc.edu/coral/.
-
-
-
-
13
-
-
84862378032
-
-
ECLiPSe
-
ECLiPSe. See http://www-icparc.doc.ic.ac.uk/eclipse/.
-
-
-
-
14
-
-
0004063990
-
-
(Applications, Languages, and Tools). World Scientific
-
EHRIG, H., KREOWSKI, H., MONTANARI, U., AND ROZENBERG, G., Eds. 1999. Handbook of Graph Grammars and Computing by Graph Transformation, vol. 2 (Applications, Languages, and Tools). World Scientific.
-
(1999)
Handbook of Graph Grammars and Computing by Graph Transformation
, vol.2
-
-
Ehrig, H.1
Kreowski, H.2
Montanari, U.3
Rozenberg, G.4
-
15
-
-
0028404874
-
A model for evaluation and administration of security in object-oriented databases
-
FERNANDEZ, E., GUDES, E., AND SONG, H. 1994. A Model for Evaluation and Administration of Security in Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 6, 275-292.
-
(1994)
IEEE Trans. Knowl. Data Eng.
, vol.6
, pp. 275-292
-
-
Fernandez, E.1
Gudes, E.2
Song, H.3
-
17
-
-
0023231838
-
Undeoidable optimization problems in database logic programs
-
GAIFMAN, H., MAIRSON, H., SAGIV, Y., AND VARDI, M. 1987. Undeoidable Optimization Problems in Database Logic Programs. In Proceedings of the 2nd IEEE Symposium on Logic in Computer. 106-115.
-
(1987)
Proceedings of the 2nd IEEE Symposium on Logic in Computer
, pp. 106-115
-
-
Gaifman, H.1
Mairson, H.2
Sagiv, Y.3
Vardi, M.4
-
18
-
-
0009227355
-
DACTL: An experimental graph rewriting language
-
Springer-Verlag, Ed.
-
GLAUERT, J., KENNAWAY, R., AND SLEEP, R. 1991. DACTL: An Experimental Graph Rewriting Language. In Proceedings of the 4th. International Workshop on Graph Grammars and their Application to Computer Science, Springer-Verlag, Ed. vol. 532. 378-395.
-
(1991)
Proceedings of the 4th. International Workshop on Graph Grammars and their Application to Computer Science
, vol.532
, pp. 378-395
-
-
Glauert, J.1
Kennaway, R.2
Sleep, R.3
-
19
-
-
0026905476
-
COMPLEX: An object-oriented logic programming system
-
GRECO, S., LEONE, N., AND RULLO, P. 1992. COMPLEX: An Object-Oriented Logic Programming System. IEEE Trans. Knowl. Data Eng. 4, 72-87.
-
(1992)
IEEE Trans. Knowl. Data Eng.
, vol.4
, pp. 72-87
-
-
Greco, S.1
Leone, N.2
Rullo, P.3
-
20
-
-
0025402060
-
Starbust mid-flight: As the dust clears
-
HAAS, L., CHANG, W., AND LOHMAN, G. 1990. Starbust Mid-Flight: As the Dust Clears. IEEE Trans. Knowl. Data Eng. 2, 33-54.
-
(1990)
IEEE Trans. Knowl. Data Eng.
, vol.2
, pp. 33-54
-
-
Haas, L.1
Chang, W.2
Lohman, G.3
-
21
-
-
85006937063
-
Practical safety in flexible access control models
-
JAEGER, T. AND TIDSWELL, J. 2001. Practical Safety in Flexible Access Control Models. ACM Trans. Inform. Syst. Secu. 4, 2 (May), 158-190.
-
(2001)
ACM Trans. Inform. Syst. Secu.
, vol.4
, Issue.2 MAY
, pp. 158-190
-
-
Jaeger, T.1
Tidswell, J.2
-
22
-
-
0001619596
-
Flexible support for multiple access control policies
-
JAJODIA, S., SAMARATT, P., SAPINO, M., AND SUBHAHMANIAN, V. 2001. Flexible Support for Multiple Access Control Policies. ACM Trans. Database Syst. 26, 2 (June), 214-260.
-
(2001)
ACM Trans. Database Syst.
, vol.26
, Issue.2 JUNE
, pp. 214-260
-
-
Jajodia, S.1
Samaratt, P.2
Sapino, M.3
Subhahmanian, V.4
-
23
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
JAJODIA, S., SAMARATI, P., SUBRAHMANIAN, V., AND BERTINO, E. 1997. A Unified Framework for Enforcing Multiple Access Control Policies. In Proceedings of the ACM SIGMOD International Conference on Management of Data. 474-485.
-
(1997)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 474-485
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.3
Bertino, E.4
-
25
-
-
0035790747
-
On the specification and evolution of access control policies
-
Chantilly, Virginia, USA
-
KOCH, M., MANCINI, L., AND PARISI-PRESICCE, F. 2001. On the Specification and Evolution of Access Control Policies. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT-01). Chantilly, Virginia, USA, 121-130.
-
(2001)
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT-01)
, pp. 121-130
-
-
Koch, M.1
Mancini, L.2
Parisi-Presicce, F.3
-
26
-
-
0027841958
-
Equivalence, query-reachability, and satisfiability in datalog extensions
-
LEVY, A., MUMICK, I., SAGIV, Y., AND SHMUELI, O. 1993. Equivalence, Query-Reachability, and Satisfiability in Datalog Extensions. In Proceedings of the 12th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems. 109-122.
-
(1993)
Proceedings of the 12th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems
, pp. 109-122
-
-
Levy, A.1
Mumick, I.2
Sagiv, Y.3
Shmueli, O.4
-
29
-
-
0026119329
-
A model of authorization for next-generation database systems
-
RABITTI, F., BERTINO, E., KIM, W., AND WOELK, D. 1991. A Model of Authorization for Next-Generation Database Systems. ACM Trans. Database Syst. 16, 1 (March), 88-131.
-
(1991)
ACM Trans. Database Syst.
, vol.16
, Issue.1 MARCH
, pp. 88-131
-
-
Rabitti, F.1
Bertino, E.2
Kim, W.3
Woelk, D.4
-
31
-
-
0030216932
-
An authorization model for a distributed hypertext system
-
SAMARATI, P., BERTINO, E., AND JAJODIA, S. 1996. An Authorization Model for a Distributed Hypertext System. IEEE Trans. Knowl. Data Eng. 8, 4 (August), 555-562.
-
(1996)
IEEE Trans. Knowl. Data Eng.
, vol.8
, Issue.4 AUGUST
, pp. 555-562
-
-
Samarati, P.1
Bertino, E.2
Jajodia, S.3
-
32
-
-
84974744165
-
Expressive power of the schematic protection model
-
SANDHU, R. 1992a. Expressive Power of the Schematic Protection Model. J. Comput. Secu. 1, 1.
-
(1992)
J. Comput. Secu.
, vol.1
, Issue.1
-
-
Sandhu, R.1
-
34
-
-
50249183308
-
Role hierarchies and constraints for lattice-based access controls
-
E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Number 1146 in Lecture Notes in Computer Science. Rome, Italy
-
SANDHU, R. 1996. Role Hierarchies and Constraints for Lattice-based Access Controls. In Computer Security - Esorics'96, E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Number 1146 in Lecture Notes in Computer Science. Rome, Italy, 65-79.
-
(1996)
Computer Security - Esorics'96
, pp. 65-79
-
-
Sandhu, R.1
-
35
-
-
0030086382
-
Role-based access control models
-
SANDHU, R., COYNE, E., FEINSTEIN, H., AND YOUMAN, C. 1996. Role-Based Access Control Models. IEEE Comput. 29, 2 (February), 38-47.
-
(1996)
IEEE Comput.
, vol.29
, Issue.2 FEBRUARY
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
36
-
-
0033652039
-
The NIST model for role-based access control: Towards a unified standard
-
Berlin, Germany
-
SANDHU, R., FERRAIOLO, D., AND KUHN, R. 2000. The NIST Model for Role-Based Access Control: Towards a Unified Standard. In Proceedings of the 5th ACM Workshop on Role-Based Access Control. Berlin, Germany, 47-63.
-
(2000)
Proceedings of the 5th ACM Workshop on Role-based Access Control
, pp. 47-63
-
-
Sandhu, R.1
Ferraiolo, D.2
Kuhn, R.3
-
39
-
-
84862373075
-
-
STRAWBERRY PROLOG. See http://www.dobrev.coin/index.html.
-
Strawberry Prolog
-
-
-
40
-
-
0002841051
-
Task-based authorization controls (TBAC): Models for active and enterprise-oriented authorization management
-
Lake Tahoe (CA)
-
THOMAS, R. AND SANDHU, R. 1997. Task-Based Authorization Controls (TBAC): Models for Active and Enterprise-Oriented Authorization Management. In Proceedings of the 11th IFIP Working Conference on Database Security. Lake Tahoe (CA), 136-151.
-
(1997)
Proceedings of the 11th IFIP Working Conference on Database Security
, pp. 136-151
-
-
Thomas, R.1
Sandhu, R.2
-
42
-
-
0031338080
-
Using digital credentials on the World Wide Web
-
WINSLETT, M., CHING, N., JONES, V., AND SLEPCHIN, I. 1997. Using Digital Credentials on the World Wide Web. J. Comput. Secu. 5, 3.
-
(1997)
J. Comput. Secu.
, vol.5
, Issue.3
-
-
Winslett, M.1
Ching, N.2
Jones, V.3
Slepchin, I.4
-
43
-
-
84862378031
-
-
XSB
-
XSB. See http://xsb.sourceforge.net/.
-
-
-
|