-
2
-
-
0003400257
-
-
Tech. Rep. MTR-2547, Mitre Corporation
-
BELL, D., AND LAPADULA, L. Secure computer systems: Mathematical foundations. Tech. Rep. MTR-2547, Volume I, Mitre Corporation, 1973.
-
(1973)
Secure Computer Systems: Mathematical Foundations
, vol.1
-
-
Bell, D.1
Lapadula, L.2
-
3
-
-
0003400257
-
-
Tech. Rep. MTR-2547, Mitre Corporation
-
BELL, D., AND LAPADULA, L. Secure computer systems: A mathematical model. Tech. Rep. MTR-2547, Volume II, Mitre Corporation, 1973.
-
(1973)
Secure Computer Systems: A Mathematical Model
, vol.2
-
-
Bell, D.1
Lapadula, L.2
-
6
-
-
0043228162
-
-
Tech. Rep. BBKCS-00-18, Birkbeck College, University of London
-
CRAMPTON, J., AND LOIZOU, G. Hierarchical secure systems: A preliminary description. Tech. Rep. BBKCS-00-18, Birkbeck College, University of London, 2000.
-
(2000)
Hierarchical Secure Systems: A Preliminary Description
-
-
Crampton, J.1
Loizou, G.2
-
7
-
-
0042225964
-
-
Tech. Rep. BBKCS-00-05, Birkbeck College, University of London
-
CRAMPTON, J., AND LOIZOU, G. Two partial orders on the set of antichains. Tech. Rep. BBKCS-00-05, Birkbeck College, University of London, 2000.
-
(2000)
Two Partial Orders on the Set of Antichains
-
-
Crampton, J.1
Loizou, G.2
-
8
-
-
0043228163
-
The completion of a poset in a lattice of antichains
-
Accepted for publication
-
CRAMPTON, J., AND LOIZOU, G. The completion of a poset in a lattice of antichains. International Mathematical Journal (2001). Accepted for publication.
-
(2001)
International Mathematical Journal
-
-
Crampton, J.1
Loizou, G.2
-
10
-
-
0035653031
-
A logic of access control
-
To appear
-
CRAMPTON, J., LOIZOU, G., AND O'SHEA, G. A logic of access control. The Computer Journal 44, 1 (2001). To appear.
-
(2001)
The Computer Journal
, vol.44
, pp. 1
-
-
Crampton, J.1
Loizou, G.2
O'Shea, G.3
-
11
-
-
0031611731
-
Formal specification for role based access control user/role and role/role relationship management
-
Fairfax, Virginia
-
GAVRILA, S., AND BARKLEY, J. Formal specification for role based access control user/role and role/role relationship management. In Proceedings of Third ACM Workshop on Role-Based Access Control (Fairfax, Virginia, 1998), pp. 81-90.
-
(1998)
Proceedings of Third ACM Workshop on Role-Based Access Control
, pp. 81-90
-
-
Gavrila, S.1
Barkley, J.2
-
12
-
-
0016984825
-
Protection in operating systems
-
HARRISON, M., RUZZO, W., AND ULLMAN, J. Protection in operating systems. Communications of the ACM 19, 8 (1976), 461-471.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.1
Ruzzo, W.2
Ullman, J.3
-
17
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
SANDHU, R., BHAMIDIPATI, V., AND MUNAWER, Q. The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security 1, 2 (1999), 105-135.
-
(1999)
ACM Transactions on Information and System Security
, vol.1
, Issue.2
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
18
-
-
0030086382
-
Role-based access control models
-
SANDHU, R., COYNE, E., FEINSTEIN, H., AND YOUMAN, C. Role-based access control models. IEEE Computer 29, 2 (1996), 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
19
-
-
0033652039
-
The NIST model for role-based access control: Towards a unified standard
-
Phoenix, Arizona, USA
-
SANDHU, R., FERRAIOLO, D., AND KUHN, D. The NIST model for role-based access control: Towards a unified standard. In Proceedings of the 5th ACM Workshop on Role-Based Access Control (Phoenix, Arizona, USA, 2000). http://www.acm.org/sigsac/nist.pdf.
-
(2000)
Proceedings of the 5th ACM Workshop on Role-Based Access Control
-
-
Sandhu, R.1
Ferraiolo, D.2
Kuhn, D.3
-
20
-
-
0000657407
-
Ein satz über untermengen einer endlichen menge
-
SPERNER, E. Ein Satz über Untermengen einer endlichen Menge. Mathematische Zeitschrift 27 (1928), 544-548.
-
(1928)
Mathematische Zeitschrift
, vol.27
, pp. 544-548
-
-
Sperner, E.1
|