-
1
-
-
0029211469
-
Practical domain and type enforcement for UNIX
-
L. Badger and D. F. Sterne and D. L. Sherman and K. M. Walker. Practical Domain and Type Enforcement for UNIX. In IEEE Symposium on Security and Privacy, Oakland, California, May 1995, 66-77.
-
IEEE Symposium on Security and Privacy, Oakland, California, May 1995
, pp. 66-77
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
-
2
-
-
0141902726
-
Role based access control for the world wide web
-
J. Barkley, A. Cincotta, D. Ferraiolo, S. Gavrila, and D. R. Kuhn. Role Based Access Control for the World Wide Web. In Proceedings of the 20th National Information System Security Conference, NIST/NSA, 1997.
-
Proceedings of the 20th National Information System Security Conference, NIST/NSA, 1997
-
-
Barkley, J.1
Cincotta, A.2
Ferraiolo, D.3
Gavrila, S.4
Kuhn, D.R.5
-
3
-
-
0003400251
-
Secure computer system: Unified exposition and multics interpretation
-
Technical Report MTR-1997, MITRE, Bedford, MA
-
D. Bell and L. LaPadula. Secure Computer System: Unified Exposition and Multics Interpretation. Technical Report MTR-1997, MITRE, Bedford, MA, 1975.
-
(1975)
-
-
Bell, D.1
LaPadula, L.2
-
5
-
-
0003400255
-
Integrity constraints for secure computer systems
-
Technical Report ESD-TR76-372, USAF Electronic System Division, Bedford, Massachusetts, April
-
K. J. Biba, Integrity Constraints for Secure Computer Systems. Technical Report ESD-TR76-372, USAF Electronic System Division, Bedford, Massachusetts, April 1977.
-
(1977)
-
-
Biba, K.J.1
-
6
-
-
0242697705
-
How to write a setuid program
-
Jan./Feb.
-
M. Bishop, How to Write a Setuid Program. ;login: The USENIX Association Newsletter, 12(1)5-11, Jan./Feb. 1987.
-
(1987)
The USENIX Association Newsletter
, vol.12
, Issue.1
, pp. 5-11
-
-
Bishop, M.1
-
9
-
-
0242445300
-
-
CNet. Microsoft plugs Hotmail security hole; August
-
CNet. Microsoft plugs Hotmail security hole. http://news.cnet.com/news/0-1003-200-6941020.html August 2001.
-
(2001)
-
-
-
10
-
-
84937420536
-
Securing XML documents
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati. Securing XML Documents. In Proceedings. of the 2000 International Conference on Extending Database Technology, Konstanz, Germany, March 27-31, 2000.
-
Proceedings. of the 2000 International Conference on Extending Database Technology, Konstanz, Germany, March 27-31, 2000
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
11
-
-
0242528863
-
XML access control systems: A component-based approach
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, XML Access Control Systems: A Component-Based Approach. In Proceedings of IFIP WG11.3 Working Conf. on Database Security, Schoorl, The Netherlands, August 21-23, 2000.
-
Proceedings of IFIP WG11.3 Working Conf. on Database Security, Schoorl, The Netherlands, August 21-23, 2000
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
12
-
-
0016543936
-
Guarded commands, nondeterminacy and formal derivation of programs
-
Aug
-
E.W. Dijkstra. Guarded Commands, Nondeterminacy and Formal Derivation of Programs. Communication of the ACM, vol. 18, num. 8, 453-457, Aug 1975.
-
(1975)
Communication of the ACM
, vol.18
, Issue.8
, pp. 453-457
-
-
Dijkstra, E.W.1
-
14
-
-
0002357382
-
Role-based access control
-
D. Ferraiolo and R. Kuhn. Role-Based Access Control. In Proceedings of the 15th National Computer Security Conference, Baltimore, Maryland, 1992, 554-563.
-
Proceedings of the 15th National Computer Security Conference, Baltimore, Maryland, 1992
, pp. 554-563
-
-
Ferraiolo, D.1
Kuhn, R.2
-
17
-
-
0242697708
-
-
Web Growth Summary; December
-
M. Gray, Web Growth Summary. http://www.mit.edu/people.mkgray/net/ December 1997.
-
(1997)
-
-
Gray, M.1
-
18
-
-
0030677524
-
A logical language for expressing authorizations
-
Oakland, CA, USA: IEEE Press
-
S. Jajodia, P. Samarati, and V.S. Subrahmanian. A Logical Language for Expressing Authorizations. In Proceedings of the 1997 IEEE Symposium on Security and Privacy. Oakland, CA, USA: IEEE Press, 1997. 31-42.
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
, pp. 31-42
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
-
19
-
-
0003533519
-
HTTP state management mechanism
-
Request for Comments RFC-2965, Internet Engineering Task Force, October
-
D. Kristol, L. Montulli. HTTP State Management Mechanism. Request for Comments RFC-2965, Internet Engineering Task Force, October 2000
-
(2000)
-
-
Kristol, D.1
Montulli, L.2
-
22
-
-
0003799504
-
The temporal logic of reactive and concurrent systems
-
Springer-Verlag: Heidelberg, Germany
-
Z. Manna and A. Pnueli. The Temporal Logic of Reactive and Concurrent Systems. Springer-Verlag: Heidelberg, Germany, 1992.
-
(1992)
-
-
Manna, Z.1
Pnueli, A.2
-
23
-
-
0242697709
-
-
OpenACS Documentation; December
-
OpenACS Documentation. http://www.openacs.org/ December 2001.
-
(2001)
-
-
-
24
-
-
0030086382
-
Role based access control models
-
Feb.
-
R. Sandhu, E. J. Coyne, H. L. Feinstein, and C.E. Youman. Role Based Access Control Models. IEEE Computer, 29 (2), Feb. 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
25
-
-
0027699087
-
Lattice-based access control models
-
November
-
R. S. Sandhu. Lattice-based Access Control Models. IEEE Computer, 26(11): 9-19, November 1993.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
26
-
-
0003970441
-
Enforceable security policies
-
TR 98-1664, Dept. of Computer Science, Cornell Univ., Ithaca, NY
-
F. B. Schneider. Enforceable Security Policies. TR 98-1664, Dept. of Computer Science, Cornell Univ., Ithaca, NY, 1998.
-
(1998)
-
-
Schneider, F.B.1
-
27
-
-
85023476444
-
A comparison of type enforcement and unix setuid implementation of well-formed transactions
-
D. J. Thomsen and J. T. Haigh. A Comparison of Type Enforcement and Unix Setuid Implementation of Well-formed Transactions. In Proceedings of Sixth Annual Computer Security Applications Conf., Tucson, Arizona, December 1990, 304-312.
-
Proceedings of Sixth Annual Computer Security Applications Conf., Tucson, Arizona, December 1990
, pp. 304-312
-
-
Thomsen, D.J.1
Haigh, J.T.2
-
28
-
-
0242528861
-
-
Whitehat, Inc. Secure Web Programming; December
-
Whitehat, Inc. Secure Web Programming, http://www.whitehatsec.com/ December 2001.
-
(2001)
-
-
|