-
1
-
-
84865788031
-
A model of OASIS role-based access control and its support for active security
-
November
-
J. Bacon, K. Moody, and W. Yao. A Model of OASIS Role-Based Access Control and its Support for Active Security. ACM Transactions on Information and System Security (TISSEC), 5(4):492 - 540, November 2002.
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, Issue.4
, pp. 492-540
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
2
-
-
0031382313
-
A flexible model supporting the specification and enforcement of role-based authorizations in workflow management systems
-
E. Bertino, E. Ferrari, and V. Atluri. A Flexible Model Supporting the Specification and Enforcement of Role-based Authorizations in Workflow Management Systems. In ACM Workshop on Role-based Access Control, pages 1-12, 1997.
-
(1997)
ACM Workshop on Role-Based Access Control
, pp. 1-12
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
3
-
-
84976749912
-
The specification of process synchronization by path expressions
-
Springer Verlag, April
-
R. H. Campbell and A. N. Habermann. The Specification of Process Synchronization by Path Expressions. In Operating Systems, International Symposium, Rocquencourt. Lecture Notes in Computer Science vol.16, Springer Verlag, April 1974.
-
(1974)
Operating Systems, International Symposium, Rocquencourt. Lecture Notes in Computer Science
, vol.16
-
-
Campbell, R.H.1
Habermann, A.N.2
-
4
-
-
0027842254
-
Verifying system security using petri nets
-
Oct
-
S. Castano, P. Samarati, and C. Villa. Verifying System Security Using Petri Nets. In Security Technology, 1993. Security Technology, Proceedings. Institute of Electrical and Electronics Engineers 1993 International Carnahan Conference on, pages 244-250, Oct 1993.
-
Security Technology, 1993. Security Technology, Proceedings. Institute of Electrical and Electronics Engineers 1993 International Carnahan Conference on
, vol.1993
, pp. 244-250
-
-
Castano, S.1
Samarati, P.2
Villa, C.3
-
5
-
-
0033697422
-
Bandera: Extracting finite-state models from Java source code
-
J. C. Corbett, M. B. Dwyer, J. Hatcliff, S. Laubach, C. S. Pǎsǎreanu, Robby, and H. Zheng. Bandera: Extracting Finite-State Models from Java Source Code. In Proc. of ICSE'2000, pages 439 - 448, 2000.
-
(2000)
Proc. of ICSE'2000
, pp. 439-448
-
-
Corbett, J.C.1
Dwyer, M.B.2
Hatcliff, J.3
Laubach, S.4
Pǎsǎreanu, C.S.5
Robby6
Zheng, H.7
-
7
-
-
0036039907
-
Verification support for workflow design with UML activity graphs
-
R. Eshuis and R. Wieringa. Verification Support for Workflow Design with UML Activity Graphs. In Proc. of ICSE'2002, pages 166 - 176, 2002.
-
(2002)
Proc. of ICSE'2002
, pp. 166-176
-
-
Eshuis, R.1
Wieringa, R.2
-
8
-
-
0028678368
-
Specifying security for computer supported collaborative computing
-
S. Foley and J. Jacob. Specifying Security for Computer Supported Collaborative Computing. Journal of Computer Security, 3(4):233-253, 1995.
-
(1995)
Journal of Computer Security
, vol.3
, Issue.4
, pp. 233-253
-
-
Foley, S.1
Jacob, J.2
-
9
-
-
0016984825
-
Protection in operating systems
-
August
-
M. A. Harrison, W. L. Ruzzo, and J. D. Ullman. Protection in Operating Systems. Communications of the ACM, 19(8):461 - 471, August 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
13
-
-
0031382488
-
Reconciling role-based management and role-based access control
-
E. C. Lupu and M. Sloman. Reconciling Role-Based Management and Role-Based Access Control. In ACM Workshop on Role-based Access Control, pages 135-141, 1997.
-
(1997)
ACM Workshop on Role-Based Access Control
, pp. 135-141
-
-
Lupu, E.C.1
Sloman, M.2
-
15
-
-
0242655680
-
Enterprise-wide workflow management based on state and activity charts
-
in: A. Dogac, L. Kalinichenko, T. Ozsu, A. Sheth (Eds.):. Springer Verlag
-
P. Muth, D. Wodtke, J. Weissenfels, G. Weikum, and A. Kotz Dittrich. Enterprise-wide Workflow Management based on State and Activity Charts, Workflow Management Systems and Interoperability in: A. Dogac, L. Kalinichenko, T. Ozsu, A. Sheth (Eds.):. Springer Verlag, 1998.
-
(1998)
Workflow Management Systems and Interoperability
-
-
Muth, P.1
Wodtke, D.2
Weissenfels, J.3
Weikum, G.4
Kotz Dittrich, A.5
-
19
-
-
0017723679
-
Towards autonomous descriptions of synchronization modules
-
P. Roberts and J.-P. Verjus. Towards Autonomous Descriptions of Synchronization Modules. In Proc. of IFIP Congress, pages 981-986, 1977.
-
(1977)
Proc. of IFIP Congress
, pp. 981-986
-
-
Roberts, P.1
Verjus, J.-P.2
-
20
-
-
0034829266
-
Non-interference, who needs it?
-
P. Ryan, J. McLean, J. Millen, and V. Gligor. Non-interference, who needs it? In 14th IEEE Computer Security Foundations Workshop, pages 237-238, 2001.
-
(2001)
14th IEEE Computer Security Foundations Workshop
, pp. 237-238
-
-
Ryan, P.1
McLean, J.2
Millen, J.3
Gligor, V.4
-
22
-
-
0030086382
-
Role-based access control models
-
February
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-Based Access Control Models. IEEE Computer, 29(2):38-47, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
23
-
-
0019548112
-
Formal models of capability-based protection systems
-
March
-
L. Snyder. Formal Models of Capability-Based Protection Systems. IEEE Transactions on Computers, C-30(3):172 - 181, March 1981.
-
(1981)
IEEE Transactions on Computers
, vol.C-30
, Issue.3
, pp. 172-181
-
-
Snyder, L.1
-
24
-
-
0031387996
-
Team-based Access Control (TMAC): A primitive for applying role-based access controls in collaborative environments
-
R. K. Thomas. Team-based Access Control (TMAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments. In ACM Workshop on Role-based Access Control, pages 13 - 19, 1997.
-
(1997)
ACM Workshop on Role-Based Access Control
, pp. 13-19
-
-
Thomas, R.K.1
-
27
-
-
0036375158
-
Design of a policy-driven middleware for secure distributed collaboration
-
July
-
A. Tripathi, T. Ahmed, R. Kumar, and S. Jaman. Design of a Policy-Driven Middleware for Secure Distributed Collaboration. In Proc. of International Conference on Distributed Computing Systems 2002, pages 393 - 400, July 2002.
-
(2002)
Proc. of International Conference on Distributed Computing Systems 2002
, pp. 393-400
-
-
Tripathi, A.1
Ahmed, T.2
Kumar, R.3
Jaman, S.4
|