-
3
-
-
0007783431
-
KeyNote: Trust management for public-key infrastructures
-
M. Blaze, J. Feigenbaum, and A. D. Keromytis. KeyNote: Trust management for public-key infrastructures. In Security Protocols International Workshop, Cambridge, England, 1998.
-
Security Protocols International Workshop, Cambridge, England, 1998
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
4
-
-
84962248491
-
Seraphim: Dynamic interoperable security architecture for active networks
-
R. H. Campbell, Z. Liu, M. D. Mickunas, P. Naldurg, and S. Yi. Seraphim: dynamic interoperable security architecture for active networks. In OPENARCH 2000, Tel-Aviv, Israel, March 26-27, 2000.
-
OPENARCH 2000, Tel-Aviv, Israel, March 26-27, 2000
-
-
Campbell, R.H.1
Liu, Z.2
Mickunas, M.D.3
Naldurg, P.4
Yi, S.5
-
5
-
-
0034823078
-
A state-transition model of trust management and access control
-
A. Chander, D. Dean, and J. Mitchell. A state-transition model of trust management and access control. In 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, June 2001.
-
14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, June 2001
-
-
Chander, A.1
Dean, D.2
Mitchell, J.3
-
7
-
-
0016543936
-
Guarded commands, nondeterminacy, and formal derivation of programs
-
E. Dijkstra. Guarded commands, nondeterminacy, and formal derivation of programs. Communications of the ACM, 18(8):453-457, 1975.
-
(1975)
Communications of the ACM
, vol.18
, Issue.8
, pp. 453-457
-
-
Dijkstra, E.1
-
8
-
-
0002357382
-
Role-based access controls
-
D. F. Ferraiolo and D. R. Kuhn. Role-based access controls. In In Proceedings of the 15th NIST-NSA National Computer Security Conference, Baltimore, MD, Oct, 1992.
-
Proceedings of the 15th NIST-NSA National Computer Security Conference, Baltimore, MD, Oct, 1992
-
-
Ferraiolo, D.F.1
Kuhn, D.R.2
-
9
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino. A unified framework for enforcing multiple access control policies. In In Proceedings of the ACM SIGMOD International Conference on Management of Data, volume 26,2 of SIGMOD Record, pages 474-485, 1997.
-
(1997)
Proceedings of the ACM SIGMOD International Conference on Management of Data, Volume 26,2 of SIGMOD Record
, pp. 474-485
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
Bertino, E.4
-
13
-
-
35248854997
-
Developing dynamic security policies
-
IEEE Computer Society Press, May 29-31
-
P. Naldurg, R. Campbell, and M. D. Mickunas. Developing dynamic security policies. In Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002), San Francisco, CA, USA, IEEE Computer Society Press, May 29-31, 2002.
-
(2002)
Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002), San Francisco, CA, USA
-
-
Naldurg, P.1
Campbell, R.2
Mickunas, M.D.3
-
15
-
-
0030086382
-
Role-based access control models
-
Feb.
-
R. S. Sandhu and E. J. Coyne. Role-based access control models. IEEE Computer, 29(2), Feb. 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.S.1
Coyne, E.J.2
|