-
1
-
-
4243503866
-
Cryptographic context negotiation protocol
-
Network Associates, Inc.
-
D. Balenson, D. Branstad, P. Dinsmore, M. Heyman, and C. Scace. Cryptographic Context Negotiation Protocol. Technical report, Network Associates, Inc., 1999.
-
(1999)
Technical Report
-
-
Balenson, D.1
Branstad, D.2
Dinsmore, P.3
Heyman, M.4
Scace, C.5
-
2
-
-
4243503866
-
Cryptographic context negotiation template
-
Network Associates, Inc.
-
D. Balenson, D. Branstad, D. McGrew, J. Turner, and M. Heyman. Cryptographic Context Negotiation Template. Technical report, Network Associates, Inc., 1999.
-
(1999)
Technical Report
-
-
Balenson, D.1
Branstad, D.2
McGrew, D.3
Turner, J.4
Heyman, M.5
-
3
-
-
0032643221
-
Firmato: A novel firewall management toolkit
-
Y. Bartal, A. J. Mayer, K. Nissim, and A. Wool. Firmato: A novel firewall management toolkit. In IEEE Symposium on Security and Privacy, pages 17-31, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 17-31
-
-
Bartal, Y.1
Mayer, A.J.2
Nissim, K.3
Wool, A.4
-
4
-
-
0003400251
-
Secure computer systems: Mathematical foundations and model
-
MITRE Corporation, Bedford, MA
-
D. Bell and L. LaPadula. Secure Computer Systems: Mathematical Foundations and Model. Technical Report M74-244, MITRE Corporation, Bedford, MA, 1973.
-
(1973)
Technical Report
, vol.M74-244
-
-
Bell, D.1
LaPadula, L.2
-
7
-
-
84958235938
-
Trust management for IPsec
-
M. Blaze, J. Ioannidis, and A. D. Keromytis. Trust management for IPsec. Information and System Security, 5(2):95-118, 2002.
-
(2002)
Information and System Security
, vol.5
, Issue.2
, pp. 95-118
-
-
Blaze, M.1
Ioannidis, J.2
Keromytis, A.D.3
-
9
-
-
84860061719
-
-
Condor. http://www.cs.wisc.edu/condor/.
-
-
-
-
10
-
-
0036083264
-
Binder, a logic-based security language
-
Oakland, CA, May IEEE Computer Society Press
-
J. DeTreville. Binder, a logic-based security language. In Symp. on Res. in Sec. and Privacy, Oakland, CA, May 2002. IEEE Computer Society Press.
-
(2002)
Symp. on Res. in Sec. and Privacy
-
-
DeTreville, J.1
-
11
-
-
84961696448
-
Policy-based security management for large dynamic groups: An overview of the DCCM project
-
P. Dinsmore, D. Balenson, M. Heyman, P. Kruus, C. Scace, and A. Sherman. Policy-Based Security Management for Large Dynamic Groups: An Overview of the DCCM Project. In DARPA Information Survivability Conference and Exposition, pages 64-73, 2000.
-
(2000)
DARPA Information Survivability Conference and Exposition
, pp. 64-73
-
-
Dinsmore, P.1
Balenson, D.2
Heyman, M.3
Kruus, P.4
Scace, C.5
Sherman, A.6
-
12
-
-
1942521913
-
SPKI requirements
-
Sept.
-
C. Ellison. SPKI requirements. RFC 2692, Sept. 1999.
-
(1999)
RFC
, vol.2692
-
-
Ellison, C.1
-
13
-
-
0003358457
-
SPKI certificate theory
-
Sept.
-
C. Ellison, B. Frantz, B. Lampson, R. L. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory. RFC 2693, Sept. 1999.
-
(1999)
RFC
, vol.2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.L.4
Thomas, B.5
Ylonen, T.6
-
17
-
-
1542597501
-
Security policy specification using a graphical approach
-
The University of California, Davis Department of Computer Science, June
-
J. Hoagland, R. Pandey, and K. Levitt. Security Policy Specification Using a Graphical Approach. Technical Report CSE-98-3, The University of California, Davis Department of Computer Science, June 1998.
-
(1998)
Technical Report
, vol.CSE-98-3
-
-
Hoagland, J.1
Pandey, R.2
Levitt, K.3
-
20
-
-
85008430937
-
A graph-based formalism for RBAC
-
M. Koch, L. V. Mancini, and F. Parisi-Presicce. A Graph-Based Formalism for RBAC. Transactions on Information and System Security (TISSEC), 5(3):332 - 365, 2002.
-
(2002)
Transactions on Information and System Security (TISSEC)
, vol.5
, Issue.3
, pp. 332-365
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
26
-
-
84887853842
-
A community authorization service for group collaboration
-
L. Pearlman, V. Welch, I. Foster, C. Kesselman, and S. Tuecke. A Community Authorization Service for Group Collaboration. In Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, 2001.
-
(2001)
Proceedings of the IEEE 3rd International Workshop on Policies for Distributed Systems and Networks
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
-
29
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-Based Access Control Models. IEEE Computer, 29(2):38-41, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-41
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
31
-
-
11244348419
-
Security policy reconciliation in deistributed computing environments
-
University of Wisconsin-Madison, March
-
H. Wang, S. Jha, P. McDaniel, and M. Livny. Security Policy Reconciliation in Deistributed Computing Environments. Technical Report 1499, University of Wisconsin-Madison, March 2004.
-
(2004)
Technical Report
, vol.1499
-
-
Wang, H.1
Jha, S.2
McDaniel, P.3
Livny, M.4
-
32
-
-
84904312147
-
BANDS: An inter-domain internet security policy management system for IPSec/VPN
-
Kluwer
-
Y. Yang, Z. Fu, and S. F. Wu. BANDS: An Inter-domain Internet Security Policy Management System for IPSec/VPN. In Integrated Network Management, volume 246 of IFIP Conference Proceedings, pages 231-244. Kluwer, 2003.
-
(2003)
Integrated Network Management, Volume 246 of IFIP Conference Proceedings
, vol.246
, pp. 231-244
-
-
Yang, Y.1
Fu, Z.2
Wu, S.F.3
-
33
-
-
0005946920
-
Domain based internet security policy management
-
J. Zao, L. Sanchez, M. Condell, C. Lynn, M. Fredette, P. Helinek, P. Krishnan, A. Jackson, D. Mankins, M. Shepard, and S. Kent. Domain Based Internet Security Policy Management. In DARPA Information Survivability Conference and Exposition, pages 41-53, 2000.
-
(2000)
DARPA Information Survivability Conference and Exposition
, pp. 41-53
-
-
Zao, J.1
Sanchez, L.2
Condell, M.3
Lynn, C.4
Fredette, M.5
Helinek, P.6
Krishnan, P.7
Jackson, A.8
Mankins, D.9
Shepard, M.10
Kent, S.11
|