-
3
-
-
84878346861
-
Improving host security with system call policies
-
(Washington, DC), August
-
N. Provos, "Improving host security with system call policies," in Proceedings of the 12th USENIX Security Symposium, (Washington, DC), August 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
-
-
Provos, N.1
-
4
-
-
0030677524
-
A logical language for expressing authorizations
-
(Oakland, CA), May
-
S. Jajodia, P. Samarati, and V. Subrahmanian, "A logical language for expressing authorizations," in Proceedings of the IEEE Symposium on Security and Privacy, (Oakland, CA), pp. 31-42, May 1997.
-
(1997)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 31-42
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.3
-
5
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
May
-
S. Jajodia, P. Samarati, V. Subrahmanian, and E. Bertino, "A unified framework for enforcing multiple access control policies," in Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 474-485, May 1997.
-
(1997)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 474-485
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.3
Bertino, E.4
-
6
-
-
84948735377
-
A privacy policy model for enterprises
-
(Nova Scotia, Canada), IEEE Computer Society Press, June
-
G. Karjoth and M. Schunter, "A privacy policy model for enterprises," in Proceedings of the 15th IEEE Computer Security Foundations Workshop, (Nova Scotia, Canada), IEEE Computer Society Press, June 2002.
-
(2002)
Proceedings of the 15th IEEE Computer Security Foundations Workshop
-
-
Karjoth, G.1
Schunter, M.2
-
7
-
-
0035790746
-
Modular authorization
-
Chantilly, VA
-
H. F. Wedde and M. Lischka, "Modular authorization," in Proceedings of the 6th A CM Symposium on Access Control Models and Technologies, (Chantilly, VA), pp. 97-105, 2001.
-
(2001)
Proceedings of the 6th A CM Symposium on Access Control Models and Technologies
, pp. 97-105
-
-
Wedde, H.F.1
Lischka, M.2
-
8
-
-
0035790640
-
A logical framework for reasoning about access control models
-
(Chantilly, VA)
-
E. Bertino, B. Catania, E. Ferrari, and P. Perlasca, "A logical framework for reasoning about access control models," in Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, (Chantilly, VA), pp. 41-52, 2001.
-
(2001)
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies
, pp. 41-52
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
9
-
-
84974750564
-
Authorizations in distributed systems: A new approach
-
T. Woo and S. Lam, "Authorizations in distributed systems: A new approach," Journal of Computer Science, vol. 6, no. 2,3, pp. 107-136, 1993.
-
(1993)
Journal of Computer Science
, vol.6
, Issue.2-3
, pp. 107-136
-
-
Woo, T.1
Lam, S.2
-
10
-
-
15944383876
-
Protection in flexible operating system architectures
-
October
-
C. Rippert, "Protection in flexible operating system architectures," ACM SIGOPS Operating Systems Review, vol. 37, pp. 8-18, October 2003.
-
(2003)
ACM SIGOPS Operating Systems Review
, vol.37
, pp. 8-18
-
-
Rippert, C.1
-
12
-
-
85084160641
-
The flask security architecture: System support for diverse security policies
-
August
-
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lepreau, "The flask security architecture: System support for diverse security policies," in Proceedings of the 8th USENIX Security Symposium, pp. 123-139, August 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, pp. 123-139
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Hibler, M.4
Andersen, D.5
Lepreau, J.6
-
14
-
-
0242540396
-
Managing access control policies using access control spaces
-
(Monterey, CA), June
-
T. Jaeger, A. Edwards, and X. Zhang, "Managing access control policies using access control spaces," in Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, (Monterey, CA), pp. 3-12, June 2002.
-
(2002)
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies
, pp. 3-12
-
-
Jaeger, T.1
Edwards, A.2
Zhang, X.3
|