-
2
-
-
0036427304
-
Manageable access control for CORBA
-
G. Brose. Manageable Access Control for CORBA. Journal of Computer Security, 4:301-337, 2002.
-
(2002)
Journal of Computer Security
, vol.4
, pp. 301-337
-
-
Brose, G.1
-
4
-
-
84947772746
-
The category of typed graph grammars and their adjunction with categories of derivations
-
in Lect. Notes in Comp. Sci., Springer
-
A. Corradini, H. Ehrig, M. Löwe, and J. Padberg. The category of typed graph grammars and their adjunction with categories of derivations. In 5th Int. Workshop on Graph Grammars and their Application to Computer Science, number 1073 in Lect. Notes in Comp. Sci., pages 56-74. Springer, 1996.
-
(1996)
5th Int. Workshop on Graph Grammars and their Application to Computer Science
, vol.1073
, pp. 56-74
-
-
Corradini, A.1
Ehrig, H.2
Löwe, M.3
Padberg, J.4
-
5
-
-
84970947585
-
Software engineering for security: A roadmap
-
A. Finkelstein, editor, ACM Press
-
P. T. Devanbu and S. Stubblebine. Software engineering for security: A roadmap. In A. Finkelstein, editor, The Future of Software Engineering. ACM Press, 2000.
-
(2000)
The Future of Software Engineering
-
-
Devanbu, P.T.1
Stubblebine, S.2
-
6
-
-
8644234741
-
-
Rozenberg [19]
-
H. Ehrig, R. Heckel, M. Korff, M. Löwe, L. Ribeiro, A. Wagner, and A. Corradini. Algebraic Approaches to Graph Transformation Part II: Single Pushout Approach and Comparison with Double Pushout Approach. In Rozenberg [19], 1997.
-
(1997)
Algebraic Approaches to Graph Transformation Part II: Single Pushout Approach and Comparison with Double Pushout Approach
-
-
Ehrig, H.1
Heckel, R.2
Korff, M.3
Löwe, M.4
Ribeiro, L.5
Wagner, A.6
Corradini, A.7
-
7
-
-
85011571668
-
Towards a UML based approach to role engineering
-
P. Epstein and R. Sandhu. Towards A UML Based Approach to Role Engineering. In Proc. of ACM RBAC, 1999.
-
(1999)
Proc. of ACM RBAC
-
-
Epstein, P.1
Sandhu, R.2
-
8
-
-
33750280916
-
Ensuring consistency of conditional graph grammars - A constructive approach
-
Electronic Notes of TCS
-
R. Heckel and A. Wagner. Ensuring consistency of conditional graph grammars - a constructive approach. In Proc. SEGRAGRA'95, no. 2. Electronic Notes of TCS, 1995. http://www.elsevier.nl/locate/entcs/volume2.html.
-
(1995)
Proc. SEGRAGRA'95
, Issue.2
-
-
Heckel, R.1
Wagner, A.2
-
9
-
-
79955163100
-
UMLsec: Extending UML for secure systems development
-
in LNCS, Springer
-
J. Jürjens. UMLsec: Extending UML for Secure Systems Development. In Proc. of UML 2002, number 2460 in LNCS, pages 412-425. Springer, 2002.
-
(2002)
Proc. of UML 2002
, vol.2460
, pp. 412-425
-
-
Jürjens, J.1
-
10
-
-
84948988629
-
Conflict Detection and Resolution in Access Control Specifications
-
M.Nielsen and U.Engberg, editors, Lect. Notes in Comp. Sci., Springer
-
M. Koch, L. Mancini, F. Parisi-Presicce. Conflict Detection and Resolution in Access Control Specifications. In M.Nielsen and U.Engberg, editors, Proc. of Found. of Soft. Sci. and Comp. Structures (FoSSaCS 2002), Lect. Notes in Comp. Sci., pages 223-237. Springer, 2002.
-
(2002)
Proc. of Found. of Soft. Sci. and Comp. Structures (FoSSaCS 2002)
, pp. 223-237
-
-
Koch, M.1
Mancini, L.2
Parisi-Presicce, F.3
-
11
-
-
0035790747
-
On the Specification and Evolution of Access Control Policies
-
S. Osborn, editor, ACM, May
-
M. Koch, L. V. Mancini, and F. Parisi-Presicce. On the Specification and Evolution of Access Control Policies. In S. Osborn, editor, Proc. 6th ACM Symp. on Access Control Models and Technologies, pages 121-130. ACM, May 2001.
-
(2001)
Proc. 6th ACM Symp. on Access Control Models and Technologies
, pp. 121-130
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
12
-
-
85008430937
-
A Graph Based Formalism for RBAC
-
August
-
M. Koch, L. V. Mancini, and F. Parisi-Presicce. A Graph Based Formalism for RBAC. ACM Transactions on Information and System Security (TISSEC), 5(3):332-365, August 2002.
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, Issue.3
, pp. 332-365
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
15
-
-
79955143136
-
SecureUML:A UML-Based Modeling Language for Model-Driven
-
LNCS, Springer
-
T. Lodderstedt, D. Basin, and J. Doser. SecureUML:A UML-Based Modeling Language for Model-Driven Security. In Proc. of UML 2002, number 2460 in LNCS, pages 426-441. Springer, 2002
-
(2002)
Proc. of UML 2002
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
20
-
-
0030086382
-
Role-based access control models
-
Feb.
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, Role-based access control models. IEEE Computer, 29(2):38-47, Feb. 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
|