-
1
-
-
0033685030
-
A petri net based safety analysis of workflow authorization models
-
V. Atluri and W.-K. Huang. A Petri Net Based Safety Analysis of Workflow Authorization Models. Journal of Computer Security, 8(2), 2000.
-
(2000)
Journal of Computer Security
, vol.8
, Issue.2
-
-
Atluri, V.1
Huang, W.-K.2
-
2
-
-
79952122841
-
Constitution et développement d'une logique de modalités aléthiques, déontiques, dynamiques, et temporelles en vue de la formalisation du raisonnement sur les actions et sur les normes
-
may
-
P. Balbiani. Constitution et développement d'une logique de modalités aléthiques, déontiques, dynamiques, et temporelles en vue de la formalisation du raisonnement sur les actions et sur les normes. In Troisièmes Journées Francophones - Modèles Formels de l'Interaction (MFI-05), may 2005.
-
(2005)
Troisièmes Journées Francophones - Modèles Formels de L'Interaction (MFI-05)
-
-
Balbiani, P.1
-
4
-
-
0041524664
-
A logical framework for reasoning about access control models
-
February
-
E. Bertino, B. Catania, E. Ferrari, and P. Perlasca. A Logical Framework for Reasoning about Access Control Models. ACM Transactions on Information and System Security, 6(1), February 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
5
-
-
0002848811
-
An approach for the specification and enforcement of authorization constraints in workflow management systems
-
February
-
E. Bertino, E. Ferrari, and V. Atluri. An Approach for the Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information Systems Security, 1(1), February 1999.
-
(1999)
ACM Transactions on Information Systems Security
, vol.1
, Issue.1
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
6
-
-
84893077785
-
Obligation monitoring in policy management
-
Monterey CA, June 5-7
-
C. Bettini, S. Jajodia, X. S. Wang, and D. Wijesekera. Obligation Monitoring in Policy Management. In International Workshop, Policies for Distributed Systems and Neworks (Policy 2002), Monterey CA, June 5-7 2002.
-
(2002)
International Workshop, Policies for Distributed Systems and Neworks (Policy 2002)
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
10
-
-
28144443537
-
High level conflict management strategies in advanced access control models
-
Submitted to
-
F. Cuppens and N. Cuppens-Boulahia. High level conflict management strategies in advanced access control models. 2005. Submitted to CSFW'05.
-
(2005)
CSFW'05
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
-
12
-
-
28144464967
-
-
Chapter 6: Completeness
-
K. Fine. Advanced Logic. Chapter 6: Completeness, http://www.nyu.edu/ gsas/dept/philo/courses/advlogic/, 2001.
-
(2001)
Advanced Logic
-
-
Fine, K.1
-
13
-
-
0016984825
-
Protection in operating systems
-
August
-
M. A. Harrison, W. L. Ruzzo, and J. D. Ullman. Protection in Operating Systems. Communication of the ACM, 19(8):461-471, August 1976.
-
(1976)
Communication of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
14
-
-
0030677524
-
A Logical language for expressing authorizations
-
Oakland, CA, May
-
S. Jajodia, S. Samarati, and V. S. Subrahmanian. A logical Language for Expressing Authorizations. In IEEE Symposium on Security and Privacy, Oakland, CA, May 1997.
-
(1997)
IEEE Symposium on Security and Privacy
-
-
Jajodia, S.1
Samarati, S.2
Subrahmanian, V.S.3
-
15
-
-
77952407814
-
Organization based access control
-
Lake Come, Italy, June
-
A. A. E. Kalam, R. E. Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miège, C. Saurel, and G. Trouessin. Organization Based Access Control. In Proceedings of IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Come, Italy, June 2003.
-
(2003)
Proceedings of IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY 2003)
-
-
Kalam, A.A.E.1
Baida, R.E.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miège, A.7
Saurel, C.8
Trouessin, G.9
-
16
-
-
33750942609
-
Timed and hybrid systems in Uppaal2k
-
June
-
K. Larsen and P. Pettersson. Timed and Hybrid Systems in Uppaal2k. In MOVEP'2k, June 2000.
-
(2000)
MOVEP'2k
-
-
Larsen, K.1
Pettersson, P.2
-
17
-
-
84972542053
-
A different approach to deontic logic: Deontic logic viewed as a variant of dynamic logic
-
J.-J. Meyer. A different approach to deontic logic: deontic logic viewed as a variant of dynamic logic. Notre Dame Journal of Formal Logic, 29(1): 109-136, 1988.
-
(1988)
Notre Dame Journal of Formal Logic
, vol.29
, Issue.1
, pp. 109-136
-
-
Meyer, J.-J.1
-
19
-
-
84861016881
-
Contrary-to-duty imperatives, defeasibility and violability
-
A. J. I. Jones and M. Sergot, editors. Oslo, Norway
-
H. Prakken and M. Sergot. Contrary-to-Duty Imperatives, Defeasibility and Violability. In A. J. I. Jones and M. Sergot, editors. Second International Workshop on Deontic Logic in Computer Science, Oslo, Norway, 1994.
-
(1994)
Second International Workshop on Deontic Logic in Computer Science
-
-
Prakken, H.1
Sergot, M.2
-
20
-
-
0030086382
-
Role-based access control models
-
R. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
21
-
-
0002841051
-
Task-based Authorization Controls (TBAC): A family of models for active and enterprise-oriented authorization management
-
Lake Tahoe. California, USA
-
R. Thomas and R. Sandhu. Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management. In 11 th IFIP Working Conference on Database Security, Lake Tahoe. California, USA, 1997.
-
(1997)
11 Th IFIP Working Conference on Database Security
-
-
Thomas, R.1
Sandhu, R.2
-
22
-
-
0025441368
-
A specification and verification method for preventing denial of service
-
June
-
C. Yu and V. Gligor. A specification and verification method for preventing denial of service. IEEE Transactions on Software Engineering, 16(6):581-592, June 1990.
-
(1990)
IEEE Transactions on Software Engineering
, vol.16
, Issue.6
, pp. 581-592
-
-
Yu, C.1
Gligor, V.2
|