-
1
-
-
0003400251
-
Secure computer systems: Mathematical foundations
-
MITRE Corp., Mar.
-
D. Bell and L. Lapadula, "Secure Computer Systems: Mathematical Foundations," Technical Report MTR-2547, vol. 1, MITRE Corp., Mar. 1973.
-
(1973)
Technical Report
, vol.1 MTR-2547
-
-
Bell, D.1
Lapadula, L.2
-
2
-
-
84928693825
-
Merging heterogeneous security orderings
-
P.A. Bonatti, M.L. Sapino, and VS. Subrahmanian, "Merging Heterogeneous Security Orderings," Proc. European Symp. Research in Computer Security (ESORICS), pp. 183-197, 1996.
-
(1996)
Proc. European Symp. Research in Computer Security (ESORICS)
, pp. 183-197
-
-
Bonatti, P.A.1
Sapino, M.L.2
Subrahmanian, V.S.3
-
3
-
-
85025424440
-
An algebra for composing access control policies
-
Feb.
-
P. Bonatti, S.D.C. Vimercati, and P. Samarati, "An Algebra for Composing Access Control Policies," ACM Trans. Information and System Security, vol. 5, no. 1, Feb. 2002.
-
(2002)
ACM Trans. Information and System Security
, vol.5
, Issue.1
-
-
Bonatti, P.1
Vimercati, S.D.C.2
Samarati, P.3
-
4
-
-
0242456748
-
Models for coalition-based access control
-
June
-
E. Cohen, R.K. Thomas, W. Winsborough, and D. Shands, "Models for Coalition-Based Access Control," Proc. Seventh ACM Symp. Access Control Models and Technologies, June 2002.
-
(2002)
Proc. Seventh ACM Symp. Access Control Models and Technologies
-
-
Cohen, E.1
Thomas, R.K.2
Winsborough, W.3
Shands, D.4
-
5
-
-
0033884687
-
Providing security and interoperation of heterogeneous systems
-
Aug.
-
S. Dawson, S. Qian, and P. Samarati, "Providing Security and Interoperation of Heterogeneous Systems," Distributed and Parallel Databases, vol. 8, pp. 119-145, Aug. 2000.
-
(2000)
Distributed and Parallel Databases
, vol.8
, pp. 119-145
-
-
Dawson, S.1
Qian, S.2
Samarati, P.3
-
6
-
-
0030087497
-
A MAC policy framework for multilevel relational databases
-
Feb.
-
X. Qian and T.F. Lunt, "A MAC Policy Framework for Multilevel Relational Databases," IEEE Trans. Knowledge and Data Eng., vol. 8, no. 1, pp. 3-15, Feb. 1996.
-
(1996)
IEEE Trans. Knowledge and Data Eng.
, vol.8
, Issue.1
, pp. 3-15
-
-
Qian, X.1
Lunt, T.F.2
-
7
-
-
0031611731
-
Formal specification for role based access control user/role and role/role relationship management
-
Oct.
-
S.I. Gavrila and J.F. Barkley, "Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management," Proc. Third ACM Workshop Role-Based Access Control, Oct. 1998.
-
(1998)
Proc. Third ACM Workshop Role-based Access Control
-
-
Gavrila, S.I.1
Barkley, J.F.2
-
8
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
E. Bertino, E. Ferrari, and V. Atluri, "The Specification and Enforcement of Authorization Constraints in Workflow Management Systems," ACM. Trans. Information and System Security, vol. 2, no. 1, pp. 65-104, 1999.
-
(1999)
ACM. Trans. Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
9
-
-
0032691796
-
A logical framework for reasoning on data access control policies
-
E. Bertino, F. Buccafurri, E. Ferrari, and P. Rullo, "A Logical Framework for Reasoning on Data Access Control Policies," Proc. 12th IEEE Computer Security foundations Workshop, pp. 175-189, 1999.
-
(1999)
Proc. 12th IEEE Computer Security Foundations Workshop
, pp. 175-189
-
-
Bertino, E.1
Buccafurri, F.2
Ferrari, E.3
Rullo, P.4
-
10
-
-
0010032891
-
Computational issues in secure inter-operation
-
Jan.
-
L. Gong and X. Qian, "Computational Issues in Secure Inter-operation," IEEE Trans. Software Eng., vol. 22, no. 1, Jan. 1996.
-
(1996)
IEEE Trans. Software Eng.
, vol.22
, Issue.1
-
-
Gong, L.1
Qian, X.2
-
11
-
-
0036565513
-
Product schema integration for electronic commerce-a synonym comparison approach
-
May/ June
-
G. Yan, W.K. Ng, and E. Lim, "Product Schema Integration for Electronic Commerce-A Synonym Comparison Approach," IEEE Trans. Knowledge and Data Eng., vol. 14, no. 3, pp. 583-598, May/ June 2002.
-
(2002)
IEEE Trans. Knowledge and Data Eng.
, vol.14
, Issue.3
, pp. 583-598
-
-
Yan, G.1
Ng, W.K.2
Lim, E.3
-
12
-
-
0033650839
-
Injecting RBAC to secure a web-based workflow system
-
G.J. Ahn, M. Rang, J. Park, and R. Sandhu, "Injecting RBAC to Secure a Web-Based Workflow System," Proc ACM Workshop Role-Based Access Control (RBAC), 2000.
-
(2000)
Proc ACM Workshop Role-based Access Control (RBAC)
-
-
Ahn, G.J.1
Rang, M.2
Park, J.3
Sandhu, R.4
-
13
-
-
0035251598
-
Digital government security infrastructure design challenges
-
Feb.
-
J.B.D. Joshi, A. Ghafoor, W. Aref, and E.H. Spafford, "Digital Government Security Infrastructure Design Challenges," Computer, vol. 34, no. 2, pp. 66-72, Feb. 2001.
-
(2001)
Computer
, vol.34
, Issue.2
, pp. 66-72
-
-
Joshi, J.B.D.1
Ghafoor, A.2
Aref, W.3
Spafford, E.H.4
-
14
-
-
0242625215
-
Temporal hierarchies and inheritance semantics for GTRBAC
-
June
-
J.B.D. Joshi, E. Bertino, and A. Ghafoor, "Temporal Hierarchies and Inheritance Semantics for GTRBAC," Proc. Seventh ACM Symp. Access Control Models and Technologies, pp. 74-83, June 2002.
-
(2002)
Proc. Seventh ACM Symp. Access Control Models and Technologies
, pp. 74-83
-
-
Joshi, J.B.D.1
Bertino, E.2
Ghafoor, A.3
-
15
-
-
17444406680
-
Generalized temporal role based access control model
-
Jan.
-
J.B.D. Joshi, E. Bertino, U. Latif, and A. Ghafoor, "Generalized Temporal Role Based Access Control Model," IEEE Trans. Knowledge and Data Eng., vol. 17, no. 1, pp. 4-23, Jan. 2005.
-
(2005)
IEEE Trans. Knowledge and Data Eng.
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.B.D.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
16
-
-
85008430937
-
A graph-based formalism for RBAC
-
Aug.
-
M. Koch, L.V. Mancini, and F.P. Presicce, "A Graph-Based Formalism for RBAC," ACM Trans. Information and System Security, vol. 5, no. 3, pp. 332-365, Aug. 2002.
-
(2002)
ACM Trans. Information and System Security
, vol.5
, Issue.3
, pp. 332-365
-
-
Koch, M.1
Mancini, L.V.2
Presicce, F.P.3
-
17
-
-
0033333334
-
Conflicts in policy-based distributed systems management
-
Nov.
-
E. Lupu and M. Sloman, "Conflicts in Policy-Based Distributed Systems Management," IEEE Trans. Software Eng., vol 25, no. 6, pp. 852-869, Nov. 1999.
-
(1999)
IEEE Trans. Software Eng.
, vol.25
, Issue.6
, pp. 852-869
-
-
Lupu, E.1
Sloman, M.2
-
18
-
-
0001768982
-
Semantic integration in heterogeneous databases using neural networks
-
W.S. Li and C. Clifton, "Semantic Integration in Heterogeneous Databases Using Neural Networks," Proc. Very Large Data Bases Conf., 1994.
-
(1994)
Proc. Very Large Data Bases Conf.
-
-
Li, W.S.1
Clifton, C.2
-
19
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
Feb.
-
S.L. Osborn, R. Sandhu, and Q. Munawer, "Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies," ACM Trans. Information and System Security, vol. 3, no. 2, pp. 85-106, Feb. 2000.
-
(2000)
ACM Trans. Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.L.1
Sandhu, R.2
Munawer, Q.3
-
22
-
-
0030086382
-
Role based access control models
-
Feb.
-
R. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, "Role Based Access Control Models," Computer, vol. 29, no. 2, Feb. 1996.
-
(1996)
Computer
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
24
-
-
0032120792
-
Bottom-up construction of ontologies
-
July/Aug.
-
V. Vet and N. Mars, "Bottom-Up Construction of Ontologies," IEEE Trans. Knowledge and Data Eng., vol. 10, no. 4, pp. 513-526, July/Aug. 1998.
-
(1998)
IEEE Trans. Knowledge and Data Eng.
, vol.10
, Issue.4
, pp. 513-526
-
-
Vet, V.1
Mars, N.2
-
26
-
-
0023023948
-
A comparative analysis of methodologies for database schema integration
-
C. Batini, M. Lenzrini, and S.B. Navathe, "A Comparative Analysis of Methodologies for Database Schema Integration," ACM Computing Surveys, vol. 18, no. 4, pp. 323-364, 1986.
-
(1986)
ACM Computing Surveys
, vol.18
, Issue.4
, pp. 323-364
-
-
Batini, C.1
Lenzrini, M.2
Navathe, S.B.3
|