-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
ABADI, M., BURROWS, M., AND LAMPSON, B. 1993. A calculus for access control in distributed systems. ACM TOPLAS 15, 4, 706-734.
-
(1993)
ACM TOPLAS
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
-
5
-
-
3142618544
-
Secure computer systems: Mathematical foundations and model
-
MTR 2547, November
-
BELL, D. AND LAPADULA, L. 1973. Secure computer systems: Mathematical foundations and model. MITRE Report, MTR 2547, v2, November.
-
(1973)
MITRE Report
, vol.2
-
-
Bell, D.1
LaPadula, L.2
-
13
-
-
0016984825
-
Protection in operating systems
-
HARRISON, M. H., RUZZO, W. L., AND ULLMAN, J. D. 1976. Protection in operating systems. CACM 19, 8, 461-471.
-
(1976)
CACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.H.1
Ruzzo, W.L.2
Ullman, J.D.3
-
14
-
-
0033724294
-
Access control meets public key infrastructure, or assigning roles to strangers
-
HERZBERG, A., MASS, Y., MIHAELI, J., NAOR, D., AND RAVID, Y. 2000. Access control meets public key infrastructure, or assigning roles to strangers. Proceedings of IEEE Symposium on Security and Privacy.
-
(2000)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
Naor, D.4
Ravid, Y.5
-
17
-
-
0011795795
-
Provisional authorizations
-
Anup Gosh (Ed.) Kluwer Academic Press, Boston, MA
-
JAJODIA, S., KUDO, M., AND SUBRAHMANIAN, V. S. 2001. Provisional authorizations. In E-Commerce Security and Privacy, Anup Gosh (Ed.) Kluwer Academic Press, Boston, MA.
-
(2001)
E-commerce Security and Privacy
-
-
Jajodia, S.1
Kudo, M.2
Subrahmanian, V.S.3
-
22
-
-
3142654848
-
-
Reprinted
-
LAMPSON, B. W. 1971. Protection. 5th Princeton Symposium on Information Science and Systems. Reprinted in ACM Operating Systems Review 8, 1, 18-24, 1974
-
(1974)
ACM Operating Systems Review
, vol.8
, Issue.1
, pp. 18-24
-
-
-
23
-
-
84861590861
-
Key challenges in DRM: An industry perspective
-
(in conjunction with ACM CCS Conference) November
-
LAMACCHIA, B. 2002. Key challenges in DRM: An industry perspective. Proceedings of the 2nd ACM DRM Workshop (in conjunction with ACM CCS Conference) November.
-
(2002)
Proceedings of the 2nd ACM DRM Workshop
-
-
LaMacchia, B.1
-
31
-
-
0027699087
-
Lattice-based access control models
-
Nov.
-
SANDHU, R. 1993. Lattice-based access control models. IEEE Computer (Nov.), 9-19.
-
(1993)
IEEE Computer
, pp. 9-19
-
-
Sandhu, R.1
-
32
-
-
0033645573
-
Engineering authority and trust in cyberspace: The OM-AM and RBAC way
-
Berlin, Germany, July 26-28
-
SANDHU, R. 2000. Engineering authority and trust in cyberspace: The OM-AM and RBAC way. Proceedings of the 5th ACM Workshop on Role-Based Access Control, Berlin, Germany, July 26-28, 111-119.
-
(2000)
Proceedings of the 5th ACM Workshop on Role-based Access Control
, pp. 111-119
-
-
Sandhu, R.1
-
34
-
-
0030086382
-
Role-based access control models
-
Feb.
-
SANDHU, R., COYNE, E., FEINSTEIN, H., AND YOUMAN, C. 1996. Role-based access control models. IEEE Computer (Feb.), 38-47.
-
(1996)
IEEE Computer
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
36
-
-
0032657326
-
Persistent access control to prevent piracy of digital information
-
July
-
SCHNECK, P. 1999. Persistent access control to prevent piracy of digital information. Proceedings of the IEEE 87, 7 (July).
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
-
-
Schneck, P.1
-
44
-
-
3142652650
-
-
Personal communication
-
ZHANG, X. 2004. Personal communication.
-
(2004)
-
-
Zhang, X.1
|