-
2
-
-
33244479658
-
-
Technical report, OASIS, Mar. Document identifier: wd-xacml-wspleval-03
-
A. Anderson. Evaluating XACML as a policy language. Technical report, OASIS, Mar. 2003. Document identifier: wd-xacml-wspleval-03.
-
(2003)
Evaluating XACML As A Policy Language
-
-
Anderson, A.1
-
3
-
-
2442516401
-
Efficient comparison of enterprise privacy policies
-
M. Backes, G. Karjoth, W. Bagga, and M. Schunter. Efficient comparison of enterprise privacy policies. In Symposium on Applied Computing, pages 375-382, 2004.
-
(2004)
Symposium on Applied Computing
, pp. 375-382
-
-
Backes, M.1
Karjoth, G.2
Bagga, W.3
Schunter, M.4
-
4
-
-
0027880685
-
Algebraic decision diagrams and their applications
-
R. Bahar, E. Frohm, C. M. Gaona, G. D. Hachtel, E. Macii, A. Pardo, and F. Somenzi. Algebraic decision diagrams and their applications. In International Conference on Computer-Aided Design, pages 188-191, 1993.
-
(1993)
International Conference on Computer-aided Design
, pp. 188-191
-
-
Bahar, R.1
Frohm, E.2
Gaona, C.M.3
Hachtel, G.D.4
Macii, E.5
Pardo, A.6
Somenzi, F.7
-
5
-
-
0022769976
-
Graph based algorithms for boolean function manipulation
-
R. E. Bryant. Graph based algorithms for boolean function manipulation. IEEE Transactions on Computers, C35(8):677-691, 1986.
-
(1986)
IEEE Transactions on Computers
, vol.C35
, Issue.8
, pp. 677-691
-
-
Bryant, R.E.1
-
6
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
D. D. Clark and D. R. Wilson. A comparison of commercial and military computer security policies. In IEEE Symposium of Security and Privacy, pages 184-194, 1987.
-
(1987)
IEEE Symposium of Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
7
-
-
0037565605
-
Multi-terminal binary decision diagrams: An efficient data structure for matrix representation
-
E. Clarke, M. Fujita, P. McGeer, J. Yang, and X. Zhao. Multi-terminal binary decision diagrams: An efficient data structure for matrix representation. In International Workshop on Logic Synthesis, 1993.
-
(1993)
International Workshop on Logic Synthesis
-
-
Clarke, E.1
Fujita, M.2
McGeer, P.3
Yang, J.4
Zhao, X.5
-
9
-
-
0035994661
-
DrScheme: A programming environment for Scheme
-
R. B. Findler, J. Clements, C. Flanagan, M. Flatt, S. Krishnamurthi, P. Steckler, and M. Felleisen. DrScheme: A programming environment for Scheme. Journal of Functional Programming, 12(2):159-182, 2002.
-
(2002)
Journal of Functional Programming
, vol.12
, Issue.2
, pp. 159-182
-
-
Findler, R.B.1
Clements, J.2
Flanagan, C.3
Flatt, M.4
Krishnamurthi, S.5
Steckler, P.6
Felleisen, M.7
-
10
-
-
24644452174
-
Model-checking access control policies
-
Lecture Notes in Computer Science. Springer-Verlag, Sept.
-
D. P. Guelev, M. D. Ryan, and P.-Y. Schobbens. Model-checking access control policies. In Information Security Conference, Lecture Notes in Computer Science. Springer-Verlag, Sept. 2004.
-
(2004)
Information Security Conference
-
-
Guelev, D.P.1
Ryan, M.D.2
Schobbens, P.-Y.3
-
13
-
-
33244469750
-
Enabling complex UI in Web applications with send/suspend/dispatch
-
P. W. Hopkins. Enabling complex UI in Web applications with send/suspend/dispatch. In Scheme Workshop, 2003.
-
(2003)
Scheme Workshop
-
-
Hopkins, P.W.1
-
17
-
-
0032010255
-
Isomorph-free model enumeration: A new method for checking relational specifications
-
Mar.
-
D. Jackson, S. Jha, and C. A. Damon. Isomorph-free model enumeration: A new method for checking relational specifications. ACM Transactions on Programming Languages and Systems, 20(2):302-343, Mar. 1998.
-
(1998)
ACM Transactions on Programming Languages and Systems
, vol.20
, Issue.2
, pp. 302-343
-
-
Jackson, D.1
Jha, S.2
Damon, C.A.3
-
18
-
-
84968352943
-
Policy management using access control spaces
-
T. Jaeger, X. Zhang, and F. Cacheda. Policy management using access control spaces. ACM Transactions on Information and System Security, 6(3):327-364, 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.3
, pp. 327-364
-
-
Jaeger, T.1
Zhang, X.2
Cacheda, F.3
-
23
-
-
33244491046
-
Tools and techniques for analyzing type enforcement policies in security enhanced Linux
-
Dec.
-
F. Mayer. Tools and techniques for analyzing type enforcement policies in security enhanced Linux. In Annual Computer Security Applications Conference, Dec. 2003.
-
(2003)
Annual Computer Security Applications Conference
-
-
Mayer, F.1
-
29
-
-
0242625217
-
A lightweight approach to specification and analysis of role-based access control extensions
-
A. Schaad and J. D. Moffett. A lightweight approach to specification and analysis of role-based access control extensions. In Symposium on Access Control Models and Technologies, pages 13-22, 2002.
-
(2002)
Symposium on Access Control Models and Technologies
, pp. 13-22
-
-
Schaad, A.1
Moffett, J.D.2
|