-
1
-
-
0030086382
-
Role-based access control models
-
Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Computer 29 (1996) 38-47
-
(1996)
IEEE Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
3
-
-
24644452174
-
Model-checking access control policies
-
the Seventh Information Security Conference (ISC'04). Springer-Verlag
-
Guelev, D.P., Ryan, M.D., Schobbens, P.Y.: Model-checking access control policies. In: the Seventh Information Security Conference (ISC'04). Lecture Notes in Computer Science, Springer-Verlag (2004)
-
(2004)
Lecture Notes in Computer Science
-
-
Guelev, D.P.1
Ryan, M.D.2
Schobbens, P.Y.3
-
4
-
-
20444450640
-
Synthesising verified access control systems in XACML
-
Washington DC, USA, ACM Press
-
Zhang, N., Ryan, M., Guelev, D.P.: Synthesising verified access control systems in XACML. In: the 2004 ACM Workshop on Formal Methods in Security Engineering, Washington DC, USA, ACM Press (2004) 56-65
-
(2004)
2004 ACM Workshop on Formal Methods in Security Engineering
, pp. 56-65
-
-
Zhang, N.1
Ryan, M.2
Guelev, D.P.3
-
9
-
-
33244470893
-
Verification and change-impact analysis of access-control policies
-
St. Louis, Missouri, USA
-
Fisler, K., Krishnamurthi, S., Meyerovich, L.A., Tschantz, M.C.: Verification and change-impact analysis of access-control policies. In: ICSE'05, St. Louis, Missouri, USA (2005)
-
(2005)
ICSE'05
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.A.3
Tschantz, M.C.4
-
10
-
-
0037565605
-
Multi-terminal binary decision diagrams: An efficient data structure for matrix representation
-
Tahoe City
-
Clarke, E., Fujita, M., McGeer, P., Yang, J., Zhao, X.: Multi-terminal binary decision diagrams: An efficient data structure for matrix representation. In: International Workshop on Logic Synthesis, Tahoe City (1993)
-
(1993)
International Workshop on Logic Synthesis
-
-
Clarke, E.1
Fujita, M.2
McGeer, P.3
Yang, J.4
Zhao, X.5
-
11
-
-
0242709308
-
Static verficiation of security requirements in role based CSCW systems
-
Como, Italy
-
Ahmed, T., Tripathi, A.R.: Static verficiation of security requirements in role based CSCW systems. In: SACMAT'03, Como, Italy (2003)
-
(2003)
SACMAT'03
-
-
Ahmed, T.1
Tripathi, A.R.2
-
12
-
-
84905494891
-
Improving computer security using extended static checking
-
Washington, DC, USA, IEEE Computer Society
-
Chess, B.: Improving computer security using extended static checking. In: 2002 IEEE Symposium on Security and Privacy, Washington, DC, USA, IEEE Computer Society (2002)
-
(2002)
2002 IEEE Symposium on Security and Privacy
-
-
Chess, B.1
-
13
-
-
0242625217
-
A lightweight approach to specification and analysis of role-based access control extensions
-
Monterey, California, USA
-
Schaad, A., Moffett, J.: A lightweight approach to specification and analysis of role-based access control extensions. In: SACMAT'02, Monterey, California, USA (2002)
-
(2002)
SACMAT'02
-
-
Schaad, A.1
Moffett, J.2
-
14
-
-
0033698475
-
Alcoa: The Alloy constraint analyzer
-
ACM Press
-
Jackson, D., Schechter, I., Shlyahter, H.: Alcoa: the Alloy constraint analyzer. In: the 22nd international conference on Software engineering, ACM Press (2000) 730-733
-
(2000)
22nd International Conference on Software Engineering
, pp. 730-733
-
-
Jackson, D.1
Schechter, I.2
Shlyahter, H.3
|