-
1
-
-
0003400251
-
Secure computer systems: Mathematical foundations model
-
Mitre Corporation
-
Bell, D., LaPadula, L.: Secure computer systems: Mathematical foundations model. Technical report, Mitre Corporation (1975)
-
(1975)
Technical Report
-
-
Bell, D.1
LaPadula, L.2
-
2
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Mitre Corporation
-
Biba, K.: Integrity considerations for secure computer systems. Technical report, Mitre Corporation (1977)
-
(1977)
Technical Report
-
-
Biba, K.1
-
4
-
-
0242528829
-
A user-role based data security approach
-
Landwehr, C., ed.
-
Ting, T.C.: A user-role based data security approach. In Landwehr, C., ed.: Database Security: Status and Prospects. (1988)
-
(1988)
Database Security: Status and Prospects
-
-
Ting, T.C.1
-
5
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29 (1996) 38-47
-
(1996)
IEEE Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
6
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4 (2001) 224-274
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
7
-
-
26444587977
-
RBAC/MAC security for UML
-
Farkas, C., Samarati, P., eds.
-
Doan, T., Demurjian, S., Ting, T., Phillips, C.: RBAC/MAC security for UML. In Farkas, C., Samarati, P., eds.: Research Directions in Data and Applications Security XVIII. (2004)
-
(2004)
Research Directions in Data and Applications Security XVIII
-
-
Doan, T.1
Demurjian, S.2
Ting, T.3
Phillips, C.4
-
8
-
-
20444505719
-
MAC and UML for secure software design
-
Washington D.C.
-
Doan, T., Demurjian, S., Ting, T., Ketterl, A.: MAC and UML for secure software design. In: Proc. of 2nd ACM Wksp. on Formal Methods in Security Engineering, Washington D.C. (2004)
-
(2004)
Proc. of 2nd ACM Wksp. on Formal Methods in Security Engineering
-
-
Doan, T.1
Demurjian, S.2
Ting, T.3
Ketterl, A.4
-
9
-
-
26444562216
-
UML design with security integration as a first class citizen
-
Cairo
-
Doan, T., Demurjian, S., Ammar, R., Ting, T.: UML design with security integration as a first class citizen. In: Proc. of 3rd Intl. Conf. on Computer Science, Software Engineering, Information Technology, e-Business, and Applications (CSITeA'04), Cairo (2004)
-
(2004)
Proc. of 3rd Intl. Conf. on Computer Science, Software Engineering, Information Technology, E-Business, and Applications (CSITeA'04)
-
-
Doan, T.1
Demurjian, S.2
Ammar, R.3
Ting, T.4
-
10
-
-
33646177631
-
Role slices: A notation for rbac permission assignment and enforcement
-
Pavlich-Mariscal, J.A., Doan, T., Michel, L., Demurjian, S.A., Ting, T.C.: Role slices: A notation for rbac permission assignment and enforcement. In: Proceedings of 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security. (2005)
-
(2005)
Proceedings of 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security
-
-
Pavlich-Mariscal, J.A.1
Doan, T.2
Michel, L.3
Demurjian, S.A.4
Ting, T.C.5
-
12
-
-
0003931061
-
A structural approach to operational semantics
-
CS Department, University of Aarhus
-
Plotkin, G.: A Structural Approach to Operational Semantics. Technical Report DAIMI FN-19, CS Department, University of Aarhus (1981)
-
(1981)
Technical Report
, vol.DAIMI FN-19
-
-
Plotkin, G.1
-
15
-
-
0031361985
-
Towards a definitive paradigm for security in object-oriented systems and applications
-
Demurjian, S.A., Ting, T.C.: Towards a definitive paradigm for security in object-oriented systems and applications. Journal of Computer Security 5 (1997)
-
(1997)
Journal of Computer Security
, vol.5
-
-
Demurjian, S.A.1
Ting, T.C.2
-
16
-
-
34247203638
-
Security assurance for an rbac/mac security model
-
West Point, NY
-
Phillips, C., Demurjian, S., Ting, T.: Security assurance for an rbac/mac security model. In: Proc. of 2003 IEEE Info. Assurance Workshop, West Point, NY (2003)
-
(2003)
Proc. of 2003 IEEE Info. Assurance Workshop
-
-
Phillips, C.1
Demurjian, S.2
Ting, T.3
-
17
-
-
84902439737
-
Safety and liveness for an rbac/mac security model
-
di Vimercati, S., Ray, I., eds.
-
Phillips, C., Demurjian, S., Ting, T.C.: Safety and liveness for an rbac/mac security model. In di Vimercati, S., Ray, I., eds.: Database and Applications Security XVII: Status and Prospects. (2004)
-
(2004)
Database and Applications Security XVII: Status and Prospects
-
-
Phillips, C.1
Demurjian, S.2
Ting, T.C.3
-
18
-
-
18144400761
-
-
AspectJ-Team: The aspectj programming guide, http://dev.eclipse.org/ viewcvs/indextech.cgi/checkout/aspectj-home/doc/progguide/index.html (2003)
-
(2003)
The Aspectj Programming Guide
-
-
-
19
-
-
30644467106
-
Verifiable composition of access control features and applications
-
Song, E., Reddy, R., France, R., Ray, I., Georg, G., Alexander, R.: Verifiable composition of access control features and applications. In: Proceedings of 10th ACM Symposium on Access Control Models and Technologies (SACMAT 2005). (2005)
-
(2005)
Proceedings of 10th ACM Symposium on Access Control Models and Technologies (SACMAT 2005)
-
-
Song, E.1
Reddy, R.2
France, R.3
Ray, I.4
Georg, G.5
Alexander, R.6
-
20
-
-
14944384797
-
Security through aspect-oriented programming
-
Kluwer, B.V.
-
Win, B.D., Vanhaute, B., Decker, B.D.: Security through aspect-oriented programming. In: Proceedings of the IFIP TC11 WG11.4 First Annual Working Conference on Network Security, Kluwer, B.V. (2001) 125-138
-
(2001)
Proceedings of the IFIP TC11 WG11.4 First Annual Working Conference on Network Security
, pp. 125-138
-
-
Win, B.D.1
Vanhaute, B.2
Decker, B.D.3
-
21
-
-
33646197909
-
A semantics for advice and dynamic join points in aspect-oriented programming
-
Leavens, G.T., Cytron, R., eds.
-
Wand, M., Kiczales, G., Dutchyn, C.: A semantics for advice and dynamic join points in aspect-oriented programming. In Leavens, G.T., Cytron, R., eds.: FOAL 2002 Proceedings. (2002)
-
(2002)
FOAL 2002 Proceedings
-
-
Wand, M.1
Kiczales, G.2
Dutchyn, C.3
|