-
2
-
-
0003400251
-
Secure computer systems: Mathematical foundations
-
March
-
D. Bell and L. LaPadula. Secure Computer Systems: Mathematical Foundations. Technical Report MTR-2547, 1, March 1973.
-
(1973)
Technical Report
, vol.MTR-2547
, pp. 1
-
-
Bell, D.1
LaPadula, L.2
-
3
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Feb
-
E. Bertino, E. Ferrari, and V. Atluri. The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information and Systems Security, 2(1):65-104, Feb 1999.
-
(1999)
ACM Transactions on Information and Systems Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
4
-
-
0031341828
-
Merging heterogenous security orderings
-
P. Bonatti, M. Sapino, and V. Subrahmanian. Merging Heterogenous Security Orderings. Journal of Computer Security, 5(1):3-29, 1997.
-
(1997)
Journal of Computer Security
, vol.5
, Issue.1
, pp. 3-29
-
-
Bonatti, P.1
Sapino, M.2
Subrahmanian, V.3
-
7
-
-
0033884687
-
Providing security and interoperation of heterogeneous systems
-
S. Dawson, S. Qian, and P. Samarati. Providing Security and Interoperation of Heterogeneous Systems. Distributed Parallel Databases, 8(1):119-145, 2000.
-
(2000)
Distributed Parallel Databases
, vol.8
, Issue.1
, pp. 119-145
-
-
Dawson, S.1
Qian, S.2
Samarati, P.3
-
8
-
-
18744384084
-
Special issue on adaptive complex enterprises
-
May
-
A. Desai and N. Awad. Special Issue on Adaptive Complex Enterprises. Communications of ACM, 48(5), May 2005.
-
(2005)
Communications of ACM
, vol.48
, Issue.5
-
-
Desai, A.1
Awad, N.2
-
10
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Aug
-
D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn, and R. Chandramouli. Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and Systems Security, 4(3):224-274, Aug 2001.
-
(2001)
ACM Transactions on Information and Systems Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
11
-
-
0027969913
-
The complexity and composability of secure interoperation
-
IEEE Computer Society
-
L. Gong and X. Qian. The Complexity and Composability of Secure Interoperation. In Proceedings of IEEE Symposium on Security and Privacy, pages 190-200. IEEE Computer Society, 1994.
-
(1994)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 190-200
-
-
Gong, L.1
Qian, X.2
-
14
-
-
0001341422
-
DSR: The dynamic source routing protocol for multihop wireless adhoc networks
-
D. Johnson, D. Maltz, and J. Broch. DSR: The Dynamic Source Routing Protocol for Multihop Wireless Adhoc Networks. Ad hoc networking, pages 139-172, 2001.
-
(2001)
Ad Hoc Networking
, pp. 139-172
-
-
Johnson, D.1
Maltz, D.2
Broch, J.3
-
20
-
-
0342296052
-
Security issues in federated database systems: Panel contributions
-
North-Holland
-
M. Morgenstern, T. Lunt, B. Thuraisingham, and D. Spooner. Security Issues in Federated Database Systems: Panel Contributions. In Results of the IFIP WG 11.3 Workshop on Database Security V, pages 131-148. North-Holland, 1992.
-
(1992)
Results of the IFIP WG 11.3 Workshop on Database Security V
, pp. 131-148
-
-
Morgenstern, M.1
Lunt, T.2
Thuraisingham, B.3
Spooner, D.4
-
21
-
-
18744397572
-
IT-enabled sense-and-respond strategies in complex public organizations
-
May
-
R. Ramnath and D. Landsbergen. IT-Enabled Sense-and-Respond Strategies in Complex Public Organizations. Communications of ACM, 48(5):58-64, May 2005.
-
(2005)
Communications of ACM
, vol.48
, Issue.5
, pp. 58-64
-
-
Ramnath, R.1
Landsbergen, D.2
-
22
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb
-
R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, Feb 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
23
-
-
0030086382
-
Role-based access control models
-
Feb
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-Based Access Control Models. IEEE Computer, 29(2):38-47, Feb 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
24
-
-
0031357551
-
Authorization specification and enforcement in federated database systems
-
S. Vimercati and P. Samarati. Authorization Specification and Enforcement in Federated Database Systems. Journal of Computer Security, 5(2):155-188, 1997.
-
(1997)
Journal of Computer Security
, vol.5
, Issue.2
, pp. 155-188
-
-
Vimercati, S.1
Samarati, P.2
-
25
-
-
0002851150
-
Web implementation of a security mediator for medical databases
-
London, UK, UK, Chapman & Hall, Ltd.
-
G. Wiederhold, M. Bilello, and C. Donahue. Web Implementation of a Security Mediator for Medical Databases. In Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI, pages 60-72, London, UK, UK, 1998. Chapman & Hall, Ltd.
-
(1998)
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI
, pp. 60-72
-
-
Wiederhold, G.1
Bilello, M.2
Donahue, C.3
|