-
2
-
-
35048879817
-
An algebra for composing enterprise privacy policies
-
P. Samarati, D. Gollmann, and R. Molva, editors, ESORICS. Springer
-
M. Backes, M. Dürmuth, and R. Steinwandt. An algebra for composing enterprise privacy policies. In P. Samarati, D. Gollmann, and R. Molva, editors, ESORICS, volume 3193 of Lecture Notes in Computer Science, pages 33-52. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3193
, pp. 33-52
-
-
Backes, M.1
Dürmuth, M.2
Steinwandt, R.3
-
3
-
-
0029211469
-
Practical domain and type enforcement for UNIX
-
May
-
L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat. Practical domain and type enforcement for UNIX. In Proceedings of the 1995 IEEE Symposium on Security and Privacy, pages 66-77, May 1995.
-
(1995)
Proceedings of the 1995 IEEE Symposium on Security and Privacy
, pp. 66-77
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
Haghighat, S.A.5
-
5
-
-
3042584122
-
Flexible access control policy specification with constraint logic programming
-
S. Barker and P. J. Stuckey. Flexible access control policy specification with constraint logic programming. ACM Trans. Inf. Syst. Secur., 6(4):501-546, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.4
, pp. 501-546
-
-
Barker, S.1
Stuckey, P.J.2
-
7
-
-
0011537495
-
Real-time programming: General purpose or special-purpose languages
-
G. Ritter, editor. Elsevier Science Publishers B.V. (North Holland)
-
G. Berry. Real-time programming: General purpose or special-purpose languages. In G. Ritter, editor, Information Processing 89, pages 11-17. Elsevier Science Publishers B.V. (North Holland), 1989.
-
(1989)
Information Processing
, vol.89
, pp. 11-17
-
-
Berry, G.1
-
8
-
-
84944792110
-
TRBAC: A temporal role-based access control model
-
E. Bertino, P. A. Bonatti, and E. Ferrari. TRBAC: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur., 4(3):191-233, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
11
-
-
85025424440
-
An algebra for composing access control policies
-
P. Bonatti, S. D. C. di Vimercati, and P. Samarati. An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur., 5(1):1-35, 2002.
-
(2002)
ACM Trans. Inf. Syst. Secur.
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.1
Di Vimercati, S.D.C.2
Samarati, P.3
-
13
-
-
0344443746
-
Reconstructing trust management
-
A. Chander, D. Dean, and J. C. Mitchell. Reconstructing trust management. Journal of Computer Security, 12(1):131-164, 2004.
-
(2004)
Journal of Computer Security
, vol.12
, Issue.1
, pp. 131-164
-
-
Chander, A.1
Dean, D.2
Mitchell, J.C.3
-
14
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, Proposed NIST standard for role-based access control. ACM Trans. Information System Security, 4(3):224-274, 2001.
-
(2001)
ACM Trans. Information System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
15
-
-
0003720571
-
-
The Kluwer international series in Engineering and Computer Science. Kluwer Academic publishers
-
N. Halbwachs. Synchronous programming of reactive systems. The Kluwer international series in Engineering and Computer Science. Kluwer Academic publishers, 1993.
-
(1993)
Synchronous Programming of Reactive Systems
-
-
Halbwachs, N.1
-
18
-
-
0000835369
-
-
chapter On the development of reactive systems. NATO Advanced Study Institute
-
D. Harel and A. Pnueli. Logics and Models of Concurrent Systems, volume 13, chapter On the development of reactive systems, pages 471-498. NATO Advanced Study Institute, 1985.
-
(1985)
Logics and Models of Concurrent Systems
, vol.13
, pp. 471-498
-
-
Harel, D.1
Pnueli, A.2
-
19
-
-
0003999750
-
Constraint processing in cc(fd)
-
Computer Science Department, Brown University
-
P. V. Hentenryck, V. A. Saraawat, and Y. Deville. Constraint processing in cc(fd). Technical report, Computer Science Department, Brown University, 1992.
-
(1992)
Technical Report
-
-
Hentenryck, P.V.1
Saraawat, V.A.2
Deville, Y.3
-
20
-
-
4243532938
-
Constraint logic programming: A survey
-
J. Jaffar and M. J. Maher. Constraint logic programming: A survey. J. Log. Program., 19/20:503-581, 1994.
-
(1994)
J. Log. Program.
, vol.19-20
, pp. 503-581
-
-
Jaffar, J.1
Maher, M.J.2
-
21
-
-
0001619596
-
Flexible support for multiple access control policies
-
S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian. Flexible support for multiple access control policies. ACM Trans. Database Syst., 26(2):214-260, 2001.
-
(2001)
ACM Trans. Database Syst.
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
22
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
N. Li, B. N. Grosof, and J. Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur., 6(1):128-171, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
24
-
-
0036085965
-
Design of a role-based trust-management framework
-
IEEE Computer Society
-
N. Li, J. C. Mitchell, and W. H. Winsborough. Design of a role-based trust-management framework. In SP '02: Proceedings of the 2002, IEEE Symposium on Security and Privacy, page 114. IEEE Computer Society, 2002.
-
(2002)
SP '02: Proceedings of the 2002, IEEE Symposium on Security and Privacy
, pp. 114
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
25
-
-
0038825043
-
Beyond proof-of-compliance: Safety and availability analysis in trust management
-
IEEE Computer Society
-
N. Li, W. H. Winsborough, and J. C. Mitchell. Beyond proof-of-compliance: Safety and availability analysis in trust management. In IEEE Symposium on Security and Privacy, pages 123-139. IEEE Computer Society, 2003.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 123-139
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
27
-
-
0003262137
-
The inevitability of failure: The flawed assumption of security in modern computing environments
-
P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The inevitability of failure: The flawed assumption of security in modern computing environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303-314, 1998.
-
(1998)
Proceedings of the 21st National Information Systems Security Conference
, pp. 303-314
-
-
Loscocco, P.A.1
Smalley, S.D.2
Muckelbauer, P.A.3
Taylor, R.C.4
Turner, S.J.5
Farrell, J.F.6
-
29
-
-
12444291569
-
Temporal concurrent constraint programming: Denotation, logic and applications
-
M. Nielsen, C. Palamidessi, and F. D. Valencia. Temporal concurrent constraint programming: Denotation, logic and applications, Nord. J. Comput., 9(1):145-188, 2002.
-
(2002)
Nord. J. Comput.
, vol.9
, Issue.1
, pp. 145-188
-
-
Nielsen, M.1
Palamidessi, C.2
Valencia, F.D.3
-
32
-
-
0030086382
-
Role-baaed access control models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-baaed access control models. IEEE Computer, 29(2), 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
34
-
-
0030295477
-
Timed default concurrent constraint programming
-
November/December
-
V. A. Saraswat, R. Jagadeesan, and V. Gupta. Timed Default Concurrent Constraint Programming. Journal of Symbolic Computation, 22(5-6):475-520, November/December 1996.
-
(1996)
Journal of Symbolic Computation
, vol.22
, Issue.5-6
, pp. 475-520
-
-
Saraswat, V.A.1
Jagadeesan, R.2
Gupta, V.3
-
35
-
-
0348216531
-
Jcc: Integrating timed default concurrent constraint programming into Java
-
F. Moura-Pires and S. Abreu, editors, EPIA. Springer
-
V. A. Saraswat, R. Jagadeesan, and V. Gupta. jcc: Integrating timed default concurrent constraint programming into Java. In F. Moura-Pires and S. Abreu, editors, EPIA, volume 2902 of Lecture Notes in Computer Science, pages 156-170. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2902
, pp. 156-170
-
-
Saraswat, V.A.1
Jagadeesan, R.2
Gupta, V.3
-
36
-
-
85047788507
-
Semantic foundations of concurrent constraint programming
-
January
-
V. A. Saraswat, M. Rinard, and P. Panangaden. Semantic foundations of concurrent constraint programming. In Proceedings of Eighteenth ACM Symposium on Principles of Programming Languages, Orlando, pages 333-352, January 1991.
-
(1991)
Proceedings of Eighteenth ACM Symposium on Principles of Programming Languages, Orlando
, pp. 333-352
-
-
Saraswat, V.A.1
Rinard, M.2
Panangaden, P.3
-
39
-
-
84961645820
-
Improving the granularity of access control for windows 2000
-
Nov
-
M. M. Swift, P. Brundrett, C. Van Dyke, P. Garg, A. Hopkins, S. Chan, M. Goertzel, and G. Jensenworth. Improving the granularity of access control for windows 2000. ACM Transactions on Information and System Security, 5(4), Nov 2002.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.4
-
-
Swift, M.M.1
Brundrett, P.2
Van Dyke, C.3
Garg, P.4
Hopkins, A.5
Chan, S.6
Goertzel, M.7
Jensenworth, G.8
-
43
-
-
3142523600
-
A prepositional policy algebra for access control
-
D. Wijesekera and S. Jajodia. A prepositional policy algebra for access control. ACM Trans. Inf. Syst. Secur., 6(2):286-325, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.2
, pp. 286-325
-
-
Wijesekera, D.1
Jajodia, S.2
-
44
-
-
4143074723
-
A logical specification for usage control
-
ACM Press
-
X. Zhang, J. Park, F. Parisi-Presicce, and R. Sandhu. A logical specification for usage control. In SACMAT '04: Proceedings of the ninth ACM symposium on Access control models and technologies, pages 1-10. ACM Press, 2004.
-
(2004)
SACMAT '04: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies
, pp. 1-10
-
-
Zhang, X.1
Park, J.2
Parisi-Presicce, F.3
Sandhu, R.4
|