-
1
-
-
0029697680
-
A security policy model for clinical information systems
-
Washington, DC, USA, IEEE Computer Society
-
R. J. Anderson. A security policy model for clinical information systems. In SP '96: Proceedings of the 1996 IEEE Symposium on Security and Privacy, page 30, Washington, DC, USA, 1996. IEEE Computer Society.
-
(1996)
SP '96: Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 30
-
-
Anderson, R.J.1
-
2
-
-
0242625201
-
Model driven security for process-oriented systems
-
New York, NY, USA, ACM Press
-
D. Basin, J. Doser, and T. Lodderstedt. Model driven security for process-oriented systems. In SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies, pages 100-109, New York, NY, USA, 2003. ACM Press.
-
(2003)
SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies
, pp. 100-109
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
4
-
-
33846324931
-
-
K. Beznosov. Access Control Mechanisms in Commercial Middleware, June 2002. tutorial at SACMAT'02.
-
K. Beznosov. Access Control Mechanisms in Commercial Middleware, June 2002. tutorial at SACMAT'02.
-
-
-
-
5
-
-
84867290446
-
Object Security Attributes: Enabling Application-Specific Access Control in Middleware
-
London, UK, October, Springer-Verlag
-
K. Beznosov. Object Security Attributes: Enabling Application-Specific Access Control in Middleware. In DOA'02: 4th International Symposium on Distributed Objects & Applications, pages 693-710, London, UK, October 2002. Springer-Verlag.
-
(2002)
DOA'02: 4th International Symposium on Distributed Objects & Applications
, pp. 693-710
-
-
Beznosov, K.1
-
6
-
-
85053861123
-
A Resource Access Decision Service for CORBA-based Distributed Systems
-
K. Beznosov, Y. Deng, B. Blakley, C. Burt, and J. Barkley. A Resource Access Decision Service for CORBA-based Distributed Systems. In ACSAC '99: 15th Annual Computer Security Applications Conference, pages 310-319, 1999.
-
(1999)
ACSAC '99: 15th Annual Computer Security Applications Conference
, pp. 310-319
-
-
Beznosov, K.1
Deng, Y.2
Blakley, B.3
Burt, C.4
Barkley, J.5
-
7
-
-
0004345194
-
-
Addison-Wesley Longman Publishing Co, Inc, Boston, MA, USA
-
S. Bodoff, D. Green, K. Haase, E. Jendrock, M. Pawlan, and B. Stearns. The J2EE tutorial. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2002.
-
(2002)
The J2EE tutorial
-
-
Bodoff, S.1
Green, D.2
Haase, K.3
Jendrock, E.4
Pawlan, M.5
Stearns, B.6
-
8
-
-
0036427304
-
Manageable access control for CORBA
-
G. Brose. Manageable access control for CORBA. Journal of Computer Security, 10(4):301-337, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.4
, pp. 301-337
-
-
Brose, G.1
-
10
-
-
84944048132
-
The Ponder Policy Specification Language
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder Policy Specification Language. LNCS, 1995:18-28, 2001.
-
(2001)
LNCS
, vol.1995
, pp. 18-28
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
11
-
-
33646094363
-
Developing secure applications through aspect-oriented programming
-
R. E. Filman, T. Elrad, S. Clarke, and M. Akşit, editors, Addison-Wesley, Boston
-
B. De Win, W. Joosen, and F. Piessens. Developing secure applications through aspect-oriented programming. In R. E. Filman, T. Elrad, S. Clarke, and M. Akşit, editors, Aspect-Oriented Software Development, pages 633-650. Addison-Wesley, Boston, 2005.
-
(2005)
Aspect-Oriented Software Development
, pp. 633-650
-
-
De Win, B.1
Joosen, W.2
Piessens, F.3
-
12
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur., 4(3):224-274, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
14
-
-
0006534194
-
Information technology - open systems interconnection - security framework for open systems: Access control framework
-
ISO, ISO/IEC 10181-3 ITU-T X.812
-
ISO. Information technology - open systems interconnection - security framework for open systems: access control framework. ISO/IEC 10181-3 (ITU-T X.812).
-
-
-
-
15
-
-
0001619596
-
Flexible support for multiple access control policies
-
S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian. Flexible support for multiple access control policies. ACM Trans. Database Syst., 26(2):214-260, 2001.
-
(2001)
ACM Trans. Database Syst
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
16
-
-
2942624556
-
Access control with IBM Tivoli access manager
-
G. Karjoth. Access control with IBM Tivoli access manager. ACM Trans. Inf. Syst. Secur., 6(2):232-257, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.2
, pp. 232-257
-
-
Karjoth, G.1
-
17
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: theory and practice. ACM Trans. Comput. Syst., 10(4):265-310, 1992.
-
(1992)
ACM Trans. Comput. Syst
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
18
-
-
33846329271
-
-
U. Z. Leuven. Leuvense Internet Samenwerking Artsen (LISA). www.uzleuven.be/UZroot/content/Zorgverleners/login/lisa/ (dutch).
-
U. Z. Leuven. Leuvense Internet Samenwerking Artsen (LISA). www.uzleuven.be/UZroot/content/Zorgverleners/login/lisa/ (dutch).
-
-
-
-
19
-
-
33846327059
-
-
S. Middleton, J. Barnett, and D. Reeves. What is an integrated care pathway? What is ...? series, 3(3), 2003. http://www.evidence- basedmedicine.co.uk/What.is.series.html.
-
S. Middleton, J. Barnett, and D. Reeves. What is an integrated care pathway? What is ...? series, 3(3), 2003. http://www.evidence- basedmedicine.co.uk/What.is.series.html.
-
-
-
-
21
-
-
17644389388
-
-
Object Management Group
-
Object Management Group. OMG Model Driven Architecture. http://www.omg.org/mda/.
-
OMG Model Driven Architecture
-
-
-
22
-
-
0002552930
-
Using multidimensional separation of concerns to (re) shape evolving software
-
H. Ossher and P. Tarr. Using multidimensional separation of concerns to (re) shape evolving software. Commun. ACM, 44(10):43-50, 2001.
-
(2001)
Commun. ACM
, vol.44
, Issue.10
, pp. 43-50
-
-
Ossher, H.1
Tarr, P.2
-
23
-
-
84934291563
-
-
R. Pawlak, L. Seinturier, L. Duchien, and G. Florin. JAC: A Flexible Framework for AOP in Java. In Reflection'01, 2192 of Lecture Notes in Computer Science, pages 1-24. Springer-Verlag, September 2001.
-
R. Pawlak, L. Seinturier, L. Duchien, and G. Florin. JAC: A Flexible Framework for AOP in Java. In Reflection'01, volume 2192 of Lecture Notes in Computer Science, pages 1-24. Springer-Verlag, September 2001.
-
-
-
-
24
-
-
33846281045
-
-
Secretary of the Department of Health and Human Services, Rule, August
-
Secretary of the Department of Health and Human Services. Final Privacy Rule, August 2002.
-
(2002)
Final Privacy
-
-
-
25
-
-
33846283245
-
-
Secretary of the Department of Health and Human Services, Rule, February
-
Secretary of the Department of Health and Human Services. Final Security Rule, February 2002.
-
(2002)
Final Security
-
-
-
26
-
-
30644467106
-
Verifiable composition of access control and application features
-
New York, NY, USA, ACM Press
-
E. Song, R. Reddy, R. France, I. Ray, G. Georg, and R. Alexander. Verifiable composition of access control and application features. In SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies, pages 120-129, New York, NY, USA, 2005. ACM Press.
-
(2005)
SACMAT '05: Proceedings of the tenth ACM symposium on Access control models and technologies
, pp. 120-129
-
-
Song, E.1
Reddy, R.2
France, R.3
Ray, I.4
Georg, G.5
Alexander, R.6
-
27
-
-
33846282177
-
-
Sun Microsystems. Java Authorization Contract for Containers, final release, November 2003. JSR-115.
-
Sun Microsystems. Java Authorization Contract for Containers, final release, November 2003. JSR-115.
-
-
-
|