-
1
-
-
84964853055
-
Access control: Polcies, models and mechanisms
-
Foundations of Security Analysis and Design, R. Focardi and R. Gorrieri, Editors
-
Samarati, P. and S. Vimercati, Access Control: Polcies, Models and Mechanisms, in Foundations of Security Analysis and Design, R. Focardi and R. Gorrieri, Editors. 2001, Springer Lecture Notes 2171. p. 137-196.
-
(2001)
Springer Lecture Notes
, vol.2171
, pp. 137-196
-
-
Samarati, P.1
Vimercati, S.2
-
2
-
-
0016984825
-
Protection in operating systems
-
Harrison, M., W. Ruzzo, and J. Ullman, Protection in Operating Systems. Communications of the ACM, 1976. 19(8): p. 461-471.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.1
Ruzzo, W.2
Ullman, J.3
-
7
-
-
83755177144
-
XacT: A bridge between resource management and access control in multi-layered applications
-
St. Louis, MO, USA
-
Rits, A., B. deBoe, and A. Schaad, XacT: A bridge between resource management and access control in multi-layered applications. in Software Engineering for Secure Systems -Building Trustworthy Applications (SESS'05). 2005. St. Louis, MO, USA.
-
(2005)
Software Engineering for Secure Systems - Building Trustworthy Applications (SESS'05)
-
-
Rits, A.1
Deboe, B.2
Schaad, A.3
-
8
-
-
85085846560
-
Articulating and enforcing authorisation policies with UML and OCL
-
St. Louis, MO, USA
-
Sohr, K., L. Migge, and G. Ahn. Articulating and enforcing authorisation policies with UML and OCL. in Software Engineering for Secure Systems - Building Trustworthy Applications (SESS'05). 2005. St. Louis, MO, USA.
-
(2005)
Software Engineering for Secure Systems - Building Trustworthy Applications (SESS'05)
-
-
Sohr, K.1
Migge, L.2
Ahn, G.3
-
10
-
-
84956993736
-
Role-based authorization constraints specification
-
Ahn, G. and R. Sandhu, Role-based authorization constraints specification. Information and System Security Journal, 2000, 3(4): p. 207-226.
-
(2000)
Information and System Security Journal
, vol.3
, Issue.4
, pp. 207-226
-
-
Ahn, G.1
Sandhu, R.2
-
11
-
-
84894114949
-
An extended analysis of delegating obligations
-
Schaad, A. An Extended Analysis of Delegating Obligations. in IFIP DBSec 2004.
-
IFIP DBSec 2004
-
-
Schaad, A.1
-
12
-
-
33748032125
-
Revocation of obligation and authorisation policy objects
-
Schaad, A. Revocation of Obligation and Authorisation Policy Objects. in IFIP DBSec 2005. 2005.
-
(2005)
IFIP DBSec 2005
-
-
Schaad, A.1
-
13
-
-
4243121778
-
Facilitating cross-organisational workflows with a workflow view approach
-
Schulz, K. and M. Orlowska, Facilitating cross-organisational workflows with a workflow view approach. Data Knowl. Eng., 2004. 51(1): p. 109-147.
-
(2004)
Data Knowl. Eng.
, vol.51
, Issue.1
, pp. 109-147
-
-
Schulz, K.1
Orlowska, M.2
-
14
-
-
84855343094
-
Delegation of tasks in workflow management systems
-
Ecole Polytechnique Fédérale de Lausanne (EPFL) Lausanne, Switzerland
-
Frossard, A., Delegation of Tasks in Workflow Management Systems, in School of Computer and Communication Sciences (IC). 2005, Ecole Polytechnique Fédérale de Lausanne (EPFL) Lausanne, Switzerland.
-
(2005)
School of Computer and Communication Sciences (IC)
-
-
Frossard, A.1
-
15
-
-
0030086382
-
Role-based access control models
-
Sandhu, R., et al., Role-based access control models. IEEE Computer, 1996, 29(2): p. 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
-
16
-
-
0009233508
-
The ponder policy specification language, in policies for distributed systems and networks
-
Bristol
-
Damianou, N., et al. The Ponder Policy Specification Language, in Policies for Distributed Systems and Networks. 2001. Bristol: Springer Lecture Notes in Computer Science.
-
(2001)
Springer Lecture Notes in Computer Science
-
-
Damianou, N.1
-
19
-
-
0034810791
-
Separation of duties for access control enforcement in workflow environments
-
Botha, Separation of duties for access control enforcement in workflow environments. IBM SYSTEMS JOURNAL, 2001. 40(3).
-
(2001)
IBM Systems Journal
, vol.40
, Issue.3
-
-
Botha1
-
20
-
-
0016555241
-
The protection of information in computer systems
-
Saltzer, J, and M. Schroeder. The protection of Information in Computer Systems. in IEEE. 1975.
-
(1975)
IEEE
-
-
Saltzer, J.1
Schroeder, M.2
-
21
-
-
0023266943
-
a Comparison of commercial and military security policies
-
Oakland, California
-
Clark, D. and D. Wilson. A Comparison of Commercial and Military Security Policies. in IEEE Symposium on Security and Privacy. 1987. Oakland, California.
-
(1987)
IEEE Symposium on Security and Privacy
-
-
Clark, D.1
Wilson, D.2
-
22
-
-
0024125647
-
Transaction control expressions for separation of duties
-
Arizona
-
Sandhu, R. Transaction Control Expressions for Separation of Duties. in 4th Aerospace Computer Security Conference. 1988. Arizona.
-
(1988)
4th Aerospace Computer Security Conference
-
-
Sandhu, R.1
-
23
-
-
0003342146
-
Separation of duties in computerized information systems
-
Halifax, UK
-
Sandhu, R. Separation of Duties in Computerized Information Systems. in IFIP WG11.3 Workshop on Database Security. 1990. Halifax, UK.
-
(1990)
IFIP WG11.3 Workshop on Database Security
-
-
Sandhu, R.1
-
25
-
-
0025028340
-
Naming and grouping privileges to simplify security management in large databases
-
Oakland
-
Baldwin, R. Naming and Grouping Privileges to Simplify Security Management in Large Databases. in IEEE Symposium on Security and Privacy. 1990. Oakland.
-
(1990)
IEEE Symposium on Security and Privacy
-
-
Baldwin, R.1
-
28
-
-
0031346670
-
Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems
-
Kuhn, R. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. in Proceedings of the second ACM workshop on Role-based access control. 1997.
-
(1997)
Proceedings of the Second ACM Workshop on Role-based Access Control
-
-
Kuhn, R.1
-
31
-
-
33748074855
-
Delegation of authority using domain based access rules
-
Imperial College, University of London
-
Moffett, J.D., Delegation of Authority Using Domain Based Access Rules, in Dept of Computing. 1990, Imperial College, University of London.
-
(1990)
Dept of Computing
-
-
Moffett, J.D.1
-
32
-
-
0035790650
-
A rule-based framework for role-based delegation
-
Chantilly, VA, USA
-
Zhang, L., G. Ahn, and C. B. A Rule-based Framework for Role-Based Delegation. in 6th ACM Symposium on Access Control Models and Technologies. 2001. Chantilly, VA, USA.
-
(2001)
6th ACM Symposium on Access Control Models and Technologies
-
-
Zhang, L.1
Ahn, G.2
B., C.3
-
34
-
-
33748085080
-
Separation, review and supervision controls in the context of a credit application process: A case study of organisational control principles
-
Schaad, A. and J. Moffett. Separation, review and supervision controls in the context of a credit application process: a case study of organisational control principles. in ACM SAC 2004.
-
ACM SAC 2004
-
-
Schaad, A.1
Moffett, J.2
-
36
-
-
84982075601
-
Towards usable and relevant model checking techniques for the analysis of dependable interactive systems
-
Loer, K. and M. Harrison. Towards Usable and Relevant Model Checking Techniques for the Analysis of Dependable Interactive Systems. in ASE. 2002.
-
(2002)
ASE
-
-
Loer, K.1
Harrison, M.2
-
38
-
-
33748066027
-
NuSMV2: An open source tool for symbolic model checking
-
Cimatti, A., et al. NuSMV2: an Open Source Tool for Symbolic Model Checking in QA075 Electronic computers. Computer Science http://eprints.biblio. unitn.it/archive/00000085. 2002.
-
(2002)
QA075 Electronic Computers. Computer Science
-
-
Cimatti, A.1
-
40
-
-
0002470263
-
Symbolic model checking without BDDs
-
Biere, A., A. Cimatti, and Y. Zhu, eds. Springer LNCS
-
Biere, A., A. Cimatti, and Y. Zhu, eds. Symbolic model checking without BDDs. Tools and Algorithms for the construction and analysis of systems Vol. 1579. 1999, Springer LNCS.
-
(1999)
Tools and Algorithms for the Construction and Analysis of Systems
, vol.1579
-
-
-
41
-
-
84944044323
-
A temporal-logic extension of role-based access control covering dynamic separation of duties
-
Cairns, Queensland, Australia
-
Mossakowski, T., M. Drouineaud, and K. Sohr. A temporal-logic extension of role-based access control covering dynamic separation of duties. in TIME-ICTL. 2003. Cairns, Queensland, Australia.
-
(2003)
TIME-ICTL
-
-
Mossakowski, T.1
Drouineaud, M.2
Sohr, K.3
-
43
-
-
33845388513
-
Evaluating access control policies through model checking
-
Zhang, N., M. Ryan, and D. Guelev. Evaluating Access Control Policies Through Model Checking. in ISC. 2005.
-
(2005)
ISC
-
-
Zhang, N.1
Ryan, M.2
Guelev, D.3
|