-
2
-
-
0034294212
-
Relational transducers for electronic commerce
-
S. Abiteboul, V. Vianu, B. S. Fordham, and Y. Yesha. Relational transducers for electronic commerce. Journal of Computer and System Sciences, 61(2):236-269, 2000.
-
(2000)
Journal of Computer and System Sciences
, vol.61
, Issue.2
, pp. 236-269
-
-
Abiteboul, S.1
Vianu, V.2
Fordham, B.S.3
Yesha, Y.4
-
4
-
-
2442516401
-
Efficient comparison of enterprise privacy policies
-
M. Backes, G. Karjoth, W. Bagga, and M. Schunter. Efficient comparison of enterprise privacy policies. In Symposium on Applied Computing, pages 375-382, 2004.
-
(2004)
Symposium on Applied Computing
, pp. 375-382
-
-
Backes, M.1
Karjoth, G.2
Bagga, W.3
Schunter, M.4
-
6
-
-
0003400251
-
Secure computer systems: Mathematical foundations and model
-
The Mitre Corporation
-
D. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, The Mitre Corporation, 1976.
-
(1976)
Technical Report
, vol.M74-244
-
-
Bell, D.1
LaPadula, L.J.2
-
7
-
-
84944792110
-
TRBAC: A temporal role-based access control model
-
E. Bertino, P. A. Bonatti, and E. Ferrari. TRBAC: A temporal role-based access control model. ACM Transactions on Information and Systems Security, 4(3):191-233, 2001.
-
(2001)
ACM Transactions on Information and Systems Security
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
9
-
-
85025424440
-
An algebra for composing access control policies
-
P. Bonatti, S. D. C. di Vimercati, and P. Samarati. An algebra for composing access control policies. ACM Transactions on Information and Systems Security, 5(1): 1-35, 2002.
-
(2002)
ACM Transactions on Information and Systems Security
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.1
Di Vimercati, S.D.C.2
Samarati, P.3
-
10
-
-
0001377462
-
Functional and inclusion dependencies: A graph theoretic approach
-
P. Kanellakis and F. Preparata, editors, volume 3: Theory of Databases. JAI Press
-
S. Cosmadakis and P. Kanellakis. Functional and inclusion dependencies: A graph theoretic approach. In P. Kanellakis and F. Preparata, editors, Advances in Computing Research, volume 3: Theory of Databases, pages 163-185. JAI Press, 1986.
-
(1986)
Advances in Computing Research
, pp. 163-185
-
-
Cosmadakis, S.1
Kanellakis, P.2
-
11
-
-
85050550846
-
Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
-
P. Cousot and R. Cousot. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In ACM Symposium on Principles of Programming Languages, pages 238-252, 1977.
-
(1977)
ACM Symposium on Principles of Programming Languages
, pp. 238-252
-
-
Cousot, P.1
Cousot, R.2
-
14
-
-
33244470893
-
Verification and change-impact analysis of access-control policies
-
May
-
K. Fisler, S. Krishnamurthi, L. A. Meyerovich, and M. C. Tschantz. Verification and change-impact analysis of access-control policies. In International Conference on Software Engineering, pages 196-205, May 2005.
-
(2005)
International Conference on Software Engineering
, pp. 196-205
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.A.3
Tschantz, M.C.4
-
15
-
-
33244466281
-
DynAlloy: Upgrading Alloy with actions
-
ACM Press
-
M. F. Frias, J. P. Galeotti, C. G. L. Pombo, and N. M. Aguirre. DynAlloy: upgrading Alloy with actions. In International Conference on Software Engineering, pages 442-451. ACM Press, 2005.
-
(2005)
International Conference on Software Engineering
, pp. 442-451
-
-
Frias, M.F.1
Galeotti, J.P.2
Pombo, C.G.L.3
Aguirre, N.M.4
-
16
-
-
0038540757
-
The complexity of acyclic conjunctive queries
-
G. Gottlob, N. Leone, and F. Scarcello. The complexity of acyclic conjunctive queries. J. ACM, 48(3):431-498, 2001.
-
(2001)
J. ACM
, vol.48
, Issue.3
, pp. 431-498
-
-
Gottlob, G.1
Leone, N.2
Scarcello, F.3
-
17
-
-
24644452174
-
Model-checking access control policies
-
number 3225 in Lecture Notes in Computer Science. Springer-Verlag
-
D. P. Guelev, M. D. Ryan, and P.-Y. Schobbens. Model-checking access control policies. In Information Security Conference, number 3225 in Lecture Notes in Computer Science. Springer-Verlag, 2004.
-
(2004)
Information Security Conference
-
-
Guelev, D.P.1
Ryan, M.D.2
Schobbens, P.-Y.3
-
18
-
-
0016984825
-
Protection in operating systems
-
Aug.
-
M. A. Harrison, W. L. Ruzzo, and J. D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461-471, Aug. 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
21
-
-
33244455252
-
Automated verification of access control policies
-
University of California, Santa Barbara
-
G. Hughes and T. Bultan. Automated verification of access control policies. Technical Report 2004-22, University of California, Santa Barbara, 2004.
-
(2004)
Technical Report
, vol.2004
, Issue.22
-
-
Hughes, G.1
Bultan, T.2
-
23
-
-
0034829512
-
SD3: A trust management system with certified evaluation
-
T. Jim. SD3: A trust management system with certified evaluation. In IEEE Symposium on Security and Privacy, pages 106-115, 2001.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 106-115
-
-
Jim, T.1
-
24
-
-
0016542395
-
Space-bounded reducibility among combinatorial problems
-
N. D. Jones. Space-bounded reducibility among combinatorial problems. Journal of Computer and System Sciences, 11(1):68-85, 1975.
-
(1975)
Journal of Computer and System Sciences
, vol.11
, Issue.1
, pp. 68-85
-
-
Jones, N.D.1
-
29
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
N. Li, B. N. Grosof, and J. Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Transactions on Information and Systems Security, 6(1):128-171, 2003.
-
(2003)
ACM Transactions on Information and Systems Security
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
31
-
-
30544438141
-
Beyond proof-of- Compliance: Security analysis in trust management
-
May
-
N. Li, J. C. Mitchell, and W. H. Winsborough. Beyond proof-of- compliance: Security analysis in trust management. Journal of the ACM, 52(3):474-514, May 2005.
-
(2005)
Journal of the ACM
, vol.52
, Issue.3
, pp. 474-514
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
33
-
-
2442512413
-
Extensible Access Control Markup Language (XACML) version 1.0
-
OASIS, Feb.
-
T. Moses, extensible Access Control Markup Language (XACML) version 1.0. Technical report, OASIS, Feb. 2003.
-
(2003)
Technical Report
-
-
Moses, T.1
-
36
-
-
0023999796
-
The schematic protection model: Its definition and analysis for acyclic attenuating systems
-
R. Sandhu. The schematic protection model: its definition and analysis for acyclic attenuating systems. Journal of the ACM, 35(2):404-412, 1988.
-
(1988)
Journal of the ACM
, vol.35
, Issue.2
, pp. 404-412
-
-
Sandhu, R.1
-
37
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
39
-
-
0242625217
-
A lightweight approach to specification and analysis of role-based access control extensions
-
A. Schaad and J. D. Moffett. A lightweight approach to specification and analysis of role-based access control extensions. In Symposium on Access Control Models and Technologies, pages 13-22, 2002.
-
(2002)
Symposium on Access Control Models and Technologies
, pp. 13-22
-
-
Schaad, A.1
Moffett, J.D.2
-
41
-
-
0033721519
-
Verification of relational transducers for electronic commerce
-
ACM Press
-
M. Spielmann. Verification of relational transducers for electronic commerce. In ACM Symposium on Principles of Database Systems, pages 92-103. ACM Press, 2000.
-
(2000)
ACM Symposium on Principles of Database Systems
, pp. 92-103
-
-
Spielmann, M.1
-
42
-
-
85028752389
-
The complexity of relational query languages
-
ACM
-
M. Y. Vardi. The complexity of relational query languages (extended abstract). In Symposium on the Theory of Computing, pages 137-146. ACM, 1982.
-
(1982)
Symposium on the Theory of Computing
, pp. 137-146
-
-
Vardi, M.Y.1
-
44
-
-
35248859723
-
Verifying temporal heap properties specified via evolution logic
-
P. Degano, editor, European Symposium on Programming. Springer-Verlag
-
E. Yahav, T. Reps, M. Sagiv, and R. Wilhelm. Verifying temporal heap properties specified via evolution logic. In P. Degano, editor, European Symposium on Programming, volume 2618 of Lecture Notes in Computer Science, pages 204-222. Springer-Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2618
, pp. 204-222
-
-
Yahav, E.1
Reps, T.2
Sagiv, M.3
Wilhelm, R.4
|