-
1
-
-
33751110867
-
-
K. Alghathbar, D. Wijesekera, Modeling dynamic role-based access constraints using UML, in: Proceedings of the 1st International Conference on Software Engineering Research & Applications (ICSERA'03), San Francisco, CA, June (2003).
-
-
-
-
2
-
-
2642582574
-
AuthUML: a three-phased framework to analyze access control specifications in Use Cases, Washington, DC
-
ACM Press, New York
-
Alghathbar K., and Wijesekera D. AuthUML: a three-phased framework to analyze access control specifications in Use Cases, Washington, DC. Proceedings of the Workshop on Formal Methods in Security Engineering (FMSE) (2003), ACM Press, New York
-
(2003)
Proceedings of the Workshop on Formal Methods in Security Engineering (FMSE)
-
-
Alghathbar, K.1
Wijesekera, D.2
-
3
-
-
0002198395
-
Towards a theory of declarative knowledge
-
Minker J. (Ed), Morgan Kaufman, San Mateo
-
Apt K., Blair H., and Walker A. Towards a theory of declarative knowledge. In: Minker J. (Ed). Foundations of deductive databases (1988), Morgan Kaufman, San Mateo 89-148
-
(1988)
Foundations of deductive databases
, pp. 89-148
-
-
Apt, K.1
Blair, H.2
Walker, A.3
-
5
-
-
0003547470
-
-
Addison-Wesley, Reading, MA
-
Booch G., Rumbaugh J., and Jacobson I. The Unified Modeling Language User Guide (1999), Addison-Wesley, Reading, MA
-
(1999)
The Unified Modeling Language User Guide
-
-
Booch, G.1
Rumbaugh, J.2
Jacobson, I.3
-
6
-
-
33751071571
-
-
G. Brose, M. Koch, K.-P. Löhr, Integrating access control design into the software development process, in: Proceedings of the sixth biennial world conference on the Integrated Design and Process Technology (IDPT), Pasadena, CA, June (2002).
-
-
-
-
7
-
-
84944060696
-
A typed access control model for CORBA
-
Proceedings European Symposium on Research in Computer Security (ESORICS). Cuppens F., Deswarte Y., Gollmann D., and Weidner M. (Eds), Springer, Berlin
-
Brose G. A typed access control model for CORBA. In: Cuppens F., Deswarte Y., Gollmann D., and Weidner M. (Eds). Proceedings European Symposium on Research in Computer Security (ESORICS). Lecture Notes in Computer Science vol. 1895 (2000), Springer, Berlin 88-105
-
(2000)
Lecture Notes in Computer Science
, vol.1895
, pp. 88-105
-
-
Brose, G.1
-
8
-
-
0023266943
-
-
D.D. Clark, D.R. Wilson, A comparison of commercial and military computer security policies, in: Proceedings of the IEEE Symposium on Security and Privacy, 1987, pp. 184-919.
-
-
-
-
9
-
-
84970947585
-
Software engineering for security: a roadmap
-
Finkelstein A. (Ed), ACM Press, New York
-
Devanbu P.T., and Stubblebine S. Software engineering for security: a roadmap. In: Finkelstein A. (Ed). The Future of Software Engineering (2000), ACM Press, New York
-
(2000)
The Future of Software Engineering
-
-
Devanbu, P.T.1
Stubblebine, S.2
-
10
-
-
0024663629
-
-
J. Dobson, J. McDermid, A framework for expressing models of security policy, in: Proceedings of the IEEE Symposium on Security and Privacy, 1989, pp. 229-241.
-
-
-
-
11
-
-
33751088508
-
-
E. Fernandez-Medina, A. Martinez, C. Medina, M. Piattini, Integrating multilevel security in the database design process, in: Proceedings of the sixth biennial world conference on the Integrated Design and Process Technology (IDPT), Pasadena, CA, June (2002).
-
-
-
-
13
-
-
85030843209
-
Making inconsistency respectable: a logical framework for inconsistency in reasoning, phase1 - a position paper
-
Springer, Berlin
-
Gabbay D., and Hunter A. Making inconsistency respectable: a logical framework for inconsistency in reasoning, phase1 - a position paper. Proceedings of Fundamentals of Artificial Intelligence Research (1991), Springer, Berlin 19-32
-
(1991)
Proceedings of Fundamentals of Artificial Intelligence Research
, pp. 19-32
-
-
Gabbay, D.1
Hunter, A.2
-
14
-
-
0004226214
-
Making Inconsistency Respectable: A Logical Framework for Inconsistency in Reasoning, Phase2
-
Symbolic and Quantitative Approaches to Reasoning and Uncertainty, Springer, Berlin
-
Gabbay D., and Hunter A. Making Inconsistency Respectable: A Logical Framework for Inconsistency in Reasoning, Phase2. Symbolic and Quantitative Approaches to Reasoning and Uncertainty. Lecture Notes in Computer Science (1992), Springer, Berlin 129-136
-
(1992)
Lecture Notes in Computer Science
, pp. 129-136
-
-
Gabbay, D.1
Hunter, A.2
-
16
-
-
33751095607
-
-
M. Gelfond, V. Lifschitz, The stable model semantics for logic programming. in: Proceedings of the 5th International Conference and Symposium on Logic Programming, Seattle, Washington, 1988, pp. 1070-1080.
-
-
-
-
17
-
-
0031682433
-
-
V. Gligor, S. Gavrila, D. Ferraiolo, On the formal definition of separation of duty policies and their composition, in: Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, May (1998).
-
-
-
-
18
-
-
0001619596
-
Flexible support for multiple access control policies
-
Jajodia S., Samarati P., Luisa Sapino M., and Subrahmanian V.S. Flexible support for multiple access control policies. ACM Trans. on Database Systems 26 2 (2001) 214-260
-
(2001)
ACM Trans. on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Luisa Sapino, M.3
Subrahmanian, V.S.4
-
19
-
-
84944220091
-
Towards development of secure systems using UMLsec
-
Fundamental Approaches to Software Engineering, 4th Internacional Conference, Proceedings. Hussmann H. (Ed), Springer, Berlin
-
Jurjens J. Towards development of secure systems using UMLsec. In: Hussmann H. (Ed). Fundamental Approaches to Software Engineering, 4th Internacional Conference, Proceedings. Lecture Notes in Computer Science (2001), Springer, Berlin 187-200
-
(2001)
Lecture Notes in Computer Science
, pp. 187-200
-
-
Jurjens, J.1
-
20
-
-
79955143136
-
SecureUML: a UML-based modeling language for model-driven security
-
Springer, Berlin
-
Lodderstedt T., Basin D., and Doser J. SecureUML: a UML-based modeling language for model-driven security. Proceedings of the 5th International Conference on the Unified Modeling Language, Dresden, Germany (2002), Springer, Berlin 426-441
-
(2002)
Proceedings of the 5th International Conference on the Unified Modeling Language, Dresden, Germany
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
21
-
-
0025099231
-
-
M. Nash, K. Poland, Some conundrums concerning separation of duty, In: Proceedings of the IEEE Symposium on Security and Privacy, May 1990, pp. 201-207.
-
-
-
-
23
-
-
33751116529
-
-
Object Management Group, OMG Unified Modeling Language Specification, Version 1.4, 2001 .
-
-
-
-
24
-
-
0030086382
-
Role-based access control models
-
Sandhu R.S., Coyne E.J., Feinstein H.L., and Youman C.E. Role-based access control models. IEEE Computer 29 2 (1996) 38-47
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
25
-
-
0024125647
-
-
R.S. Sandhu, Transaction control expressions for separation of duties, in: Proceedings of the Fourth Computer Security Applications Conference, 1988, pp. 282-286.
-
-
-
-
26
-
-
78650610301
-
From use cases to system operation specifications
-
Sendall S., and Strohmeier A. From use cases to system operation specifications. UML (2000) 1-15
-
(2000)
UML
, pp. 1-15
-
-
Sendall, S.1
Strohmeier, A.2
-
27
-
-
33751080087
-
-
S. Sendall, Specifying Reactive System Behavior, Ph.D. thesis, Swiss Federal Institute of Technology - Lausanne (EPFL), May (2002).
-
-
-
-
28
-
-
79957904799
-
-
R. Simon, M. Zurko, Separation of duty in role-based environments, in: Proceedings of the 10th Computer Security Foundations Workshop, Rockport, Massachusetts, June (1997).
-
-
-
-
30
-
-
84974750564
-
Authorizations in distributed systems: a new approach
-
Woo T., and Lam S. Authorizations in distributed systems: a new approach. Journal of Computer Security 2 2-3 (1993) 107-136
-
(1993)
Journal of Computer Security
, vol.2
, Issue.2-3
, pp. 107-136
-
-
Woo, T.1
Lam, S.2
|