-
1
-
-
0003400251
-
Secure computer systems: Mathematical foundations
-
Tech. Rep.
-
L. J. LaPadula and D. E. Bell, "Secure computer systems: Mathematical foundations," MITRE Technical Report 2547, Tech. Rep., 1973.
-
(1973)
MITRE Technical Report
, vol.2547
-
-
LaPadula, L.J.1
Bell, D.E.2
-
3
-
-
0004066959
-
Security in clinical information systems
-
British Medical Association, Tech. Rep., Jan
-
R. Anderson, "Security in clinical information systems," BMA Report, British Medical Association, Tech. Rep., Jan 1996.
-
(1996)
BMA Report
-
-
Anderson, R.1
-
5
-
-
84949221392
-
Compositional reasoning using interval temporal logic and tempura
-
ser. LNCS, W.-P. d. Roever, H. Langmaack, and A. Pnueli, Eds., Berlin: Springer Verlag
-
B. Moszkowski, "Compositional reasoning using interval temporal logic and tempura," in Compositionality: The Significant Difference, ser. LNCS, W.-P. d. Roever, H. Langmaack, and A. Pnueli, Eds., vol. 1486. Berlin: Springer Verlag, 1998, pp. 439-464.
-
(1998)
Compositionality: The Significant Difference
, vol.1486
, pp. 439-464
-
-
Moszkowski, B.1
-
6
-
-
33845388878
-
-
Ph.D. dissertation, Software Technology Research Laboratory, Department of Computer Science and Engineering, De Montfort University, Leicester
-
F. Siewe, "A compositional framework for the development of secure access control systems," Ph.D. dissertation, Software Technology Research Laboratory, Department of Computer Science and Engineering, De Montfort University, Leicester, 2005.
-
(2005)
A Compositional Framework for the Development of Secure Access Control Systems
-
-
Siewe, F.1
-
7
-
-
0028726831
-
Policy driven management for distributed systems
-
[Online]. Available: citeseer.ist.psu.edu/sloman94policy.html
-
M. Sloman, "Policy driven management for distributed systems," Journal of Network and Systems Management, vol. 2, pp. 333-360, 1994. [Online]. Available: citeseer.ist.psu.edu/sloman94policy.html
-
(1994)
Journal of Network and Systems Management
, vol.2
, pp. 333-360
-
-
Sloman, M.1
-
8
-
-
0001619596
-
A unified framework for enforcing multiple access control policies
-
June
-
S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino, "A unified framework for enforcing multiple access control policies," ACM transaction on Database Systems, vol. 26, no. 2, pp. 214-260, June 2001.
-
(2001)
ACM Transaction on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
Bertino, E.4
-
9
-
-
85025424440
-
An algebra for composing access control policies
-
February
-
P. Bonatti, S. Vimercati, and P. Samarati, "An algebra for composing access control policies," ACM Transaction on Information and System security, vol. 5, no. 1, pp. 1-35, February 2002.
-
(2002)
ACM Transaction on Information and System Security
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.1
Vimercati, S.2
Samarati, P.3
-
11
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "Role-Based Access Control Models," IEEE Computer, vol. 29, no. 2, pp. 38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
12
-
-
84944792110
-
Trbac: A temporal role-based access control model
-
E. Bertino, P. A. Bonatti, and E. Ferrari, "Trbac: A temporal role-based access control model," ACM Trans. Inf. Syst. Secur., vol. 4, no. 3, pp. 191-233, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
13
-
-
84944044323
-
A temporal-logic extension of role-based access control covering dynamic separation of duties
-
T. Mossakowski, M. Drouineaud, and K. Sohr, "A temporal-logic extension of role-based access control covering dynamic separation of duties," in time-ictl, 10th International Symposium on Temporal Representation and Reasoning and Fourth International Conference on Temporal Logic, vol. 1, 2003, p. 83.
-
(2003)
Time-ictl, 10th International Symposium on Temporal Representation and Reasoning and Fourth International Conference on Temporal Logic
, vol.1
, pp. 83
-
-
Mossakowski, T.1
Drouineaud, M.2
Sohr, K.3
-
14
-
-
0001809810
-
The ponder specification language
-
January
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman, "The ponder specification language," in Workshop on Policies for Distributed Systems and Networks (Policy2001), January 2001.
-
(2001)
Workshop on Policies for Distributed Systems and Networks (Policy2001)
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
16
-
-
1842659605
-
Some very compositional temporal properties
-
ser. IFIP Transactions, E.-R. Olderog, Ed., IFIP. Elsevier Science B.V. (North-Holland)
-
B. Moszkowski, "Some very compositional temporal properties," in Programming Concepts, Methods and Calculi, ser. IFIP Transactions, E.-R. Olderog, Ed., vol. A-56, IFIP. Elsevier Science B.V. (North-Holland), 1994, pp. 307-326.
-
(1994)
Programming Concepts, Methods and Calculi
, vol.A-56
, pp. 307-326
-
-
Moszkowski, B.1
-
18
-
-
0003400251
-
-
MITRE, Bedford, MA, Tech. Rep. MTR-2997
-
D. Bell and L. Lapadula, "Secure computer system unified exposition and multics interpretation," MITRE, Bedford, MA, Tech. Rep. MTR-2997, 1975.
-
(1975)
Secure Computer System Unified Exposition and Multics Interpretation
-
-
Bell, D.1
Lapadula, L.2
-
19
-
-
2642573551
-
A compositional framework for access control policies enforcement
-
M. Backes, D. Basin, and M. Waidner, Eds. Washington, DC: ACM Press, October
-
F. Siewe, A. Cau, and H. Zedan, "A Compositional Framework for Access Control Policies Enforcement," in ACM Workshop on Formal Methods in Security Engineering (FMSE'03), M. Backes, D. Basin, and M. Waidner, Eds. Washington, DC: ACM Press, October 2003, pp. 32-42.
-
(2003)
ACM Workshop on Formal Methods in Security Engineering (FMSE'03)
, pp. 32-42
-
-
Siewe, F.1
Cau, A.2
Zedan, H.3
-
20
-
-
84994281263
-
-
[Online]
-
U.S. Depaitment of Health & Human Services, "HHS - Office for Civil Rights - HIPAA," 2004. [Online]. Available: http://www.hhs.gov/ocr/ hipaa/
-
(2004)
HHS - Office for Civil Rights - HIPAA
-
-
-
21
-
-
35048879817
-
An algebra for composing enterprise privacy policies
-
P. Samarati, D. Gollmann, and R. Molva, Eds., September
-
M. Backes, M. Durmuth, and R. Steinwandt, "An Algebra for Composing Enterprise Privacy Policies," in Proceedings of 9th European Symposium On Research in Computer Security (ESORICS), P. Samarati, D. Gollmann, and R. Molva, Eds., September 2004, pp. 33-52.
-
(2004)
Proceedings of 9th European Symposium on Research in Computer Security (ESORICS)
, pp. 33-52
-
-
Backes, M.1
Durmuth, M.2
Steinwandt, R.3
-
22
-
-
33845435784
-
Autonomous Agents and Multi-Agent Systems (AAMAS) for the military - Issues and challenges
-
Robert Ghanea-Hercock and Mark Greaves and Nick Jennings and Simon Thompson, Ed., July
-
P. Beautement, D. Allsopp, M. Greaves, S. Goldsmith, S. Spires, S. Thompson, and H. Janicke, "Autonomous Agents and Multi-Agent Systems (AAMAS) for the Military - Issues and Challenges," in Proceedings of 1st Workshop on Defence Applications for Multi-Agent Systems (DAMAS), Robert Ghanea-Hercock and Mark Greaves and Nick Jennings and Simon Thompson, Ed., July 2005.
-
(2005)
Proceedings of 1st Workshop on Defence Applications for Multi-Agent Systems (DAMAS)
-
-
Beautement, P.1
Allsopp, D.2
Greaves, M.3
Goldsmith, S.4
Spires, S.5
Thompson, S.6
Janicke, H.7
-
23
-
-
33845437458
-
Analysis and run-time verification of dynamic security policies
-
Robert Ghanea-Hercock and Mark Greaves and Nick Jennings and Simon Thompson, Ed.
-
H. Janicke, F. Siewe, K. Jones, A. Cau, and H. Zedan, "Analysis and run-time verification of dynamic security policies," in In Proceedings of The First Workshop on Defence Applications for Multi-Agent Systems (DAMAS'05), at AAMAS'05, Utrecht, Netherlands., Robert Ghanea-Hercock and Mark Greaves and Nick Jennings and Simon Thompson, Ed., 2005.
-
(2005)
Proceedings of the First Workshop on Defence Applications for Multi-Agent Systems (DAMAS'05), at AAMAS'05, Utrecht, Netherlands
-
-
Janicke, H.1
Siewe, F.2
Jones, K.3
Cau, A.4
Zedan, H.5
|