-
1
-
-
0042023007
-
Formal Methods: Use and Relevance for the Development of Safety Critical Systems
-
Barroca L.M., McDrmid J.A.: Formal Methods: Use and Relevance for the Development of Safety Critical Systems. The Computer Journal. 1992,35(6):579-599.
-
(1992)
The Computer Journal
, vol.35
, Issue.6
, pp. 579-599
-
-
Barroca, L.M.1
McDrmid, J.A.2
-
2
-
-
0000289556
-
Formal Methods: State of the Art and Future Directions
-
Clarke E., Wing J.: Formal Methods: State of the Art and Future Directions. ACM Computing Surveys,1996,28(4):626-643.
-
(1996)
ACM Computing Surveys
, vol.28
, Issue.4
, pp. 626-643
-
-
Clarke, E.1
Wing, J.2
-
4
-
-
33845962217
-
-
ANSI INCITS 359-2004. Role Based Access Control. American National Standard for Information Technology, 2004.
-
ANSI INCITS 359-2004. Role Based Access Control. American National Standard for Information Technology, 2004.
-
-
-
-
5
-
-
27544484252
-
A Role-Based Access Control Policy Verification Framework for Real-Time Systems
-
Arizona
-
Shafiq B., Masood A., Ghafoor A., et al: A Role-Based Access Control Policy Verification Framework for Real-Time Systems. IEEE Workshop on Object-oriented Real-time Databases, Sedona, Arizona.(2005) 13-20.
-
(2005)
IEEE Workshop on Object-oriented Real-time Databases, Sedona
, pp. 13-20
-
-
Shafiq, B.1
Masood, A.2
Ghafoor, A.3
-
6
-
-
33845954122
-
RBAC Schema Verification Using Lightweight Formal Model and Constraint Analysis
-
December, Accessed June
-
Zao J., Wee Hochtech, Chu J., et al. RBAC Schema Verification Using Lightweight Formal Model and Constraint Analysis. MIT, December 2002. http://alloy.mit.edu/contributions/RBAC.pdf, Accessed June 2006.
-
(2002)
MIT
-
-
Zao, J.1
-
8
-
-
14044273010
-
A First Step Towards Formal Verification of Security Policy Properties for RBAC. Proceedings of the Quality Software
-
Sep
-
Drouineaud M., Bortin M., Torrini P., and et al: A First Step Towards Formal Verification of Security Policy Properties for RBAC. Proceedings of the Quality Software, Fourth International Conference on (QSIC'04), 60-67, Sep. 2004
-
(2004)
Fourth International Conference on (QSIC'04)
, pp. 60-67
-
-
Drouineaud, M.1
Bortin, M.2
Torrini, P.3
and et, al.4
-
9
-
-
85008430937
-
A Graph-Based Formalism for RBAC
-
Koch M., Mancini L.V., Presicce F.P.: A Graph-Based Formalism for RBAC. ACM Transactions on Information and System Security,2002,5(3): 332-365
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.3
, pp. 332-365
-
-
Koch, M.1
Mancini, L.V.2
Presicce, F.P.3
-
10
-
-
33646406549
-
Representation and Reasoning on RBAC: A Description Logic Approach
-
The International Colloquium on Theoretical Aspects of Computing ICTAC, Springer-Verlag
-
Zhao G., Heilili N., Liu S.P., et al: Representation and Reasoning on RBAC: A Description Logic Approach. The International Colloquium on Theoretical Aspects of Computing (ICTAC 2005), LNCS 3722, Springer-Verlag(2005)394-406.
-
(2005)
LNCS
, vol.3722
, pp. 394-406
-
-
Zhao, G.1
Heilili, N.2
Liu, S.P.3
-
11
-
-
33646129449
-
A Formal Description of SECIMOS Operating System
-
Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security MMM-ACNS, St. Petersburg, Russia
-
Zhou Z.Y., Liang B., Jiang L.: A Formal Description of SECIMOS Operating System. Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS 2005),St. Petersburg, Russia, LNCS. (2005)286-297
-
(2005)
LNCS
, pp. 286-297
-
-
Zhou, Z.Y.1
Liang, B.2
Jiang, L.3
-
13
-
-
33845916692
-
-
Accessed June 2006
-
ORA Canada Z/EVES. http://www.ora.on.ca/z-eves/, Accessed June 2006.
-
ORA Canada Z/EVES
-
-
-
15
-
-
0031346670
-
Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems
-
Fairfax, VA
-
Kuhn D. R. Mutual Exclusion of Roles as a Means of Implementing Separation of Duty in Role-Based Access Control Systems. In: Proc. of the 2nd ACM Workshop on Role-Based Access Control, Fairfax, VA.(1997)23-30
-
(1997)
Proc. of the 2nd ACM Workshop on Role-Based Access Control
, pp. 23-30
-
-
Kuhn, D.R.1
-
16
-
-
33845940327
-
-
Good D.I., Akers R.L., Smith L.M.: Report on Gypsy 2.05. Tech. Rept. ICSCA-CMP-48, the University of Texas at Austin.(1986)
-
Good D.I., Akers R.L., Smith L.M.: Report on Gypsy 2.05. Tech. Rept. ICSCA-CMP-48, the University of Texas at Austin.(1986)
-
-
-
-
18
-
-
16244410402
-
HOL-Z 2.0: A Proof Environment for Z-Specifications
-
Brucker A.D., Rittinger F., Wolff B.: HOL-Z 2.0: A Proof Environment for Z-Specifications. J. UCS, 2003,9(2):152-172.
-
(2003)
J. UCS
, vol.9
, Issue.2
, pp. 152-172
-
-
Brucker, A.D.1
Rittinger, F.2
Wolff, B.3
|