-
1
-
-
0030365407
-
The expressive power of multi-parent creation in monotonic access control models
-
P. Ammann, R. Lipton and R.S. Sandhu, The expressive power of multi-parent creation in monotonic access control models, Journal of Computer Security 4(2-3) (1996), 149-165.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 149-165
-
-
Ammann, P.1
Lipton, R.2
Sandhu, R.S.3
-
2
-
-
0041524664
-
A logical framework for reasoning about access control models
-
E. Bertino, B. Catania, E. Ferrari and P. Perlasca, A logical framework for reasoning about access control models, ACM Transactions on Information and System Security 6(1) (2003), 71-127.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
, pp. 71-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
3
-
-
0034823078
-
A state-transition model of trust management and access control
-
IEEE Computer Society Press
-
A. Chander, D. Dean and J.C. Mitchell, A state-transition model of trust management and access control, in: Proceedings of the 14th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 2001, pp. 27-43.
-
(2001)
Proceedings of the 14th IEEE Computer Security Foundations Workshop
, pp. 27-43
-
-
Chander, A.1
Dean, D.2
Mitchell, J.C.3
-
5
-
-
84942812332
-
Protection - principles and practice
-
AFIPS Press
-
G.S. Graham and P.J. Denning, Protection - principles and practice, in: Proceedings of the AFIPS Spring Joint Computer Conference, Vol. 40, AFIPS Press, 1972, pp. 417-429.
-
(1972)
Proceedings of the AFIPS Spring Joint Computer Conference
, vol.40
, pp. 417-429
-
-
Graham, G.S.1
Denning, P.J.2
-
6
-
-
0016984825
-
Protection in operating systems
-
M.A. Harrison, W.L. Ruzzo and J.D. Ullman, Protection in operating systems, Communications of the ACM 19(8) (1976), 461-471.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
8
-
-
3142654848
-
-
Reprinted in
-
Reprinted in ACM Operating Systems Review 8(1) (1974), 18-24.
-
(1974)
ACM Operating Systems Review
, vol.8
, Issue.1
, pp. 18-24
-
-
-
10
-
-
0036085965
-
Design of a role-based trust management framework
-
IEEE Computer Society Press
-
N. Li, J.C. Mitchell and W.H. Winsborough, Design of a role-based trust management framework, in: Proceedings of the 2002 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, 2002, pp. 114-130.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
11
-
-
30544438141
-
Beyond proof-of-compliance: Security analysis in trust management
-
N. Li, J.C. Mitchell and W.H. Winsborough, Beyond proof-of-compliance: Security analysis in trust management, Journal of the ACM 52(3) (2005), 474-514.
-
(2005)
Journal of the ACM
, vol.52
, Issue.3
, pp. 474-514
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
12
-
-
33847358981
-
-
Preliminary version appeared in: Proceedings of 2003 IEEE Symposium on Security and Privacy.
-
Preliminary version appeared in: Proceedings of 2003 IEEE Symposium on Security and Privacy.
-
-
-
-
14
-
-
33845517298
-
-
N. Li and M.V. Tripunitara, Security analysis in role-based access control, 2006. Accepted to appear in ACM Transactions on Information and Systems Security (TISSEC).
-
N. Li and M.V. Tripunitara, Security analysis in role-based access control, 2006. Accepted to appear in ACM Transactions on Information and Systems Security (TISSEC).
-
-
-
-
15
-
-
33847368389
-
-
Preliminary version appeared in: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies (SACMAT 2004).
-
Preliminary version appeared in: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies (SACMAT 2004).
-
-
-
-
16
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
N. Li, W.H. Winsborough and J.C. Mitchell, Distributed credential chain discovery in trust management, Journal of Computer Security 11(1) (2003), 35-86.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
17
-
-
0003276135
-
A Calculus of Communicating Systems
-
Springer
-
R. Milner. A Calculus of Communicating Systems, Lecture Notes in Computer Science, Vol. 92, Springer, 1980.
-
(1980)
Lecture Notes in Computer Science
, vol.92
-
-
Milner, R.1
-
20
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
S. Osborn, R.S. Sandhu and Q. Munawer, Configuring role-based access control to enforce mandatory and discretionary access control policies, ACM Transactions on Information and System Security 3(2) (2000), 85-106.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.S.2
Munawer, Q.3
-
21
-
-
84945924340
-
Concurrency and automata on infinite sequences
-
Proceedings of the 5th GI Conference on Theoretical Computer Science, Springer
-
D. Park, Concurrency and automata on infinite sequences, in: Proceedings of the 5th GI Conference on Theoretical Computer Science, Lecture Notes in Computer Science, Vol. 104, Springer, 1981.
-
(1981)
Lecture Notes in Computer Science
, vol.104
-
-
Park, D.1
-
22
-
-
84974744165
-
Expressive power of the schematic protection model
-
R.S. Sandhu, Expressive power of the schematic protection model, Journal of Computer Security 1(1) (1992), 59-98.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.1
, pp. 59-98
-
-
Sandhu, R.S.1
|