-
1
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Report MTR-3153, MITRE Corporation, Bedford
-
BIBA (K. J.), Integrity considerations for secure computer systems. Report MTR-3153, MITRE Corporation, Bedford, 1977.
-
(1977)
-
-
BIBA, K.J.1
-
2
-
-
84871179153
-
-
BELL (D. E.), LAPADULA (L. J.), Secure computer systems: Mathematical foundations. Report MTR-2547, MITRE Corporation, Bedford, 1973.
-
BELL (D. E.), LAPADULA (L. J.), Secure computer systems: Mathematical foundations. Report MTR-2547, MITRE Corporation, Bedford, 1973.
-
-
-
-
5
-
-
84871134294
-
-
BRYANS (J. W.), KOUTNY (M.), RYAN (P. Y. A.), Modelling opacity using Petri nets. In Proceedings of WISP, 2004. Electronic Notes in Theoretical Computer Science. 1, 3.1, 3.1.
-
BRYANS (J. W.), KOUTNY (M.), RYAN (P. Y. A.), Modelling opacity using Petri nets. In Proceedings of WISP, 2004. Electronic Notes in Theoretical Computer Science. 1, 3.1, 3.1.
-
-
-
-
7
-
-
33745657350
-
-
University of Newcastle
-
BRYANS (J. W.), KOUTNY (M.), MAZARÉ (L.), RYAN (P. Y. A.), Opacity Generalized to Transitions Systems, cs-TR 868, University of Newcastle, 2004.
-
(2004)
Opacity Generalized to Transitions Systems, cs-TR
, vol.868
-
-
BRYANS, J.W.1
KOUTNY, M.2
MAZARÉ, L.3
RYAN, P.Y.A.4
-
9
-
-
84871173323
-
-
BUSI (N.), GORRIERI (R.), A survey on Non-Interference with Petri Nets. Advanced Course on Petri Nets 2003, Springer LNCS.
-
BUSI (N.), GORRIERI (R.), A survey on Non-Interference with Petri Nets. Advanced Course on Petri Nets 2003, Springer LNCS.
-
-
-
-
10
-
-
0016949746
-
Lattice Model of Secure Information Flow
-
DENNING (D. E.), A Lattice Model of Secure Information Flow, Communications of the ACM, 19, no, 5:236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
DENNING, A.1
-
11
-
-
85031084273
-
Les Réseaux de Petri - Modèles fondamentaux
-
DIAZ (M.), Les Réseaux de Petri - Modèles fondamentaux, Hermes Science Publications, 2001.
-
(2001)
Hermes Science Publications
-
-
DIAZ, M.1
-
12
-
-
84871139068
-
-
DILL (D. L.), Timing assumptions and verification of finite-state concurrent systems. In J. Sifakis, editor. Automatic Verification Methods for Finite State Systems, no. 407 of LNCS. Springer, 1989.
-
DILL (D. L.), Timing assumptions and verification of finite-state concurrent systems. In J. Sifakis, editor. Automatic Verification Methods for Finite State Systems, no. 407 of LNCS. Springer, 1989.
-
-
-
-
13
-
-
0020299523
-
-
GOGUEN (J. A.), MESEGUER (J.), Security policies and security models. In 1982 IEEE computer society symposium on Security and Privacy, pages 11-20, Oakland, USA, 1982.
-
GOGUEN (J. A.), MESEGUER (J.), Security policies and security models. In 1982 IEEE computer society symposium on Security and Privacy, pages 11-20, Oakland, USA, 1982.
-
-
-
-
15
-
-
0016984825
-
Protection in operating systems
-
HARRIZON (M. A.), RUZZO (W.L.), ULLMAN (J. D.), Protection in operating systems. Communications of the ACM, 19(8): 461-471, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
HARRIZON, M.A.1
RUZZO, W.L.2
ULLMAN, J.D.3
-
16
-
-
84871170244
-
-
JENSEN (K.), Colored Petri Nets: Basic concepts, Analysis Methods and Practical use, 1, 2, EATCS Mongraphs on Theoretical computer Science, Springer Verlag, 1982.
-
JENSEN (K.), Colored Petri Nets: Basic concepts, Analysis Methods and Practical use, 1, 2, EATCS Mongraphs on Theoretical computer Science, Springer Verlag, 1982.
-
-
-
-
17
-
-
84871112670
-
PrT-net Based Analysis of information Flow, Helsinki University of Technology, Digital Systems Laboratory, Series A
-
no 34, 1995
-
JUOPPERI (J.), PrT-net Based Analysis of information Flow, Helsinki University of Technology, Digital Systems Laboratory, Series A: Research Report no 34, 1995.
-
Research Report
-
-
JUOPPERI, J.1
-
20
-
-
1642309744
-
-
KNORR (K.), Dynamic Access control through Petri Net Workflows. Computer Security Applications ACSAC'00. 16th Annual Conference, 2000, pp. 159-167.
-
KNORR (K.), Dynamic Access control through Petri Net Workflows. Computer Security Applications ACSAC'00. 16th Annual Conference, 2000, pp. 159-167.
-
-
-
-
22
-
-
0004068620
-
-
PhD thesis, Institut fr instrumente lie Mathematik, Bonn
-
PETRI (C. A.), Kommunikation mit Automaten. PhD thesis, Institut fr instrumente lie Mathematik, Bonn, 1962.
-
(1962)
Kommunikation mit Automaten
-
-
PETRI1
-
23
-
-
0030086382
-
Role-Based Access Control Models
-
SANDHU (R.), COYNE (E. J.), FEINSTEIN (H. L.), YOUMAN (C. E.), Role-Based Access Control Models, IEEE Computer, 29, no 2, 1996, pp. 38-47
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
SANDHU, R.1
COYNE, E.J.2
FEINSTEIN, H.L.3
YOUMAN, C.E.4
-
24
-
-
84871134564
-
-
SHAFIQ (B.), JOSHI (J.), GHAFOOR (A.), A Petri-net Model for Verification and Validation of Role-Based Access Control Model, CERIAS TR 2002-33, Purdue University.
-
SHAFIQ (B.), JOSHI (J.), GHAFOOR (A.), A Petri-net Model for Verification and Validation of Role-Based Access Control Model, CERIAS TR 2002-33, Purdue University.
-
-
-
-
25
-
-
27544484252
-
-
th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems, WORDS 2005, pages 13-20.
-
th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems, WORDS 2005, pages 13-20.
-
-
-
-
28
-
-
0242625205
-
-
WEDDE (H. F.), LISCHKA (M.), Cooperative role-based administration. In Proceedings of the 8th ACM Symposium on Access Control Models and Technologies (SACMAT), E. Ferrari and D. Ferraiolo, eds. ACM SIGSAC, ACM Press, Como, Italy, 2003.
-
WEDDE (H. F.), LISCHKA (M.), Cooperative role-based administration. In Proceedings of the 8th ACM Symposium on Access Control Models and Technologies (SACMAT), E. Ferrari and D. Ferraiolo, eds. ACM SIGSAC, ACM Press, Como, Italy, 2003.
-
-
-
-
29
-
-
84871172931
-
Security Analysis of Mandatory Access Control Model
-
YIXIN (J.), CHUANG (L.), HAO (Y.), ZHANGXI (T.), Security Analysis of Mandatory Access Control Model. Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, p. 271-276.
-
Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration
, pp. 271-276
-
-
YIXIN, J.1
CHUANG, L.2
HAO, Y.3
ZHANGXI, T.4
|