-
2
-
-
0023266943
-
A comparision of commercial and military computer security policies
-
IEEE Computer Society Press, May
-
D. D. Clark and D. R. Wilson. A comparision of commercial and military computer security policies. In Proceedings of the, 1987 IEEE Symposium on Security and Privacy, pages 184-194. IEEE Computer Society Press, May 1987.
-
(1987)
Proceedings of the, 1987 IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
4
-
-
33646712738
-
-
Daniel Le Berre project leader, URL, Jan
-
Daniel Le Berre (project leader). SAT4J: A satisfiability library for Java. URL http://www.sat4j.org/, Jan. 2006.
-
(2006)
SAT4J: A satisfiability library for Java
-
-
-
5
-
-
0010916383
-
Satisfiability Problem: Theory and Applications
-
D. Du, J. Gu, and P. M. Pardalos, editors, of, AMS Press
-
D. Du, J. Gu, and P. M. Pardalos, editors. Satisfiability Problem: Theory and Applications, volume 35 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science. AMS Press, 1997.
-
(1997)
DIMACS Series in Discrete Mathematics and Theoretical Computer Science
, vol.35
-
-
-
9
-
-
0016984825
-
Protection in operating systems
-
Aug
-
M. A. Harrison, W. L. Ruzzo, and J. D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461-471, Aug. 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
12
-
-
85008430937
-
A graph-based formalism for RBAC
-
Aug
-
M. Koch, L. V. Mancini, and F. Parisi-Presicce. A graph-based formalism for RBAC. ACM Transactions on Information and System Security, 5(3):332-365, Aug. 2002.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.3
, pp. 332-365
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
13
-
-
0003103622
-
Protection
-
Proceedings of the 5th Princeton Conference on Information Sciences and Systems, Jan
-
B. W. Lampson. Protection. In Proceedings of the 5th Princeton Conference on Information Sciences and Systems, 1971. Reprinted in ACM Operating Systems Review, 8(1):18-24, Jan 1974.
-
(1971)
Reprinted in ACM Operating Systems Review
, vol.8
, Issue.1
, pp. 18-24
-
-
Lampson, B.W.1
-
15
-
-
30544438141
-
Beyond proof-of-compliance: Security analysis in trust management
-
May
-
N. Li, J. C. Mitchell, and W. H. Winsborough. Beyond proof-of-compliance: Security analysis in trust management. Journal of the ACM, 52(3):474-514, May 2005.
-
(2005)
Journal of the ACM
, vol.52
, Issue.3
, pp. 474-514
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
16
-
-
34547325938
-
-
Preliminary version appeared in Proceedings of 2003 IEEE Symposium on Security and Privacy.
-
Preliminary version appeared in Proceedings of 2003 IEEE Symposium on Security and Privacy.
-
-
-
-
18
-
-
0017512599
-
A linear time algorithm for deciding subject security
-
R. J. Lipton and L. Snyder. A linear time algorithm for deciding subject security. Journal of the ACM, 24(3):455-464, 1977.
-
(1977)
Journal of the ACM
, vol.24
, Issue.3
, pp. 455-464
-
-
Lipton, R.J.1
Snyder, L.2
-
21
-
-
0016555241
-
The protection of information in computer systems
-
September
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9): 1278-1308, September 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
23
-
-
0023999796
-
The schematic protection model: Its definition and analysis for acyclic attenuating systems
-
R. S. Sandhu. The schematic protection model: Its definition and analysis for acyclic attenuating systems. Journal of the ACM, 35(2):404-432, 1988.
-
(1988)
Journal of the ACM
, vol.35
, Issue.2
, pp. 404-432
-
-
Sandhu, R.S.1
-
26
-
-
0030086382
-
Role-based access control models
-
February
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
|