-
2
-
-
0032691796
-
A logical framework for reasoning on data access control policies
-
E. Bertino, F. Buccafurri, E. Ferrari, and P. Rullo. A logical framework for reasoning on data access control policies. In Proc. 12th IEEE Computer Security Foundations Workshop, pages 175-189, 1999.
-
(1999)
Proc. 12th IEEE Computer Security Foundations Workshop
, pp. 175-189
-
-
Bertino, E.1
Buccafurri, F.2
Ferrari, E.3
Rullo, P.4
-
3
-
-
0035791550
-
On specifying security policies for web documents with an XML-based language
-
Chantilly, VA, May
-
E. Bertino, S. Castano, and E. Ferrari. On specifying security policies for web documents with an XML-based language. In Proc. 6th ACM Symposium on Access Control Models and Technologies, Chantilly, VA, May 2001.
-
(2001)
Proc. 6th ACM Symposium on Access Control Models and Technologies
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
-
4
-
-
1142309815
-
Provisions and obligations in policy management and security applications
-
Hong Kong, China, Aug
-
C. Bettini, S. Jajodia, X. S. Wang, and D. Wijesekera. Provisions and obligations in policy management and security applications. In VLDB, Hong Kong, China, Aug. 2002.
-
(2002)
VLDB
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
5
-
-
84893077785
-
Obligation monitoring in policy management
-
Lake Como, Italy, June
-
C. Bettini, S. Jajodia, X. S. Wang, and D. Wijesekera. Obligation monitoring in policy management. In IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Como, Italy, June 2003.
-
(2003)
IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003)
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
6
-
-
0345829056
-
Provisions and obligations in policy rule management
-
C. Bettini, S. Jajodia, X. S. Wang, and D. Wijesekera. Provisions and obligations in policy rule management. J. Network Syst. Manage., 11(3), 2003.
-
(2003)
J. Network Syst. Manage
, vol.11
, Issue.3
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
9
-
-
0001809810
-
The Ponder Policy Specification Language
-
Bristol, UK, Jan
-
D. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder Policy Specification Language. In 2nd International Workshop on Policies for Distributed Systems and Networks, Bristol, UK, Jan. 2001.
-
(2001)
2nd International Workshop on Policies for Distributed Systems and Networks
-
-
Damianou, D.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
10
-
-
84944048132
-
The ponder policy specification language
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The ponder policy specification language. In Proc. International Workshop on Policies for Distributed Systems and Networks, pages 18-38, 2001.
-
(2001)
Proc. International Workshop on Policies for Distributed Systems and Networks
, pp. 18-38
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
11
-
-
11244341345
-
A framework for contractual resource sharing in coalitions
-
Yorktown Heights, New York, June
-
B. S. Firozabadi, M. Sergot, A. Squicciarini, and E. Bertino. A framework for contractual resource sharing in coalitions. In 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004, Yorktown Heights, New York, June 2004.
-
(2004)
5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004
-
-
Firozabadi, B.S.1
Sergot, M.2
Squicciarini, A.3
Bertino, E.4
-
13
-
-
84976657250
-
An authorization mechanism for a relational database systems
-
P. Griffiths and B. Wade. An authorization mechanism for a relational database systems. ACM Transactions on Database Systems, 1(3), 1976.
-
(1976)
ACM Transactions on Database Systems
, vol.1
, Issue.3
-
-
Griffiths, P.1
Wade, B.2
-
14
-
-
0016984825
-
Protection in operating systems
-
Aug
-
M. A. Harrison, W. L. Ruzzo, and J. D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461-471, Aug. 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
16
-
-
34547280946
-
-
K. Irwin, T. Yu, and W. Winsborough. On the modeling and analysis of obligations. Technical Report NCSU CS TR 2006-26, North Carolina State University, 2006. ftp://ftp.ncsu.edu/pub/unity/lockers/ftp/csc_anon/tech/2006/ TR-2006-26.%,pdf.
-
K. Irwin, T. Yu, and W. Winsborough. On the modeling and analysis of obligations. Technical Report NCSU CS TR 2006-26, North Carolina State University, 2006. ftp://ftp.ncsu.edu/pub/unity/lockers/ftp/csc_anon/tech/2006/ TR-2006-26.%,pdf.
-
-
-
-
18
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino. A unified framework for enforcing multiple access control policies. In Proc. ACM SIGMOD International Conference on Management of Data, pages 474-485, 1997.
-
(1997)
Proc. ACM SIGMOD International Conference on Management of Data
, pp. 474-485
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
Bertino, E.4
-
19
-
-
84893084758
-
A policy language for a pervasive computing environment
-
Lake Como, Italy, June
-
L. Kagal, T. W. Finin, and A. Joshi. A policy language for a pervasive computing environment. In IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), Lake Como, Italy, June 2003.
-
(2003)
IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008)
-
-
Kagal, L.1
Finin, T.W.2
Joshi, A.3
-
20
-
-
84975877752
-
Policy conflict analysis using free variable tableaux for access control in web services environments
-
Chiba, Japan, May
-
H. Kamoda, M. Yamaoka, S. Matsuda, K. Broda, and M. Sloman. Policy conflict analysis using free variable tableaux for access control in web services environments. In Policy Management for the Web Workshop, Chiba, Japan, May 2005.
-
(2005)
Policy Management for the Web Workshop
-
-
Kamoda, H.1
Yamaoka, M.2
Matsuda, S.3
Broda, K.4
Sloman, M.5
-
22
-
-
0038825043
-
Beyond proof-of-compliance: Safety and availability analysis in trust management
-
IEEE Computer Society Press, May
-
N. Li, W. H. Winsborough, and J. C. Mitchell. Beyond proof-of-compliance: Safety and availability analysis in trust management. In Proceedings of IEEE Symposium on Security and Privacy, pages 123-139. IEEE Computer Society Press, May 2003.
-
(2003)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 123-139
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
24
-
-
34547295713
-
Monitoring and execution for contract compliance
-
Technical Report TR 2001-261, HP Labs, 2001
-
M. Sailer and M. Morciniec. Monitoring and execution for contract compliance. Technical Report TR 2001-261, HP Labs, 2001.
-
-
-
Sailer, M.1
Morciniec, M.2
-
25
-
-
0001549660
-
The ARBAC97 model for role-based aministration of roles
-
Feb
-
R. Sandhu, V. Bhamidipati, and Q. Munawer. The ARBAC97 model for role-based aministration of roles. ACM Transactions on Information and Systems Security, 2(1):105-135, Feb. 1999.
-
(1999)
ACM Transactions on Information and Systems Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
26
-
-
0023999796
-
The Schematic Protection Model: Its definition and analysis for acyclic attenuating systems
-
R. S. Sandhu. The Schematic Protection Model: Its definition and analysis for acyclic attenuating systems. Journal of ACM, 35(2):404-432, 1988.
-
(1988)
Journal of ACM
, vol.35
, Issue.2
, pp. 404-432
-
-
Sandhu, R.S.1
-
29
-
-
37149051976
-
Kaos policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement
-
Lake Como, Italy, June
-
A. Uszok, J. M. Bradshaw, R. Jeffers, N. Suri, P. J. Hayes, M. R. Breedy, L. Bunch, M. Johnson, S. Kulkarni, and J. Lott. Kaos policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement. In IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), Lake Como, Italy, June 2003.
-
(2003)
IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008)
-
-
Uszok, A.1
Bradshaw, J.M.2
Jeffers, R.3
Suri, N.4
Hayes, P.J.5
Breedy, M.R.6
Bunch, L.7
Johnson, M.8
Kulkarni, S.9
Lott, J.10
-
30
-
-
34547302121
-
-
OASIS eXtensible Access Control Markup Language (XACML). http://www.oasis-open.org/committees/xacml/, 2005.
-
OASIS eXtensible Access Control Markup Language (XACML). http://www.oasis-open.org/committees/xacml/, 2005.
-
-
-
|