-
1
-
-
0035790640
-
A logical framework for reasoning about access control models
-
Chantilly, VA
-
E. Bertino, B. Catania, E. Ferrari, and P. Perlasca. A logical framework for reasoning about access control models. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, pages 41-52, Chantilly, VA, 2001.
-
(2001)
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies
, pp. 41-52
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
4
-
-
0242540396
-
Managing access control policies using access control spaces
-
Monterey, CA, June
-
T. Jaeger, A. Edwards, and X. Zhang. Managing access control policies using access control spaces. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, pages 3-12, Monterey, CA, June 2002.
-
(2002)
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies
, pp. 3-12
-
-
Jaeger, T.1
Edwards, A.2
Zhang, X.3
-
5
-
-
4143132099
-
Resolving constraint conflicts (to appear)
-
IBM T.J. Watson Research Center, Yorktown Heights, NY, June
-
T. Jaeger, R. Sailer, and X. Zhang. Resolving constraint conflicts (to appear). In Proceedings of the 9th ACM Symposium on Access Control Models and Technologies (SACMAT 2004), IBM T.J. Watson Research Center, Yorktown Heights, NY, June 2004.
-
(2004)
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies (SACMAT 2004)
-
-
Jaeger, T.1
Sailer, R.2
Zhang, X.3
-
6
-
-
0030677524
-
A logical language for expressing authorizations
-
Oakland, CA, May
-
S. Jajodia, P. Samarati, and V. Subrahmanian. A logical language for expressing authorizations. In Proceedings of the IEEE Symposium on Security and Privacy, pages 31-42, Oakland, CA, May 1997.
-
(1997)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 31-42
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.3
-
7
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
May
-
S. Jajodia, P. Samarati, V. Subrahmanian, and E. Bertino. A unified framework for enforcing multiple access control policies. In Proceedings of the ACM SIGMOD International Conference on Management of Data, pages 474-485, May 1997.
-
(1997)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 474-485
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.3
Bertino, E.4
-
13
-
-
15944383876
-
Protection in flexible operating system architectures
-
October
-
C. Rippert. Protection in flexible operating system architectures. ACM SIGOPS Operating Systems Review, 37(4):8-18, October 2003.
-
(2003)
ACM SIGOPS Operating Systems Review
, vol.37
, Issue.4
, pp. 8-18
-
-
Rippert, C.1
-
15
-
-
77953770980
-
Towards effective security policy management for large and heterogeneous environments
-
Spring
-
L. Teo and G.-J. Ahn. Towards effective security policy management for large and heterogeneous environments. Technical Report UNCC-SIS-06, UNC Charlotte, Spring 2005.
-
(2005)
Technical Report UNCC-SIS-06, UNC Charlotte
-
-
Teo, L.1
Ahn, G.-J.2
-
16
-
-
15944391639
-
Towards the specification of access control policies on multiple operating systems
-
United States Military Academy, West Point, NY, June
-
L. Teo and G.-J. Ahn. Towards the specification of access control policies on multiple operating systems. In Proceedings of the 5th IEEE Workshop on Information Assurance, pages 210-217, United States Military Academy, West Point, NY, June 2004.
-
(2004)
Proceedings of the 5th IEEE Workshop on Information Assurance
, pp. 210-217
-
-
Teo, L.1
Ahn, G.-J.2
|