-
1
-
-
0028726831
-
Policy driven management for distributed systems
-
Online, Available
-
M. Sloman, "Policy driven management for distributed systems," Journal of Network and Systems Management, vol. 2, pp. 333-360, 1994. [Online], Available: citeseer.ist.psu.edu/sloman94policy.html
-
(1994)
Journal of Network and Systems Management
, vol.2
, pp. 333-360
-
-
Sloman, M.1
-
2
-
-
34748885837
-
ISO/IEC 10181-3:1996 Information technology - Open Systems Interconnection - Security frameworks for open systems: Access control framework, March 2006. [Online]. Available: http://www.iso. org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=18199
-
ISO/IEC
-
ISO/IEC, "ISO/IEC 10181-3:1996 Information technology - Open Systems Interconnection - Security frameworks for open systems: Access control framework," March 2006. [Online]. Available: http://www.iso. org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=18199
-
-
-
-
3
-
-
0042467968
-
Logic in Access Control
-
Ottawa, Canada: IEEE Computer Society Press, June, Online, Available
-
M. Abadi, "Logic in Access Control," in Proceedings of the 18th Annual Symposium on Logic in Computer Science (LICS'03), vol. 15. Ottawa, Canada: IEEE Computer Society Press, June 2003, pp. 228-233. [Online]. Available: citeseer.ist.psu.edu/article/abadi031ogic.html
-
(2003)
Proceedings of the 18th Annual Symposium on Logic in Computer Science (LICS'03)
, vol.15
, pp. 228-233
-
-
Abadi, M.1
-
4
-
-
34748874111
-
-
M. Y. Becker, C. Fournet, and A. D. Gordon, SecPAL: Design and Semantics of a Decentralized Authorisation Language, Microsoft Research, Roger Needham Building 7 J.J. Thompson Avenue, Cambridge, CB3 0FB, UK, Tech. Rep., September 2006.
-
M. Y. Becker, C. Fournet, and A. D. Gordon, "SecPAL: Design and Semantics of a Decentralized Authorisation Language," Microsoft Research, Roger Needham Building 7 J.J. Thompson Avenue, Cambridge, CB3 0FB, UK, Tech. Rep., September 2006.
-
-
-
-
7
-
-
34748886844
-
The Development of Secure Multi-Agent Systems,
-
Ph.D. dissertation, De Montfort University, February
-
H. T. Janicke, "The Development of Secure Multi-Agent Systems," Ph.D. dissertation, De Montfort University, February 2007.
-
(2007)
-
-
Janicke, H.T.1
-
8
-
-
33845387201
-
A Compositional Event & Time-based Policy Model
-
IEEE
-
H. Janicke, A. Cau, F. Siewe, H. Zedan, and K. Jones, "A Compositional Event & Time-based Policy Model," in Proceedings of POLICY2006, London, Ontario, Canada. IEEE, 2006.
-
(2006)
Proceedings of POLICY2006, London, Ontario, Canada
-
-
Janicke, H.1
Cau, A.2
Siewe, F.3
Zedan, H.4
Jones, K.5
-
9
-
-
33845388878
-
A Compositional Framework for the Development of Secure Access Control Systems,
-
Ph.D. dissertation, Software Technology Research Laboratory, Department of Computer Science and Engineering, De Montfort University, Leicester
-
F. Siewe, "A Compositional Framework for the Development of Secure Access Control Systems," Ph.D. dissertation, Software Technology Research Laboratory, Department of Computer Science and Engineering, De Montfort University, Leicester, 2005.
-
(2005)
-
-
Siewe, F.1
-
11
-
-
34748852193
-
-
L. Gong, G. Ellison, and M. Dageforde, Inside Java 2 Platform Security: Architecture, API Design and Implementation, 2nd ed. Addison-Wesley Professional, 2003, iSBN: 0201787911.
-
L. Gong, G. Ellison, and M. Dageforde, Inside Java 2 Platform Security: Architecture, API Design and Implementation, 2nd ed. Addison-Wesley Professional, 2003, iSBN: 0201787911.
-
-
-
-
12
-
-
0030086382
-
RoleBased Access Control Models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman, "RoleBased Access Control Models," IEEE Computer, vol. 29, no. 2, pp. 38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
13
-
-
0003400251
-
Secure Computer Systems: Mathematical Foundations
-
MITRE Technical Report 2547, Tech. Rep
-
L. J. LaPadula and D. E. Bell, "Secure Computer Systems: Mathematical Foundations," MITRE Technical Report 2547, Tech. Rep., 1973.
-
(1973)
-
-
LaPadula, L.J.1
Bell, D.E.2
-
14
-
-
84902461453
-
Attribute mutability in usage control
-
C. Farkas and P. Samarati, Eds. Kluwer
-
J. Park, X. Zhang, and R. S. Sandhu, "Attribute mutability in usage control." in DBSec, C. Farkas and P. Samarati, Eds. Kluwer, 2004, pp. 15-29.
-
(2004)
DBSec
, pp. 15-29
-
-
Park, J.1
Zhang, X.2
Sandhu, R.S.3
-
16
-
-
84875263094
-
-
Elsevier, to appear in, ch. Policy Based Management
-
A. K. Bandara, E. C. Lupu, and M. Sloman, Handbook of Network and System Administration. Elsevier, to appear in 2007, ch. Policy Based Management.
-
(2007)
Handbook of Network and System Administration
-
-
Bandara, A.K.1
Lupu, E.C.2
Sloman, M.3
-
19
-
-
84945150402
-
SPL: An access control language for security policies with complex constraints
-
February
-
C. N. Ribeiro, A. Zuquete, P. Ferreira, and P. Guedes, "SPL: An access control language for security policies with complex constraints," in Network and Distributed System Security Symposium (NDSS'01), February 2001.
-
(2001)
Network and Distributed System Security Symposium (NDSS'01)
-
-
Ribeiro, C.N.1
Zuquete, A.2
Ferreira, P.3
Guedes, P.4
-
20
-
-
33845441652
-
A Basis for Comparing Characteristics of Policy Systems
-
London, Ontario, Canada, June
-
S. Calo and J. Lobo, "A Basis for Comparing Characteristics of Policy Systems," in Seventh IEEE International Workshop on Policies for Distributed Systems and Networks POLICY2006, London, Ontario, Canada, June 2006, pp. 183-192.
-
(2006)
Seventh IEEE International Workshop on Policies for Distributed Systems and Networks POLICY2006
, pp. 183-192
-
-
Calo, S.1
Lobo, J.2
-
21
-
-
84944044323
-
A temporal-logic extension of role-based access control covering dynamic separation of duties
-
T. Mossakowski, M. Drouineaud, and K. Sohr, "A temporal-logic extension of role-based access control covering dynamic separation of duties," in time-ictl, 10th International Symposium on Temporal Representation and Reasoning and Fourth International Conference on Temporal Logic, vol. 1, 2003, p. 83.
-
(2003)
time-ictl, 10th International Symposium on Temporal Representation and Reasoning and Fourth International Conference on Temporal Logic
, vol.1
, pp. 83
-
-
Mossakowski, T.1
Drouineaud, M.2
Sohr, K.3
-
22
-
-
33745450500
-
Formal Model and Policy Specification of Usage Control
-
X. Zhang, F. Rarisi-Presicce, J. Park, and R. Sandhu, "Formal Model and Policy Specification of Usage Control," ACM Transactions on Information and System Security, 2005.
-
(2005)
ACM Transactions on Information and System Security
-
-
Zhang, X.1
Rarisi-Presicce, F.2
Park, J.3
Sandhu, R.4
-
23
-
-
0028424892
-
The temporal logic of actions
-
L. Lamport, "The temporal logic of actions," ACM Trans. Program. Lang. Syst., vol. 16, no. 3, pp. 872-923, 1994.
-
(1994)
ACM Trans. Program. Lang. Syst
, vol.16
, Issue.3
, pp. 872-923
-
-
Lamport, L.1
-
24
-
-
84976843391
-
Efficient checking of temporal integrity constraints using bounded history encoding
-
J. Chomicki, "Efficient checking of temporal integrity constraints using bounded history encoding," ACM Trans. Database Syst., vol. 20, no. 2, pp. 149-186, 1995.
-
(1995)
ACM Trans. Database Syst
, vol.20
, Issue.2
, pp. 149-186
-
-
Chomicki, J.1
-
25
-
-
84881225236
-
Enforceable Security Policies
-
February
-
F. B. Schneider, "Enforceable Security Policies," ACM Transactions on Information and System Security, vol. 3, no. 1, pp. 30-50, February 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
|