-
1
-
-
0031637195
-
On SDSI's linked local name spaces
-
M. Abadi. On SDSI's linked local name spaces. Journal of Computer Security, 6(1-2):3-22, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 3-22
-
-
Abadi, M.1
-
2
-
-
0027667638
-
A calculus for access control in distributed systems
-
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706-734, 1993.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
5
-
-
3042584122
-
Flexible access control policy specification with constraint logic programming
-
S. Barker and P. J. Stuckey. Flexible access control policy specification with constraint logic programming. ACM Trans. Inf. Syst. Secur., 6(4):501-546, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.4
, pp. 501-546
-
-
Barker, S.1
Stuckey, P.J.2
-
6
-
-
33947674219
-
Cassandra: Flexible trust management and its application to electronic health records
-
Technical Report UCAM-CL-TR-648, University of Cambridge, Computer Laboratory, 2005. See
-
M. Y. Becker. Cassandra: Flexible trust management and its application to electronic health records (Ph.D. thesis). Technical Report UCAM-CL-TR-648, University of Cambridge, Computer Laboratory, 2005. See http://www.cl.cam.ac.uk/ TechReports/UCAM-CL-TR-648.html.
-
-
-
Becker, M.Y.1
-
7
-
-
35048847843
-
-
M. Y. Becker, C. Fournet, and A. D. Gordon. Sec-PAL: Design and semantics of a decentralized authorization language. Technical report, Microsoft Research, 2006.research.microsoft.com/research/pubs/view.aspx?tr_id=1166.
-
M. Y. Becker, C. Fournet, and A. D. Gordon. Sec-PAL: Design and semantics of a decentralized authorization language. Technical report, Microsoft Research, 2006.research.microsoft.com/research/pubs/view.aspx?tr_id=1166.
-
-
-
-
8
-
-
35048846423
-
-
M. Y. Becker and S. Nanz. A logic for state-modifying authorization policies. Technical Report MSR-TR-2007-32, Microsoft Research, 2007. research.microsoft.com/research/pubs/view.aspx?tr_id=1274.
-
M. Y. Becker and S. Nanz. A logic for state-modifying authorization policies. Technical Report MSR-TR-2007-32, Microsoft Research, 2007. research.microsoft.com/research/pubs/view.aspx?tr_id=1274.
-
-
-
-
10
-
-
4944223328
-
Cassandra: Flexible trust management, applied to electronic health records
-
M. Y. Becker and P. Sewell. Cassandra: Flexible trust management, applied to electronic health records. In IEEE Computer Security Foundations Workshop, pages 139-154, 2004.
-
(2004)
IEEE Computer Security Foundations Workshop
, pp. 139-154
-
-
Becker, M.Y.1
Sewell, P.2
-
11
-
-
0003400251
-
Secure computer systems: Unified exposition and Multics interpretation
-
Technical report, The MITRE Corporation, July
-
D. E. Bell and L. J. LaPadula. Secure computer systems: Unified exposition and Multics interpretation. Technical report, The MITRE Corporation, July 1975.
-
(1975)
-
-
Bell, D.E.1
LaPadula, L.J.2
-
12
-
-
0032153903
-
An access control model supporting periodicity constraints and temporal reasoning
-
E. Bertino, C. Bettini, E. Ferrari, and P. Samarati. An access control model supporting periodicity constraints and temporal reasoning. ACM Trans. Database Syst., 23(3), 1998.
-
(1998)
ACM Trans. Database Syst
, vol.23
, Issue.3
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
13
-
-
78449251691
-
A temporal authorization model
-
New York, NY, USA, ACM Press
-
E. Bertino, C. Bettini, and P. Samarati. A temporal authorization model. In CCS '94: Proceedings of the 2nd ACM Conference on Computer and communications security, pages 126-135, New York, NY, USA, 1994. ACM Press.
-
(1994)
CCS '94: Proceedings of the 2nd ACM Conference on Computer and communications security
, pp. 126-135
-
-
Bertino, E.1
Bettini, C.2
Samarati, P.3
-
14
-
-
0035790640
-
A logical framework for reasoning about access control models
-
New York, NY, USA, ACM Press
-
E. Bertino, B. Catania, E. Ferrari, and P. Perlasca. A logical framework for reasoning about access control models. In SACMAT '01: Proceedings of the sixth ACM symposium on Access control models and technologies, pages 41-52, New York, NY, USA, 2001. ACM Press.
-
(2001)
SACMAT '01: Proceedings of the sixth ACM symposium on Access control models and technologies
, pp. 41-52
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
17
-
-
0024631953
-
What you always wanted to know about Datalog (and never dared to ask)
-
S. Ceri, G. Gottlob, and L. Tanca. What you always wanted to know about Datalog (and never dared to ask). IEEE Transactions on Knowledge and Data Engineering, 1(1):146-166, 1989.
-
(1989)
IEEE Transactions on Knowledge and Data Engineering
, vol.1
, Issue.1
, pp. 146-166
-
-
Ceri, S.1
Gottlob, G.2
Tanca, L.3
-
19
-
-
0029695436
-
Tabled evaluation with delaying for general logic programs
-
W. Chen and D. S. Warren. Tabled evaluation with delaying for general logic programs. Journal of the ACM, 43(1):20-74, 1996.
-
(1996)
Journal of the ACM
, vol.43
, Issue.1
, pp. 20-74
-
-
Chen, W.1
Warren, D.S.2
-
21
-
-
85008027756
-
Complexity and expressive power of logic programming
-
Washington, DC, USA, IEEE Computer Society
-
E. Dantsin, T. Eiter, G. Gottlob, and A. Voronkov. Complexity and expressive power of logic programming. In CCC '97: Proceedings of the 12th Annual IEEE Conference on Computational Complexity, page 82, Washington, DC, USA, 1997. IEEE Computer Society.
-
(1997)
CCC '97: Proceedings of the 12th Annual IEEE Conference on Computational Complexity
, pp. 82
-
-
Dantsin, E.1
Eiter, T.2
Gottlob, G.3
Voronkov, A.4
-
22
-
-
84867167943
-
-
J. DeTreville. Binder, a logic-based security language. In IEEE Symposium on Security and Privacy, pages 105-113, 2002.
-
J. DeTreville. Binder, a logic-based security language. In IEEE Symposium on Security and Privacy, pages 105-113, 2002.
-
-
-
-
23
-
-
24644431553
-
Policies, models, and languages for access control
-
S. D. C. di Vimercati, P. Samarati, and S. Jajodia. Policies, models, and languages for access control. In Databases in Networked Information Systems, volume 3433, pages 225-237, 2005.
-
(2005)
Databases in Networked Information Systems
, vol.3433
, pp. 225-237
-
-
di Vimercati, S.D.C.1
Samarati, P.2
Jajodia, S.3
-
24
-
-
0023561596
-
Extension tables: Memo relations in logic programming
-
S. W. Dietrich. Extension tables: Memo relations in logic programming. In Symposium on Logic Programming, pages 264-272, 1987.
-
(1987)
Symposium on Logic Programming
, pp. 264-272
-
-
Dietrich, S.W.1
-
26
-
-
35048849307
-
-
C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory, RFC 2693, September 1999. See http://www.ietf.org/rfc/rfc2693.txt.
-
C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory, RFC 2693, September 1999. See http://www.ietf.org/rfc/rfc2693.txt.
-
-
-
-
30
-
-
4944228287
-
A formal foundation for XrML
-
Washington, DC, USA, IEEE Computer Society
-
J. Y. Halpern and V. Weissman. A formal foundation for XrML. In CSFW '04: Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW'04), page 251, Washington, DC, USA, 2004. IEEE Computer Society.
-
(2004)
CSFW '04: Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW'04)
, pp. 251
-
-
Halpern, J.Y.1
Weissman, V.2
-
33
-
-
0001619596
-
Flexible support for multiple access control policies
-
S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian. Flexible support for multiple access control policies. ACM Trans. Database Syst., 26(2):214-260, 2001.
-
(2001)
ACM Trans. Database Syst
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
35
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
38
-
-
0037974359
-
Datalog with constraints: A foundation for trust management languages
-
N. Li and J. C. Mitchell. Datalog with constraints: A foundation for trust management languages. In Proc. PADL, pages 58-73, 2003.
-
(2003)
Proc. PADL
, pp. 58-73
-
-
Li, N.1
Mitchell, J.C.2
-
40
-
-
0031382488
-
Reconciling role-based management and role-based access control
-
E. C. Lupu and M. Sloman. Reconciling role-based management and role-based access control. In ACM Workshop on Role-based Access Control, pages 135-141, 1997.
-
(1997)
ACM Workshop on Role-based Access Control
, pp. 135-141
-
-
Lupu, E.C.1
Sloman, M.2
-
42
-
-
0005037203
-
-
Springer-Verlag New York, Inc, New York, NY, USA
-
P. Revesz. Introduction to constraint databases. Springer-Verlag New York, Inc., New York, NY, USA, 2002.
-
(2002)
Introduction to constraint databases
-
-
Revesz, P.1
-
43
-
-
0001821002
-
Constraint databases: A survey
-
Semantics in Databases, of, Springer
-
P. Z. Revesz. Constraint databases: A survey. In Semantics in Databases, volume 1358 of Lecture Notes in Computer Science, pages 209-246. Springer, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.1358
, pp. 209-246
-
-
Revesz, P.Z.1
-
44
-
-
35048819863
-
-
R. L. Rivest and B. Lampson. SDSI - A simple distributed security infrastructure, August 1996. See http://theory.lcs.mit.edu/~rivest/sdsi10.ps.
-
R. L. Rivest and B. Lampson. SDSI - A simple distributed security infrastructure, August 1996. See http://theory.lcs.mit.edu/~rivest/sdsi10.ps.
-
-
-
-
45
-
-
85034427623
-
OLD resolution with tabulation
-
New York, NY, USA, Springer-Verlag New York, Inc
-
H. Tamaki and T. Sato. OLD resolution with tabulation. In Proceedings on Third international conference on logic programming, pages 84-98, New York, NY, USA, 1986. Springer-Verlag New York, Inc.
-
(1986)
Proceedings on Third international conference on logic programming
, pp. 84-98
-
-
Tamaki, H.1
Sato, T.2
-
46
-
-
0242453160
-
Memoing evaluation for constraint extensions of Datalog
-
D. Toman. Memoing evaluation for constraint extensions of Datalog. Constraints, 2(3/4):337-359, 1997.
-
(1997)
Constraints
, vol.2
, Issue.3-4
, pp. 337-359
-
-
Toman, D.1
-
47
-
-
0038842147
-
Assigning an appropriate meaning to database logic with negation
-
H. Yamada, Y. Kambayashi, and S. Ohta, editors, World Scientific Press
-
J. D. Ullman. Assigning an appropriate meaning to database logic with negation. In H. Yamada, Y. Kambayashi, and S. Ohta, editors, Computers as Our Better Partners, pages 216-225. World Scientific Press, 1994.
-
(1994)
Computers as Our Better Partners
, pp. 216-225
-
-
Ullman, J.D.1
-
49
-
-
35048821348
-
-
V. Welch, I. Foster, T. Scavo, F. Siebenlist, and C. Catlett. Scaling TeraGrid access: A roadmap for attribute-based authorization for a large cyberinfrastructure (draft August 24). 2006. http://gridshib.globus.org/docs/tg- paper/TG-Attribute-Authz-Roadmap-draft-aug24.pdf.
-
V. Welch, I. Foster, T. Scavo, F. Siebenlist, and C. Catlett. Scaling TeraGrid access: A roadmap for attribute-based authorization for a large cyberinfrastructure (draft August 24). 2006. http://gridshib.globus.org/docs/tg- paper/TG-Attribute-Authz-Roadmap-draft-aug24.pdf.
-
-
-
-
50
-
-
84942318236
-
Security for grid services
-
V. Welch, F. Siebenlist, I. Foster, J. Bresnahan, K. Czajkowski, J. Gawor, C. Kesselman, S. Meder, L. Pearlman, and S. Tuecke. Security for grid services. In HPDC '03: Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing (HPDC'03), page 48, 2003.
-
(2003)
HPDC '03: Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing (HPDC'03)
, pp. 48
-
-
Welch, V.1
Siebenlist, F.2
Foster, I.3
Bresnahan, J.4
Czajkowski, K.5
Gawor, J.6
Kesselman, C.7
Meder, S.8
Pearlman, L.9
Tuecke, S.10
|