-
1
-
-
0016949746
-
A lattice model of secure information flow
-
Denning, D.E.: A lattice model of secure information flow. Communications of the ACM 19 (1976) 236-243
-
(1976)
Communications of the ACM
, vol.19
, pp. 236-243
-
-
Denning, D.E.1
-
2
-
-
0003282331
-
A practical alternative to hierarchical integrity policies
-
Gaithersburg, MD
-
Boebert, W.E., Kain, R.: A practical alternative to hierarchical integrity policies. In: 8th National Computer Security Conference, Gaithersburg, MD (1985) 18-27
-
(1985)
8th National Computer Security Conference
, pp. 18-27
-
-
Boebert, W.E.1
Kain, R.2
-
8
-
-
84944079173
-
Safety analysis of the dynamic-typed access matrix model
-
Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M., eds.: 6th European Symposium on Research in Computer Security (ESORICS 2000). Toulouse, France, Springer-Verlag
-
Soshi, M.: Safety analysis of the dynamic-typed access matrix model. In Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M., eds.: 6th European Symposium on Research in Computer Security (ESORICS 2000). Volume 1895 of Lecture Notes in Computer Science., Toulouse, France, Springer-Verlag (2000) 106-121
-
(2000)
Lecture Notes in Computer Science
, vol.1895
, pp. 106-121
-
-
Soshi, M.1
-
10
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer 29 (1996) 38-47
-
(1996)
IEEE Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
11
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
Sandhu, R., Bhamidipati, V., Munawer, Q.: The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security 2 (1999) 105-135
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
13
-
-
3543134498
-
-
PhD thesis, Birkbeck College, Univ. of London, UK
-
Crampton, J.: Authorizations and Antichians. PhD thesis, Birkbeck College, Univ. of London, UK (2002)
-
(2002)
Authorizations and Antichians
-
-
Crampton, J.1
-
15
-
-
0034447078
-
An access control model for simplifying constraint expression
-
Jajodia, S., Samarati, P., eds.: N.Y., ACM Press
-
Tidswell, J., Jaeger, T.: An access control model for simplifying constraint expression. In Jajodia, S., Samarati, P., eds.: Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS-00), N.Y., ACM Press (2000) 154-163
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS-00)
, pp. 154-163
-
-
Tidswell, J.1
Jaeger, T.2
-
17
-
-
85008430937
-
A graph-based formalism for RBAC
-
Koch, M., Mancini, L.V., Parisi-Presicce, F.: A graph-based formalism for RBAC. ACM Transactions on Information and System Security (TISSEC) 5 (2002) 332-365
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, pp. 332-365
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
18
-
-
84957011508
-
Decidability of safety in graph-based models for access control
-
ESORICS: European Symposium on Research in Computer Security, Springer-Verlag
-
Koch, Mancini, Parisi-Presicce: Decidability of safety in graph-based models for access control. In: ESORICS: European Symposium on Research in Computer Security, LNCS, Springer-Verlag (2002) 229-243
-
(2002)
LNCS
, pp. 229-243
-
-
Koch1
Mancini2
Parisi-Presicce3
-
19
-
-
3543115068
-
A layered design of discretionary access controls with decidable properties
-
IEEE
-
Solworth, J.A., Sloan, R.H.: A layered design of discretionary access controls with decidable properties. In: Security and Privacy 2004, IEEE (2004) 56-67
-
(2004)
Security and Privacy 2004
, pp. 56-67
-
-
Solworth, J.A.1
Sloan, R.H.2
-
21
-
-
0029706405
-
A security model of dynamic labeling providing a tiered approach to verification
-
Oakland, California, IEEE Computer Society Press
-
Foley, S., Gong, L., Qian, X.: A security model of dynamic labeling providing a tiered approach to verification. In: IEEE Symposium on Security and Privacy, Oakland, California, IEEE Computer Society Press (1996) 142-154
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 142-154
-
-
Foley, S.1
Gong, L.2
Qian, X.3
|