-
2
-
-
0242709308
-
Static verification of security requirements in role based CSCW systems
-
Como, Italy, Jun
-
T. Ahmed and A.R. Tripathi, Static verification of security requirements in role based CSCW systems, in: SACMAT'03, Como, Italy, Jun 2003.
-
(2003)
SACMAT'03
-
-
Ahmed, T.1
Tripathi, A.R.2
-
3
-
-
0042886434
-
-
The manual and the model checker can be obtained from
-
R. Alur, L. deAlfaro, T.A. Henzinger, S.C. Krishnan, F.Y.C. Mang, S. Qadeer, S.K. Rajamani and S. Tasiran, Mocha User Manual, The manual and the model checker can be obtained from http://www.eecs.berkeley.edu/-mocha
-
Mocha User Manual
-
-
Alur, R.1
deAlfaro, L.2
Henzinger, T.A.3
Krishnan, S.C.4
Mang, F.Y.C.5
Qadeer, S.6
Rajamani, S.K.7
Tasiran, S.8
-
4
-
-
84949185739
-
Alternating-time temporal logic
-
Compositionality -The Significant Difference, Springer-Verlag
-
R. Alur, T.A. Henzinger and O. Kupferman, Alternating-time temporal logic, in: Compositionality -The Significant Difference, LNCS 1536, Springer-Verlag, 1999, pp. 23-60.
-
(1999)
LNCS
, vol.1536
, pp. 23-60
-
-
Alur, R.1
Henzinger, T.A.2
Kupferman, O.3
-
5
-
-
0035790651
-
A model of OASIS role-based access control and its support for active security
-
Chantilly, VA, USA, ACM Press
-
J. Bacon, K. Moody and W. Yao, A model of OASIS role-based access control and its support for active security, in: 6th ACM symposium on Access control models and technologies, Chantilly, VA, USA, ACM Press, 2001, pp. 171-181.
-
(2001)
6th ACM symposium on Access control models and technologies
, pp. 171-181
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
8
-
-
33847692450
-
-
This document and the model checker can be obtained from
-
R. Cavada, A. Cimatti, E. Olivetti, G. Keighren, M. Pistore and M. Roveri, NuSMV 2.2 User Manual, 2005. This document and the model checker can be obtained from http://nusmv.irst.itc.it
-
(2005)
NuSMV 2.2 User Manual
-
-
Cavada, R.1
Cimatti, A.2
Olivetti, E.3
Keighren, G.4
Pistore, M.5
Roveri, M.6
-
9
-
-
84958776545
-
Optimal implementation of conjunctive queries in relational data bases
-
Boulder, CO, USA, ACM Press
-
A.K. Chandra and P.M. Merlin, Optimal implementation of conjunctive queries in relational data bases, in: 9th Annual ACM Symposium on Theory of Computing, Boulder, CO, USA, ACM Press, 1977, pp. 77-90.
-
(1977)
9th Annual ACM Symposium on Theory of Computing
, pp. 77-90
-
-
Chandra, A.K.1
Merlin, P.M.2
-
10
-
-
0036079901
-
Improving computer security using extended static checking
-
B. Chess, Improving computer security using extended static checking, in: 2002 IEEE Symposium on Security and Privacy, Washington, DC, USA, IEEE Computer Society, 2002.
-
(2002)
2002 IEEE Symposium on Security and Privacy, Washington, DC, USA, IEEE Computer Society
-
-
Chess, B.1
-
11
-
-
4243189286
-
Counterexample guided abstraction refinement for symbolic model checking
-
E. Clarke, O. Grumberg, S. Jha, Y. Lu and H. Veith, Counterexample guided abstraction refinement for symbolic model checking, Journal of the ACM (JACM) 50 (2003), 752-794.
-
(2003)
Journal of the ACM (JACM)
, vol.50
, pp. 752-794
-
-
Clarke, E.1
Grumberg, O.2
Jha, S.3
Lu, Y.4
Veith, H.5
-
13
-
-
0001449325
-
Temporal and modal logic
-
MIT Press, Cambridge, MA, USA
-
E.A. Emerson, Temporal and modal logic, in: Handbook of Theoretical Computer Science (vol. B): Formal Models and Semantics, MIT Press, Cambridge, MA, USA, 1991, pp. 995-1072.
-
(1991)
Handbook of Theoretical Computer Science (vol. B): Formal Models and Semantics
, pp. 995-1072
-
-
Emerson, E.A.1
-
14
-
-
33244470893
-
Verification and change-impact analysis of access-control policies
-
St. Louis, Missouri, USA, May
-
K. Fisler, S. Krishnamurthi, L.A. Meyerovich and M.C. Tschantz, Verification and change-impact analysis of access-control policies, in: ICSE'05, St. Louis, Missouri, USA, May 2005.
-
(2005)
ICSE'05
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.A.3
Tschantz, M.C.4
-
15
-
-
85036962452
-
-
S. Godik and X Moses, extensible Access Control Markup Language, OASIS committee, 1.1 edition, Aug 2003, Committee specification.
-
S. Godik and X Moses, extensible Access Control Markup Language, OASIS committee, 1.1 edition, Aug 2003, Committee specification.
-
-
-
-
16
-
-
24644452174
-
Model-checking access control policies
-
7th Information Security Conference ISC'04, Springer-Verlag
-
D.P. Guelev, M.D. Ryan, and P.-Y. Schobbens, Model-checking access control policies, in: 7th Information Security Conference (ISC'04), Lecture Notes in Computer Science, Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
-
-
Guelev, D.P.1
Ryan, M.D.2
Schobbens, P.-Y.3
-
20
-
-
0003524414
-
Verification by model checking
-
Cambridge University Press, 2nd edition, Chapter 3
-
M.R.A. Huth and M.D. Ryan, Verification by model checking, in: Logic in Computer Science: Modelling and Reasoning about Systems, Cambridge University Press, 2nd edition, 2004, pp. 172-255, Chapter 3.
-
(2004)
Logic in Computer Science: Modelling and Reasoning about Systems
, pp. 172-255
-
-
Huth, M.R.A.1
Ryan, M.D.2
-
21
-
-
84952010134
-
Binary decision diagrams
-
Cambridge University Press, 2nd edition, Chapter 6
-
M.R.A. Huth and M.D. Ryan, Binary decision diagrams, in: Logic in Computer Science: Modelling and Reasoning about Systems, Cambridge University Press, 2nd edition, 2004, pp. 358-413, Chapter 6.
-
(2004)
Logic in Computer Science: Modelling and Reasoning about Systems
, pp. 358-413
-
-
Huth, M.R.A.1
Ryan, M.D.2
-
23
-
-
18744382646
-
-
Software Design Group, MIT Lab for Computer Science, Feb, This document and the tool can be obtained from
-
D. Jackson, Micromodels of Software: Lightweight Modelling and Analysis with Alloy, Software Design Group, MIT Lab for Computer Science, Feb 2002. This document and the tool can be obtained from http://alloy.mit.edu/
-
(2002)
Micromodels of Software: Lightweight Modelling and Analysis with Alloy
-
-
Jackson, D.1
-
24
-
-
0003278892
-
On the characterisation of law and computer systems: The normative systems perspective
-
J. Meyer and R. Wieringa, eds, Wiley
-
A. Jones and M. Sergot, On the characterisation of law and computer systems: The normative systems perspective, in: J. Meyer and R. Wieringa, eds, Deontic Logic in Computer Science. Normative system Specification, Wiley, 1993, pp. 275-307.
-
(1993)
Deontic Logic in Computer Science. Normative system Specification
, pp. 275-307
-
-
Jones, A.1
Sergot, M.2
-
25
-
-
0003581143
-
-
PhD thesis, School of Computer Science, Carnegie Mellon University
-
K.L. McMillan, Symbolic model checking, PhD thesis, School of Computer Science, Carnegie Mellon University, 1993.
-
(1993)
Symbolic model checking
-
-
McMillan, K.L.1
-
27
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
R. Sandhu, V. Bhamidipati and Q. Munawer, The ARBAC97 model for role-based administration of roles, ACM Transactions on Information and System Security 2(1) (1999), 105-135.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
28
-
-
0030086382
-
Role-based access control models
-
R. Sandhu, E. Coyne, H. Feinstein and C. Youman, Role-based access control models, IEEE Computer 29(2) (1996), 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
29
-
-
0242625217
-
A lightweight approach to specification and analysis of role-based access control extensions
-
Monterey, California, USA, Jun
-
A. Schaad and J. Moffett, A lightweight approach to specification and analysis of role-based access control extensions, in: SACMAT'02, Monterey, California, USA, Jun 2002.
-
(2002)
SACMAT'02
-
-
Schaad, A.1
Moffett, J.2
-
30
-
-
85036978895
-
-
Aug, Information about Ulis implementation can be found at
-
Sun Microsystems, Sun's XACML implementation, Aug 2003. Information about Ulis implementation can be found at http://sunxacml.sourceforge.net/
-
(2003)
Sun Microsystems, Sun's XACML implementation
-
-
-
31
-
-
33645977306
-
-
Information about Ulis implementation can be found at
-
J. Whaley, JavaBDD: Java BDD implementation, 2004. Information about Ulis implementation can be found at http://javabdd.sourceforge.net/
-
(2004)
JavaBDD: Java BDD implementation
-
-
Whaley, J.1
-
33
-
-
85036970482
-
-
N. Zhang, AcPeg, the access control policy evaluator and generator, July 2006, The tool can. be obtained from www.cs.bham.ac.uk/~nxz or www.cs.bham.ac.uk/~mdr/research/projects/05-AccessControl
-
N. Zhang, AcPeg, the access control policy evaluator and generator, July 2006, The tool can. be obtained from www.cs.bham.ac.uk/~nxz or www.cs.bham.ac.uk/~mdr/research/projects/05-AccessControl
-
-
-
-
34
-
-
20444450640
-
Synthesising verified access control systems in XACML
-
Washington DC, USA, Oct, ACM Press, pp
-
N. Zhang, M. Ryan and D.P. Guelev, Synthesising verified access control systems in XACML, in: 2004 ACM Workshop on Formal Methods in Security Engineering, Washington DC, USA, Oct 2004, ACM Press, pp. 56-65.
-
(2004)
2004 ACM Workshop on Formal Methods in Security Engineering
, pp. 56-65
-
-
Zhang, N.1
Ryan, M.2
Guelev, D.P.3
-
35
-
-
33645964601
-
Evaluating access control policies through model-checking
-
Singapore, Sep, Springer-Verlag
-
N. Zhang, M.D. Ryan and D.P. Guelev, Evaluating access control policies through model-checking, in: 8th Information Security Conference (ISC'05), Singapore, Sep 2005, Springer-Verlag, 2005.
-
(2005)
8th Information Security Conference (ISC'05)
-
-
Zhang, N.1
Ryan, M.D.2
Guelev, D.P.3
|