-
1
-
-
3042673453
-
Role Locks to Prevent Illegal Information Flow among Objects
-
Fukuoka, Japan, 29-31 March
-
Chon, R., Enokido, T., Wietrzsk, V.: Role Locks to Prevent Illegal Information Flow among Objects. In: 18th International Conference on Advanced Information Networking and Applications (AINA'04), Fukuoka, Japan, 29-31 March, 2004, vol. 1, pp. 196-201 (2004)
-
(2004)
18th International Conference on Advanced Information Networking and Applications (AINA'04)
, vol.1
, pp. 196-201
-
-
Chon, R.1
Enokido, T.2
Wietrzsk, V.3
-
2
-
-
14944384797
-
Security Through Aspect-Oriented Programming
-
Leuven, Belgium, November, Kluwer Academic Publishers, Boston
-
De Win, B., Vanhaute, B., Decker, B.: Security Through Aspect-Oriented Programming. In Advances in Network and Distributed Systems Security. IFIP TC11 WG11.4 First Working Conference on Network Security, Leuven, Belgium, November 2001, pp. 125-138. Kluwer Academic Publishers, Boston (2001)
-
(2001)
Advances in Network and Distributed Systems Security. IFIP TC11 WG11.4 First Working Conference on Network Security
, pp. 125-138
-
-
De Win, B.1
Vanhaute, B.2
Decker, B.3
-
3
-
-
84958155705
-
Security Models for Trusting Network Appliances
-
Liverpool, England
-
English, C., Nixon, P., Terzis, S., McGettrick, A., Lowe, H.: Security Models for Trusting Network Appliances. In: 5th Annual Workshop on Networked Appliances, October 2002, Liverpool, England (2002)
-
(2002)
5th Annual Workshop on Networked Appliances, October
-
-
English, C.1
Nixon, P.2
Terzis, S.3
McGettrick, A.4
Lowe, H.5
-
5
-
-
37249088652
-
-
Hong, J.I., Landay, J.A.: MobiSys' 04, Boston, Massachusetts, USA, pp. 177-189 (2004)
-
Hong, J.I., Landay, J.A.: MobiSys' 04, Boston, Massachusetts, USA, pp. 177-189 (2004)
-
-
-
-
6
-
-
0013090042
-
Getting Started with AspectJ
-
Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J.: Getting Started with AspectJ. Communications of the ACM 44(10), 59-65 (2001)
-
(2001)
Communications of the ACM
, vol.44
, Issue.10
, pp. 59-65
-
-
Kiczales, G.1
Hilsdale, E.2
Hugunin, J.3
Kersten, M.4
Palm, J.5
-
7
-
-
84856007625
-
Fine-Granularity Access Control in 3-tier Laboratory Information Systems
-
Montreal, Canada, 25-27 July
-
Li, X., Naeem, N.A., Kemme, B.: Fine-Granularity Access Control in 3-tier Laboratory Information Systems. In: Database Engineering and Application Symposium, IDEAS, Montreal, Canada, 25-27 July, 2005, pp. 391-397 (2005)
-
(2005)
Database Engineering and Application Symposium, IDEAS
, pp. 391-397
-
-
Li, X.1
Naeem, N.A.2
Kemme, B.3
-
8
-
-
0004198635
-
-
2nd edn. Prentice Hall, United States of America
-
Pfleeger, C.P.: Security in Computing, 2nd edn. Prentice Hall, United States of America (1997)
-
(1997)
Security in Computing
-
-
Pfleeger, C.P.1
-
9
-
-
0033489645
-
Optimistic Security: A New Access Control Paradigm
-
Ontario, Canada
-
Povey, D.: Optimistic Security: A New Access Control Paradigm. In: Proceedings of the 1999 workshop on New security paradigms, September 22-24, 1999, Caledon Hills, Ontario, Canada (1999)
-
(1999)
Proceedings of the 1999 workshop on New security paradigms, September 22-24, 1999, Caledon Hills
-
-
Povey, D.1
-
10
-
-
37249021152
-
-
Telemedicine Research Center, University of South Australia
-
Pudney, P.: e-Consent in consumer health & telemedicine. Telemedicine Research Center, University of South Australia (2003), http://www.pudney.net. au/ phillip/papers/ econsent.pdf
-
(2003)
e-Consent in consumer health & telemedicine
-
-
Pudney, P.1
-
11
-
-
83255183340
-
AspectJ for Multilevel Security
-
March
-
Ramachandran, R., Pearce, D.J., Welch, I.: AspectJ for Multilevel Security. In: The 5th AOSD Workshop on Aspects, Components, and Patterns for Infrastructure Software (ACP4IS), Bonn, Germany, 21 March, 2006, pp. 1-5 (2006)
-
(2006)
The 5th AOSD Workshop on Aspects, Components, and Patterns for Infrastructure Software (ACP4IS), Bonn, Germany, 21
, pp. 1-5
-
-
Ramachandran, R.1
Pearce, D.J.2
Welch, I.3
-
12
-
-
0003883721
-
-
Sebastopol, O'Reilly and Associate, California
-
Russell, D., Gangemi, G.T.: Computer Security Basics, Sebastopol, O'Reilly and Associate, California (1991)
-
(1991)
Computer Security Basics
-
-
Russell, D.1
Gangemi, G.T.2
-
13
-
-
0031185890
-
Information Flow Control in Object-Oriented Systems
-
Samarati, P., Bertino, E., Ciampichetti, A., Jajodia, S.: Information Flow Control in Object-Oriented Systems. IEEE Transactions on Knowledge and Data Engineering 9(4), 624-538 (1997)
-
(1997)
IEEE Transactions on Knowledge and Data Engineering
, vol.9
, Issue.4
, pp. 624-538
-
-
Samarati, P.1
Bertino, E.2
Ciampichetti, A.3
Jajodia, S.4
-
14
-
-
35248873795
-
Usage Control: A Vision for Next Generation Access Control
-
St Petersburg, Russia, pp
-
Sandhu, R., Park, J.: Usage Control: A Vision for Next Generation Access Control. In: The Second International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, St Petersburg, Russia, pp. 17-31 (2003)
-
(2003)
The Second International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security
, pp. 17-31
-
-
Sandhu, R.1
Park, J.2
-
15
-
-
0030086382
-
Role-Based Access Control Models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE COMPUTER 29(2), 38-47 (1996)
-
(1996)
IEEE COMPUTER
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
16
-
-
0038336804
-
A New Dimension in Access Control: Studying Maintenance Engineering across Organizational Boundaries
-
New Orleans, Louisiana, USA
-
Stevens, G., Wulf, V.: A New Dimension in Access Control: Studying Maintenance Engineering across Organizational Boundaries. In: Proceedings of the ACM conference on Computer Supported Cooperative Work (CSCW), New Orleans, Louisiana, USA (2002)
-
(2002)
Proceedings of the ACM conference on Computer Supported Cooperative Work (CSCW)
-
-
Stevens, G.1
Wulf, V.2
-
17
-
-
37249022630
-
-
Verhanneman, T., Piessens, F., De Win, B., Joosen, W.: Uniform Application-level Access Control Enforcement of Organizationwide Policies. In: Srikanthan, T., Xue, J., Chang, C.-H. (eds.) ACSAC 2005. LNCS, 3740, Springer, Heidelberg (2005)
-
Verhanneman, T., Piessens, F., De Win, B., Joosen, W.: Uniform Application-level Access Control Enforcement of Organizationwide Policies. In: Srikanthan, T., Xue, J., Chang, C.-H. (eds.) ACSAC 2005. LNCS, vol. 3740, Springer, Heidelberg (2005)
-
-
-
-
18
-
-
0032668892
-
An initial assessment of aspect-oriented programming
-
Los Angeles, California, May
-
Walker, R.J., Baniassad, E.L.A., Murphy, G.C.: An initial assessment of aspect-oriented programming. In: Proceedings of the 21st international conference on Software engineering, Los Angeles, California, May 1999, pp. 120-130 (1999)
-
(1999)
Proceedings of the 21st international conference on Software engineering
, pp. 120-130
-
-
Walker, R.J.1
Baniassad, E.L.A.2
Murphy, G.C.3
-
19
-
-
0142156709
-
-
Xu, Z., Feng, D., Li, L., Chen, H.: UC-RBAC: A Usage Constrained Role-Based Access Control Model. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, 2836, pp. 337-347. Springer, Heidelberg (2003)
-
Xu, Z., Feng, D., Li, L., Chen, H.: UC-RBAC: A Usage Constrained Role-Based Access Control Model. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 337-347. Springer, Heidelberg (2003)
-
-
-
|