-
1
-
-
84966641558
-
A guide to understanding discretionary access control in trusted systems, Report NCSC-TG-003
-
National Computer Security Center, 30 September
-
National Computer Security Center. A guide to understanding discretionary access control in trusted systems, Report NCSC-TG-003, Version 1, 30 September 1987.
-
(1987)
Version
, vol.1
-
-
-
2
-
-
37349104989
-
-
OASIS eXtensible Access Control Markup Language (XACML). http://www.oasis-open.org/committees/xacml/, 2005.
-
OASIS eXtensible Access Control Markup Language (XACML). http://www.oasis-open.org/committees/xacml/, 2005.
-
-
-
-
5
-
-
37349057530
-
-
A. Anderson. XACML profile for role based access control (RBAC). OASIS Committee Draft 01, February 2004.
-
A. Anderson. XACML profile for role based access control (RBAC). OASIS Committee Draft 01, February 2004.
-
-
-
-
9
-
-
0037565605
-
Multi-terminal binary decision diagrams: An efficient data structure for matrix representation
-
E. Clarke, M. Fujita, P. McGeer, J. Yang, and X. Zhao. Multi-terminal binary decision diagrams: An efficient data structure for matrix representation. In Proc. International Workshop on Logic Synthesis, 1993.
-
(1993)
Proc. International Workshop on Logic Synthesis
-
-
Clarke, E.1
Fujita, M.2
McGeer, P.3
Yang, J.4
Zhao, X.5
-
10
-
-
84944048132
-
The Ponder policy specification language
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder policy specification language. In Proc. International Workshop on Policies for Distributed Systems and Networks, pages 18-38, 2001.
-
(2001)
Proc. International Workshop on Policies for Distributed Systems and Networks
, pp. 18-38
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
11
-
-
0017959155
-
Hints on test data selection: Help for the practicing programmer
-
April
-
R. A. DeMillo, R. J. Lipton, and F. G. Sayward. Hints on test data selection: Help for the practicing programmer. IEEE Computer, 11(4):34-41, April 1978.
-
(1978)
IEEE Computer
, vol.11
, Issue.4
, pp. 34-41
-
-
DeMillo, R.A.1
Lipton, R.J.2
Sayward, F.G.3
-
13
-
-
0035994661
-
DrScheme: A Progamming Environment for Scheme
-
March
-
R. B. Findler, J. Clements, M. F. Cormac Flanagan, S. Krishnamurthi, P. Steckler, and M. Felleisen. DrScheme: A Progamming Environment for Scheme. Journal of Functional Programming, 12(2): 159-182, March 2002.
-
(2002)
Journal of Functional Programming
, vol.12
, Issue.2
, pp. 159-182
-
-
Findler, R.B.1
Clements, J.2
Cormac Flanagan, M.F.3
Krishnamurthi, S.4
Steckler, P.5
Felleisen, M.6
-
14
-
-
33244470893
-
Verification and change-impact analysis of access-control policies
-
K. Fisler, S. Krishnamurthi, L. A. Meyerovich, and M. C. Tschantz. Verification and change-impact analysis of access-control policies. In Proc. 27th International Conference on Software Engineering, pages 196-205, 2005.
-
(2005)
Proc. 27th International Conference on Software Engineering
, pp. 196-205
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.A.3
Tschantz, M.C.4
-
15
-
-
33947625881
-
Assessment of access control systems
-
7316, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, September
-
V. C. Hu, D. F. Ferraiolo, and D. R. Kuhn. Assessment of access control systems. Interagency Report 7316, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, September 2006.
-
(2006)
Interagency Report
-
-
Hu, V.C.1
Ferraiolo, D.F.2
Kuhn, D.R.3
-
19
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino. A unified framework for enforcing multiple access control policies. In Proc. ACM SIGMOD International Conference on Management of Data, pages 474-485, 1997.
-
(1997)
Proc. ACM SIGMOD International Conference on Management of Data
, pp. 474-485
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
Bertino, E.4
-
21
-
-
0033333334
-
Conflict in policy-based distributed systems management
-
E. C. Lupu and M. Sloman. Conflict in policy-based distributed systems management. IEEE Transaction on Software Engineering, 25(6):852-869, 1999.
-
(1999)
IEEE Transaction on Software Engineering
, vol.25
, Issue.6
, pp. 852-869
-
-
Lupu, E.C.1
Sloman, M.2
-
26
-
-
0037392527
-
Standards for XML and web services security
-
M. Naedele. Standards for XML and web services security. Computer, 36(4):96-98, 2003.
-
(2003)
Computer
, vol.36
, Issue.4
, pp. 96-98
-
-
Naedele, M.1
|