-
2
-
-
3042601656
-
Protocol analysis in intrusion detection using decision tree
-
Abbes, T., Bouhoula, A., Rusinowitch, M.: Protocol analysis in intrusion detection using decision tree. In: Proc. ITCC'04, pp. 404-408 (2004)
-
(2004)
Proc. ITCC'04
, pp. 404-408
-
-
Abbes, T.1
Bouhoula, A.2
Rusinowitch, M.3
-
3
-
-
0037999031
-
-
Abendroth, J., Jensen, C.: A unified security mechanism for networked applications. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, 3006, pp. 351-357. Springer, Heidelberg (2004)
-
Abendroth, J., Jensen, C.: A unified security mechanism for networked applications. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 351-357. Springer, Heidelberg (2004)
-
-
-
-
5
-
-
84865788031
-
A model of OASIS RBAC and its support for active security
-
Bacon, J., Moody, K., Yao, W.: A model of OASIS RBAC and its support for active security. TISSEC 5(4), 492-540 (2002)
-
(2002)
TISSEC
, vol.5
, Issue.4
, pp. 492-540
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
7
-
-
33746684330
-
Term rewriting for access control
-
Damiani, E, Liu, P, eds, Data and Applications Security XX, Springer, Heidelberg
-
Barker, S., Fernández, M.: Term rewriting for access control. In: Damiani, E., Liu, P. (eds.) Data and Applications Security XX. LNCS, vol. 4127, Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4127
-
-
Barker, S.1
Fernández, M.2
-
8
-
-
3042584122
-
Flexible access control policy specification with constraint logic programming
-
Barker, S., Stuckey, P.: Flexible access control policy specification with constraint logic programming. ACM Trans. on Information and System Security 6(4), 501-546 (2003)
-
(2003)
ACM Trans. on Information and System Security
, vol.6
, Issue.4
, pp. 501-546
-
-
Barker, S.1
Stuckey, P.2
-
9
-
-
37849007125
-
-
Barthe, G., Dufay, G., Huisman, M., de Sousa, S.M.: Jakarta: a toolset to reason about the JavaCard platform. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, 2140, Springer, Heidelberg (2001)
-
Barthe, G., Dufay, G., Huisman, M., de Sousa, S.M.: Jakarta: a toolset to reason about the JavaCard platform. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, Springer, Heidelberg (2001)
-
-
-
-
11
-
-
0032153903
-
An access control model supporting periodicity constraints and temporal reasoning
-
Bertino, E., Bettini, C., Ferrari, E., Samarati, P.: An access control model supporting periodicity constraints and temporal reasoning. ACM TODS 23(3), 231-285 (1998)
-
(1998)
ACM TODS
, vol.23
, Issue.3
, pp. 231-285
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
12
-
-
0033645572
-
TRBAC: A temporal role-based access control model
-
ACM Press, New York
-
Bertino, E., Bonatti, P., Ferrari, E.: TRBAC: A temporal role-based access control model. In: Proc. 5th ACM Workshop on Role-Based Access Control, pp. 21-30. ACM Press, New York (2000)
-
(2000)
Proc. 5th ACM Workshop on Role-Based Access Control
, pp. 21-30
-
-
Bertino, E.1
Bonatti, P.2
Ferrari, E.3
-
13
-
-
0242504426
-
-
Addison-Wesley, Reading
-
Bertino, E., Catania, B., Zarri, G.: Intelligent Database Systems. Addison-Wesley, Reading (2001)
-
(2001)
Intelligent Database Systems
-
-
Bertino, E.1
Catania, B.2
Zarri, G.3
-
14
-
-
0037190147
-
-
Borovansky, P., Kirchner, C., Kirchner, H., Moreau, P-E.: ELAN from a rewriting logic point of view. TCS 285, 155-185 (2002)
-
(2002)
ELAN from a rewriting logic point of view
, vol.TCS 285
, pp. 155-185
-
-
Borovansky, P.1
Kirchner, C.2
Kirchner, H.3
Moreau, P.-E.4
-
15
-
-
84928563923
-
-
Clavel, M., Durán, F., Eker, S., Lincoln, P., Martí-Oliet, N., Meseguer, J., Talcott, C.: The Maude 2.0 system. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, 2706, pp. 76-87. Springer, Heidelberg (2003)
-
Clavel, M., Durán, F., Eker, S., Lincoln, P., Martí-Oliet, N., Meseguer, J., Talcott, C.: The Maude 2.0 system. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, vol. 2706, pp. 76-87. Springer, Heidelberg (2003)
-
-
-
-
16
-
-
37849029876
-
-
Dershowitz, N., Jouannaud, J.-P.: Rewrite Systems. In: van Leeuwen, J. (ed.) Handbook of Theoretical Computer Science: Formal Methods and Semantics, B, North-Holland, Amsterdam (1989)
-
Dershowitz, N., Jouannaud, J.-P.: Rewrite Systems. In: van Leeuwen, J. (ed.) Handbook of Theoretical Computer Science: Formal Methods and Semantics, vol. B, North-Holland, Amsterdam (1989)
-
-
-
-
17
-
-
0036083264
-
Binder, a logic-based security language
-
IEEE Computer Society Press, Los Alamitos
-
De Treville, J.: Binder, a logic-based security language. In: Proc. IEEE Symposium on Security and Privacy, pp. 105-113. IEEE Computer Society Press, Los Alamitos (2002)
-
(2002)
Proc. IEEE Symposium on Security and Privacy
, pp. 105-113
-
-
De Treville, J.1
-
18
-
-
33746103319
-
Security policy in a declarative style
-
ACM Press, New York
-
Echahed, R., Prost, F.: Security policy in a declarative style. In: Proc. PPDP'05, ACM Press, New York (2005)
-
(2005)
Proc. PPDP'05
-
-
Echahed, R.1
Prost, F.2
-
19
-
-
84947939145
-
Modular termination of term rewriting systems revisited
-
Reggio, G, Astesiano, E, Tarlecki, A, eds, Recent Trends in Data Type Specification, Springer, Heidelberg
-
Fernández, M., Jouannaud, J.-P.: Modular termination of term rewriting systems revisited. In: Reggio, G., Astesiano, E., Tarlecki, A. (eds.) Recent Trends in Data Type Specification. LNCS, vol. 906, Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.906
-
-
Fernández, M.1
Jouannaud, J.-P.2
-
20
-
-
0001619596
-
Flexible support for multiple access control policies
-
Jajodia, S., Samarati, P., Sapino, M., Subrahmaninan, V.S.: Flexible support for multiple access control policies. ACM TODS 26(2), 214-260 (2001)
-
(2001)
ACM TODS
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.3
Subrahmaninan, V.S.4
-
21
-
-
0034829512
-
SD3: A trust management system with certified evaluation
-
IEEE Computer Society Press, Los Alamitos
-
Jim, T.: SD3: A trust management system with certified evaluation. In: IEEE Symp. Security and Privacy, pp. 106-115. IEEE Computer Society Press, Los Alamitos (2001)
-
(2001)
IEEE Symp. Security and Privacy
, pp. 106-115
-
-
Jim, T.1
-
22
-
-
37849000194
-
ELAN user manual. Nancy (France)
-
Technical Report 95-R-342, CRIN
-
Kirchner, C., Kirchner, H., Vittek, M.: ELAN user manual. Nancy (France), Technical Report 95-R-342, CRIN (1995)
-
(1995)
-
-
Kirchner, C.1
Kirchner, H.2
Vittek, M.3
-
23
-
-
0001834942
-
Term Rewriting Systems
-
Abramsky, S, Gabbay, D.M, Maibaum, T.S.E, eds, Oxford University Press, Oxford
-
Klop, J.-W.: Term Rewriting Systems. In: Abramsky, S., Gabbay, D.M., Maibaum, T.S.E. (eds.) Handbook of Logic in Computer Science, vol. 2, Oxford University Press, Oxford (1992)
-
(1992)
Handbook of Logic in Computer Science
, vol.2
-
-
Klop, J.-W.1
-
24
-
-
0027910814
-
-
Klop, J.-W., van Oostrom, V., van Raamsdonk, F.: Combinatory reduction systems, introduction and survey. TCS 121, 279-308 (1993)
-
(1993)
Combinatory reduction systems, introduction and survey
, vol.TCS 121
, pp. 279-308
-
-
Klop, J.-W.1
van Oostrom, V.2
van Raamsdonk, F.3
-
25
-
-
33746744130
-
A graph based formalism for rbac
-
Koch, M., Mancini, L., Parisi-Presicce, F.: A graph based formalism for rbac. In: Proc. SACMAT'04, pp. 129-187 (2004)
-
(2004)
Proc. SACMAT'04
, pp. 129-187
-
-
Koch, M.1
Mancini, L.2
Parisi-Presicce, F.3
-
27
-
-
0000187751
-
On theories with a combinatorial definition of equivalence
-
Newman, M.H.A.: On theories with a combinatorial definition of equivalence. Annals of Mathematics 43(2), 223-243 (1942)
-
(1942)
Annals of Mathematics
, vol.43
, Issue.2
, pp. 223-243
-
-
Newman, M.H.A.1
-
28
-
-
0030086382
-
Role-based access control models
-
Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Computer 29(2), 38-47 (1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
29
-
-
34250823438
-
Rewriting-based access control policies
-
Elsevier, Amsterdam
-
de Oliveira, A.S.: Rewriting-based access control policies. In: Proc. of SECRET'06. ENTCS, Elsevier, Amsterdam (2007)
-
(2007)
Proc. of SECRET'06. ENTCS
-
-
de Oliveira, A.S.1
-
31
-
-
37849004117
-
-
The XSB System Version 2.7.1, Programmer's Manual (2005)
-
The XSB System Version 2.7.1, Programmer's Manual (2005)
-
-
-
|