-
1
-
-
37849014331
-
-
Gal, A., Atluri, V.: An Authorization Model for temporal Data. ACM Transactions on Information and System Security 5(1) (Feburary 2002)
-
Gal, A., Atluri, V.: An Authorization Model for temporal Data. ACM Transactions on Information and System Security 5(1) (Feburary 2002)
-
-
-
-
2
-
-
0002179618
-
Protection
-
5th Princeton Symposium on Information Science and Systems
-
Lampson, B.W.: Protection. 5th Princeton Symposium on Information Science and Systems, 1971. Reprinted in ACM Operating Systems Review, 8(1), 18-24 (1974)
-
(1971)
Reprinted in ACM Operating Systems Review
, vol.8
, Issue.1
, pp. 18-24
-
-
Lampson, B.W.1
-
3
-
-
0842305607
-
Protection (Security) Models and Policy
-
CRC Press, USA
-
Landwehr, C.: Protection (Security) Models and Policy. In: The Computer Science and Engineering Handbook, pp. 1914-1928. CRC Press, USA (1997)
-
(1997)
The Computer Science and Engineering Handbook
, pp. 1914-1928
-
-
Landwehr, C.1
-
4
-
-
0003400251
-
Secure computer systems: Unified exposition and Multics interpretation
-
Technical Report ESD-TR-75-306, The Mitre Corporation, Bedford, MA March
-
Bell, D.E., Lapadula, L.J.: Secure computer systems: Unified exposition and Multics interpretation. Technical Report ESD-TR-75-306, The Mitre Corporation, Bedford, MA (March 1975)
-
(1975)
-
-
Bell, D.E.1
Lapadula, L.J.2
-
5
-
-
0016949746
-
A lattice Model of secure information flow
-
Denning, D.E.: A lattice Model of secure information flow. Communications of ACM. 19(5), 236-243 (1976)
-
(1976)
Communications of ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
6
-
-
84937399920
-
Issues in discretionary access control
-
In the, IEEE Press, NJ, New York April
-
Downs, D.D., Rub, J.R., Kung, K.C., Jordan, C.S.: Issues in discretionary access control. In: In the proceeding of IEEE Symposium on Research in Security and Privacy, pp. 208-218. IEEE Press, NJ, New York (April 1985)
-
(1985)
proceeding of IEEE Symposium on Research in Security and Privacy
, pp. 208-218
-
-
Downs, D.D.1
Rub, J.R.2
Kung, K.C.3
Jordan, C.S.4
-
7
-
-
37849043394
-
-
Bertino, E., Bettini, C., Samarati, P.: A Temporal Authorization Model. CCS '94, 1/94 Fairfax Va, USA (1994)
-
Bertino, E., Bettini, C., Samarati, P.: A Temporal Authorization Model. CCS '94, 1/94 Fairfax Va, USA (1994)
-
-
-
-
8
-
-
0030087035
-
-
Bertino, E., Bettini, C., Samarati, P.: A Temporal Access Control Mechanism for Database Systems. IEEE Transactions on Knowledge and DataEngineering 8(1) (Feburary 1996)
-
Bertino, E., Bettini, C., Samarati, P.: A Temporal Access Control Mechanism for Database Systems. IEEE Transactions on Knowledge and DataEngineering 8(1) (Feburary 1996)
-
-
-
-
9
-
-
0032153903
-
An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning
-
September
-
Bertino, E., Bettini, C., Ferrari, E., Samarati, P.: An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. ACM Transactionon Database Systems 23(3) (September 1998)
-
(1998)
ACM Transactionon Database Systems
, vol.23
, Issue.3
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
10
-
-
84944792110
-
-
Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A Temporal Role-based Access Control Model. ACM Transactionon on Information and System Security 4(3), 191-233 (2001)
-
Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A Temporal Role-based Access Control Model. ACM Transactionon on Information and System Security 4(3), 191-233 (2001)
-
-
-
-
11
-
-
85034043506
-
Protecting Web Servers from Distributed Denial of Service Attacks
-
10, pp
-
Kargl, F., Maier, J., Weber, M.: Protecting Web Servers from Distributed Denial of Service Attacks. In: Proceedings of WWW '10, pp. 514-525 (2001)
-
(2001)
Proceedings of WWW
, pp. 514-525
-
-
Kargl, F.1
Maier, J.2
Weber, M.3
-
12
-
-
84942812332
-
Protection - Principles and Practice
-
AFIPS Press May 16-18
-
Graham, G.S., Denning, P.J.: Protection - Principles and Practice. In: Proceedings of the AFIPS Srping Joint Computer Conference, vol. 40, pp. 417-429. AFIPS Press (May 16-18, 1972)
-
(1972)
Proceedings of the AFIPS Srping Joint Computer Conference
, vol.40
, pp. 417-429
-
-
Graham, G.S.1
Denning, P.J.2
-
13
-
-
17444406680
-
A Generalized Temporal Role-Based Access Control Model
-
James, B.D., Joshi, E., Bertino, U., Latif, A., Ghafoo, A.: A Generalized Temporal Role-Based Access Control Model. IACM Transactionon on Knoledge and Data Engineering 17(1), 4-23 (2005)
-
(2005)
IACM Transactionon on Knoledge and Data Engineering
, vol.17
, Issue.1
, pp. 4-23
-
-
James, B.D.1
Joshi, E.2
Bertino, U.3
Latif, A.4
Ghafoo, A.5
-
14
-
-
51849131019
-
The Usage Control Model
-
Park, J., Zhang, X., Sandhu, R.: The Usage Control Model. In: ACM Transactions on Information and Systems Security, ACM Press, New York (Feburary 2004)
-
(2004)
ACM Transactions on Information and Systems Security, ACM Press, New York (Feburary
-
-
Park, J.1
Zhang, X.2
Sandhu, R.3
-
15
-
-
37849003766
-
-
Park, J., Zhang, X., Sandhu, R.: Attribute Mutability in Usage Control. IFIP WG 11.3 (November 2004)
-
Park, J., Zhang, X., Sandhu, R.: Attribute Mutability in Usage Control. IFIP WG 11.3 (November 2004)
-
-
-
-
16
-
-
0020849266
-
Maintaining Knowledge about Temporal Intervals
-
November
-
Allen, J.F.: Maintaining Knowledge about Temporal Intervals. Communications of ACM 26 (November 1983)
-
(1983)
Communications of ACM
, vol.26
-
-
Allen, J.F.1
-
17
-
-
37849023074
-
-
March 12
-
Lo, J.: Denial of Service or "Nuke" Attacks (March 12, 2005), http://www.irchelp.org/irchelp/nuke/
-
(2005)
Denial of Service or Nuke
-
-
Lo, J.1
-
18
-
-
37849041329
-
Implementing a Temporal Datatype
-
Technical Report ICS-FORTH/TR-236 November
-
Doerr, M., Yiortsou, A.: Implementing a Temporal Datatype. Technical Report ICS-FORTH/TR-236 (November 1998)
-
(1998)
-
-
Doerr, M.1
Yiortsou, A.2
-
19
-
-
0034450091
-
-
Kudo, M., Hada, S.: XML Document Security based on Provisional Authorization. In: CCS'00, Athens, Greece, ACM Press, New York (2000)
-
Kudo, M., Hada, S.: XML Document Security based on Provisional Authorization. In: CCS'00, Athens, Greece, ACM Press, New York (2000)
-
-
-
-
21
-
-
84976657250
-
An authorization mechanism for a relational database system
-
Griffiths, G.S., Wade, B.W.: An authorization mechanism for a relational database system. ACM Transactions On Database Systems 1(3), 242-255 (1976)
-
(1976)
ACM Transactions On Database Systems
, vol.1
, Issue.3
, pp. 242-255
-
-
Griffiths, G.S.1
Wade, B.W.2
-
25
-
-
2642573551
-
A Compositional Framework for Access Control Policies Enforcement
-
ACM Press, New York
-
Siewe, F., Cau, A., Zedan, H.: A Compositional Framework for Access Control Policies Enforcement. In: Proceeding of the ACM Workshop on Formal Methods in Security Engineering, ACM Press, New York (2003)
-
(2003)
Proceeding of the ACM Workshop on Formal Methods in Security Engineering
-
-
Siewe, F.1
Cau, A.2
Zedan, H.3
-
26
-
-
0030677524
-
A Logical Language for Expressing Authorizations
-
Oakland, California
-
Jajodia, S., Samarati, P., Subrahmanian, V.S.: A Logical Language for Expressing Authorizations. In: IEEE Symposium On Research in Security and Privacy, Oakland, California (1997)
-
(1997)
IEEE Symposium On Research in Security and Privacy
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
-
27
-
-
4143074723
-
A Logical Specification for Usage Control
-
ACM Press, New York June 2-4
-
Zhang, X., Park, J., Parisi-Presicce, F., Sandhu, R.: A Logical Specification for Usage Control. In: 9th ACM Symposium on Access Control Models and Technologies (SACMAT), ACM Press, New York (June 2-4, 2004)
-
(2004)
9th ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
Zhang, X.1
Park, J.2
Parisi-Presicce, F.3
Sandhu, R.4
-
28
-
-
33745450500
-
Formal Model and Policy Specification of Usage Control
-
Zhang, X., Parisi-Presicce, F., Park, J., Sandhu, R.: Formal Model and Policy Specification of Usage Control. ACM Transactions on Information and System Security (TISSEC) 8(4), 351-387 (2005)
-
(2005)
ACM Transactions on Information and System Security (TISSEC)
, vol.8
, Issue.4
, pp. 351-387
-
-
Zhang, X.1
Parisi-Presicce, F.2
Park, J.3
Sandhu, R.4
|