-
1
-
-
0027699087
-
Lattice-Based Access Control Models
-
Sandhu, R.S.: Lattice-Based Access Control Models. IEEE Computer 26(11), 9-19 (1993)
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
5
-
-
0031379040
-
Mandatory Access Control and Role-Based Access Control Revisited
-
Fairfax, Virginia, United States, pp
-
Osborn, S.: Mandatory Access Control and Role-Based Access Control Revisited. In: Proceedings of the second ACM workshop on Role-based access control, Fairfax, Virginia, United States, pp. 31-40 (1997)
-
(1997)
Proceedings of the second ACM workshop on Role-based access control
, pp. 31-40
-
-
Osborn, S.1
-
6
-
-
0031611451
-
Role Based Access control on MLS Systems without Kernel changes
-
Fairfax, Virginia, United States, pp
-
Kuhn, D.R.: Role Based Access control on MLS Systems without Kernel changes. In: Proceedings of the third ACM Workshop on Role-Based Access Control, Fairfax, Virginia, United States, pp. 25-32 (1998)
-
(1998)
Proceedings of the third ACM Workshop on Role-Based Access Control
, pp. 25-32
-
-
Kuhn, D.R.1
-
7
-
-
84884311106
-
Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access control Policies
-
Osborn, S., Sandhu, R., Munawer, Q.: Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access control Policies. ACM Transactions on Information and System Security 3(2), 85-106 (2000)
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
8
-
-
38349024140
-
Implementation of Mandatory Access control in Role-Based Security System. CSE367 Final
-
Project report
-
Demurjian, S.: Implementation of Mandatory Access control in Role-Based Security System. CSE367 Final Project report (2001)
-
(2001)
-
-
Demurjian, S.1
-
9
-
-
4944222278
-
Enforcing robust declassification
-
June
-
Myers, A.C., Sabelfeld, A., Zdancewic, S.: Enforcing robust declassification. In: Proc. IEEE Computer Security Foundations Workshop, pp. 172-186 (June 2004)
-
(2004)
Proc. IEEE Computer Security Foundations Workshop
, pp. 172-186
-
-
Myers, A.C.1
Sabelfeld, A.2
Zdancewic, S.3
-
10
-
-
0031599992
-
How to do discretionary access control using roles
-
Fairfax, VA, USA
-
Sandhu, R., Munawer, Q.: How to do discretionary access control using roles. In: Proc. of the 3rd ACM Workshop on Role Based Access Control (RBAC 1998), Fairfax, VA, USA (1998)
-
(1998)
Proc. of the 3rd ACM Workshop on Role Based Access Control (RBAC
-
-
Sandhu, R.1
Munawer, Q.2
-
11
-
-
0031355379
-
Enforcing Mandatory and Discretionary security in Workflow Management Systems
-
Atluri, V., Huang, W.-K.: Enforcing Mandatory and Discretionary security in Workflow Management Systems. Journal of Computer Security 5(4), 303-339 (1997)
-
(1997)
Journal of Computer Security
, vol.5
, Issue.4
, pp. 303-339
-
-
Atluri, V.1
Huang, W.-K.2
-
12
-
-
0033887763
-
A semantic Based Execution Model for Multilevel Secure Workflows
-
Atluri, V., Huang, W.-K., Bertino, E.: A semantic Based Execution Model for Multilevel Secure Workflows. Journal of Computer Security 8(1) (2000)
-
(2000)
Journal of Computer Security
, vol.8
, Issue.1
-
-
Atluri, V.1
Huang, W.-K.2
Bertino, E.3
-
15
-
-
0029211469
-
Practical Domain and Type Enforcement for Unix
-
Oakland, CA, USA
-
Badger, L., Sterne, D.F., Sherman, D.L., Walker, K.M., Haghighat, S.A.: Practical Domain and Type Enforcement for Unix. In: IEEE Symposium on Security and Privacy, Oakland, CA, USA (1995)
-
(1995)
IEEE Symposium on Security and Privacy
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
Haghighat, S.A.5
-
17
-
-
22444446932
-
Domain and Type Enforcement for Real-Time Operating Systems
-
Emerging Technologies and Factory Automation
-
Kiszka, J., Wagner, B.: Domain and Type Enforcement for Real-Time Operating Systems. In: Proceedings ETFA 2003, Emerging Technologies and Factory Automation (2003)
-
(2003)
Proceedings ETFA
-
-
Kiszka, J.1
Wagner, B.2
-
18
-
-
77952407814
-
Organization Based Access Control
-
Lake Come, Italy
-
Abou El Kalam, A., El Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miége, A., Saurel, C., Trouessin, G.: Organization Based Access Control. In: IEEE 4th International Workshop on Policies for Distributed Systems and Networks, Lake Come, Italy (2003)
-
(2003)
IEEE 4th International Workshop on Policies for Distributed Systems and Networks
-
-
Abou El Kalam, A.1
El Baida, R.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miége, A.7
Saurel, C.8
Trouessin, G.9
-
19
-
-
33751017347
-
A formal approach to specify and deploy a network security policy
-
Toulouse, France
-
Cuppens, F., Cuppens-Boulahia, N., Sans, T., Miége, A.: A formal approach to specify and deploy a network security policy. In: Second Workshop on Formal Aspects in Security and Trust (FAST), Toulouse, France (2004)
-
(2004)
Second Workshop on Formal Aspects in Security and Trust (FAST)
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Sans, T.3
Miége, A.4
-
20
-
-
33746441974
-
Inheritance hierarchies in the OrBAC model and application in a network environment
-
Turku, Finlande
-
Cuppens, F., Cuppens-Boulahia, N., Miége, A.: Inheritance hierarchies in the OrBAC model and application in a network environment. In: Second Foundations of Computer Security Workshop (FCS 2004), Turku, Finlande (2004)
-
(2004)
Second Foundations of Computer Security Workshop (FCS
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Miége, A.3
-
23
-
-
38349032154
-
The extended Access Matrix Model of Computer Security
-
Boebert, W.E., Kain, R.Y., Young, W.D.: The extended Access Matrix Model of Computer Security. ACM Sigsoft Software Engineering Notes 10(4) (1985)
-
(1985)
ACM Sigsoft Software Engineering Notes
, vol.10
, Issue.4
-
-
Boebert, W.E.1
Kain, R.Y.2
Young, W.D.3
-
24
-
-
38349034438
-
-
Hallyn, S., Kearns, P.: Tools to Administer Domain and Type Enforcement. LISA XV. San Diego, CA (2001)
-
Hallyn, S., Kearns, P.: Tools to Administer Domain and Type Enforcement. LISA XV. San Diego, CA (2001)
-
-
-
-
25
-
-
0031334683
-
Domain and Type Enforcement Firewalls
-
San Diego, California, pp
-
Oostendorp, K.A., Badger, L., Vance, C.D., Morrison, W.G., Petkac, M.J., Sherman, D.L., Sterne, D.F.: Domain and Type Enforcement Firewalls. In: Proceedings of the Thirteenth Annual Computer Security Applications Conference, San Diego, California, pp. 122-132 (1997)
-
(1997)
Proceedings of the Thirteenth Annual Computer Security Applications Conference
, pp. 122-132
-
-
Oostendorp, K.A.1
Badger, L.2
Vance, C.D.3
Morrison, W.G.4
Petkac, M.J.5
Sherman, D.L.6
Sterne, D.F.7
-
26
-
-
85084161648
-
Confining Root Programs with Domain and Type Enforcement (DTE)
-
San Jose, California
-
Walker, K.M., Sterne, D.F., Lee Badger, M., Petkac, M.J., Shermann, D.L., Oostendorp, K.A.: Confining Root Programs with Domain and Type Enforcement (DTE). In: Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography, San Jose, California, vol. 6 (1996)
-
(1996)
Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography
, vol.6
-
-
Walker, K.M.1
Sterne, D.F.2
Lee Badger, M.3
Petkac, M.J.4
Shermann, D.L.5
Oostendorp, K.A.6
|