-
1
-
-
0003400251
-
Secure computer systems: Mathematical foundations and model
-
Bedford, Mass.
-
D. E. Bell and L. J. Lapadula, Secure Computer Systems: Mathematical Foundations and Model. Mitre Corp. Report No.M74-244, Bedford, Mass.
-
Mitre Corp. Report No. M74-244
, vol.M74-244
-
-
Bell, D.E.1
Lapadula, L.J.2
-
3
-
-
0030087035
-
A temporal access control mechanism for database systems
-
Feburary
-
E. Bertino, C. Bettini, E. Ferrari, and P.Samarati, A Temporal Access Control Mechanism for Database Systems, IEEE Transactions on Knowledge and Data Engineering, Vol.8, No.1, Feburary 1996.
-
(1996)
IEEE Transactions on Knowledge and Data Engineering
, vol.8
, Issue.1
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
4
-
-
0032153903
-
An access control model supporting periodicity constraints and temporal reasoning
-
September
-
E. Bertino, C. Bettini, E. Ferrari, and P. Samarati, An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning, ACM Transaction on Database Systems, Vol.23, No.3, September 1998.
-
(1998)
ACM Transaction on Database Systems
, vol.23
, Issue.3
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
5
-
-
0035790640
-
A logical framework for reasoning about access control models
-
E. Bertino, B. Catania, E. Ferrari, and P. Perlasca, A Logical Framework for Reasoning about Access Control Models, In Proc. of Sixth ACM Symposium on Access Control Models and Technologies, 2001.
-
(2001)
Proc. of Sixth ACM Symposium on Access Control Models and Technologies
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
6
-
-
84893077785
-
Obligation monitoring in policy management
-
C. Bettini, S. Jajodia, X. Sean Wang, and D. Wijesekera, Obligation Monitoring in Policy Management, 3rd Internationl Workshop on Policies for Distributed Systems and Networks, 2002.
-
(2002)
3rd Internationl Workshop on Policies for Distributed Systems and Networks
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
7
-
-
1142309815
-
Provisions and obligations in policy management and security applications
-
Hong Kong, China
-
C. Bettini, S. Jajodia, X. Sean Wang, and D. Wijesekera, Provisions and Obligations in Policy Management and Security Applications, In proc. of the 28th VLDB Conference, Hong Kong, China, 2002.
-
(2002)
Proc. of the 28th VLDB Conference
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
10
-
-
0001809810
-
The ponder policy specification language
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman, The Ponder Policy Specification Language, In Proc. of the Workshop on Policies for Distributed System s and Networks, 2001.
-
(2001)
Proc. of the Workshop on Policies for Distributed System s and Networks
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
13
-
-
0030677524
-
A logical language for expressing authorizations
-
Oakland, California
-
S. Jajodia, P. Samarati, and V. S. Subrahmanian, A Logical Language for Expressing Authorizations, IEEE Symposium On Research in Security and Privacy, Oakland, California, 1997.
-
(1997)
IEEE Symposium on Research in Security and Privacy
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
-
14
-
-
0001619596
-
Flexible support for multiple access control policies
-
June
-
S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian, Flexible Support for Multiple Access Control Policies, ACM Transactions on Database Systems, June, 2001.
-
(2001)
ACM Transactions on Database Systems
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
20
-
-
0027699087
-
Lattice-based access control models
-
November
-
R. Sandhu, Lattice-Based Access Control Models, IEEE Computer, Vol.26, No.11, November 1993.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
-
-
Sandhu, R.1
-
21
-
-
0030086382
-
Role based access control models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, Role Based Access Control Models, IEEE Computer, 29, (2), pp.38-47, 1996
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
|