-
5
-
-
0033645572
-
TRBAC: A temporal role-based access control model
-
Berlin, Germany
-
E. Bertino, P. Bonatti, and E. Ferrari. TRBAC: A Temporal Role-Based Access Control Model. In Proceedings of the 5th ACM Workshop on Role-Based Access Control, pages 21-30, Berlin, Germany, 2000.
-
(2000)
Proceedings of the 5th ACM Workshop on Role-based Access Control
, pp. 21-30
-
-
Bertino, E.1
Bonatti, P.2
Ferrari, E.3
-
10
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
August
-
D.F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and Systems Security, 4(3), August 2001.
-
(2001)
ACM Transactions on Information and Systems Security
, vol.4
, Issue.3
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
12
-
-
0344001283
-
Providing policy-neutral and transparent access control in extensible systems
-
University of Washington
-
R. Grimm and B. Bershad. Providing Policy-Neutral and Transparent Access Control in Extensible Systems. Technical Report UW-CSE-98-02-02, University of Washington, 1998.
-
(1998)
Technical Report
, vol.UW-CSE-98-02-02
-
-
Grimm, R.1
Bershad, B.2
-
13
-
-
0031650454
-
Access control in open distributed environment
-
Oakland, CA, May
-
R. J. Hayton, J. M. Bacon, and K. Moody. Access Control in Open Distributed Environment. In IEEE Symposium on Security and Privacy, pages 3-14, Oakland, CA, May 1998.
-
(1998)
IEEE Symposium on Security and Privacy
, pp. 3-14
-
-
Hayton, R.J.1
Bacon, J.M.2
Moody, K.3
-
15
-
-
1542597501
-
Security policy specification using a graphical approach
-
Computer Science Department, University of California Davis, July
-
J. A. Hoagland, R. Pandey, and K. N. Levitt. Security Policy Specification Using a Graphical Approach. Technical Report CSE-98-3, Computer Science Department, University of California Davis, July 1998.
-
(1998)
Technical Report
, vol.CSE-98-3
-
-
Hoagland, J.A.1
Pandey, R.2
Levitt, K.N.3
-
16
-
-
0030677524
-
A logical language for expressing authorizations
-
Oakland, CA, May
-
S. Jajodia, P. Samarati, and V. S. Subrahmanian. A Logical Language for Expressing Authorizations. In IEEE Symposium on Security and Privacy, pages 31-42, Oakland, CA, May 1997.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 31-42
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
-
18
-
-
84948761495
-
Using role-based modeling language (RBML) as precise characterizations of model families
-
Greenbelt, MD, December ACM Press
-
Dae-Kyoo Kim, Robert France, Sudipto Ghosh, and Eunjee Song. Using Role-Based Modeling Language (RBML) as Precise Characterizations of Model Families. In Proceedings of the International Conference on Engineering Complex Computing Systems (ICECCS 2002), Greenbelt, MD, December 2002. ACM Press.
-
(2002)
Proceedings of the International Conference on Engineering Complex Computing Systems (ICECCS 2002)
-
-
Kim, D.-K.1
France, R.2
Ghosh, S.3
Song, E.4
-
19
-
-
85008430937
-
A graph based formalism for RBAC
-
M. Koch, L. V. Mancini, and F. Parisi Presicce. A Graph Based Formalism for RBAC. ACM Transactions on Information and System Security, 5(3):323-365, 2002.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.3
, pp. 323-365
-
-
Koch, M.1
Mancini, L.V.2
Presicce, F.P.3
-
20
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
Dresden, Germany, October
-
T. Lodderstedt, D. A. Basin, and J. Doser. SecureUML: A UML-Based Modeling Language for Model-Driven Security. In Proceedings of the 5th International Conference on the Unified Modeling Language, pages 426-441, Dresden, Germany, October 2002.
-
(2002)
Proceedings of the 5th International Conference on the Unified Modeling Language
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.A.2
Doser, J.3
-
22
-
-
1942475563
-
XACML language proposal, version 0.8
-
Organization for the Advancement of Structured Information Standards, January
-
OASIS. XACML Language Proposal, Version 0.8. Technical report, Organization for the Advancement of Structured Information Standards, January 2002. Available electronically from http://www.oasis-open.org/committees/xacml.
-
(2002)
Technical Report
-
-
-
23
-
-
35248896164
-
A flexible method for information systems security policy specification
-
Louvain-la-Neuve, Belgium, Springer-Verlag
-
R. Ortalo. A Flexible Method for Information Systems Security Policy Specification. In Proceedings of the 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, 1998. Springer-Verlag.
-
(1998)
Proceedings of the 5th European Symposium on Research in Computer Security
-
-
Ortalo, R.1
-
25
-
-
85087599701
-
Using parameterized UML to specify and compose access control models
-
Lausanne, Switzerland, November 13-14
-
I. Ray, N. Li, D. Kim, and R. France. Using Parameterized UML to Specify and Compose Access Control Models. In Proceedings of the 6th IFIP TC-11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems (IICIS), Lausanne, Switzerland, November 13-14 2003.
-
(2003)
Proceedings of the 6th IFIP TC-11 WG11.5 Working Conference on Integrity and Internal Control in Information Systems (IICIS)
-
-
Ray, I.1
Li, N.2
Kim, D.3
France, R.4
-
26
-
-
84945150402
-
SPL: An access control language for security policies with complex constraints
-
San Diego, CA, February
-
C. Ribeiro, A. Zuquete, and P. Ferreira. SPL: An Access Control Language for Security Policies with Complex Constraints. In Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, February 2001.
-
(2001)
Proceedings of the Network and Distributed System Security Symposium
-
-
Ribeiro, C.1
Zuquete, A.2
Ferreira, P.3
-
27
-
-
0016555241
-
The protection of information in computer systems
-
September
-
J. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. Proceedings of the IEEE, 63(9): 1278-1308, September 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
28
-
-
1942539528
-
Improving the security, scalability, manageability and performance of system services for network computing
-
University of Washington, September
-
E. G. Sirer, R. Grimm, A. J. Gregory, N. R. Anderson, and B. N. Bershad. Improving the security, scalability, manageability and performance of system services for network computing. Technical Report UW-CSE-98-09-01, University of Washington, September 1998.
-
(1998)
Technical Report
, vol.UW-CSE-98-09-01
-
-
Sirer, E.G.1
Grimm, R.2
Gregory, A.J.3
Anderson, N.R.4
Bershad, B.N.5
-
29
-
-
0141684326
-
-
Final Adopted Specification, OMG, August
-
The Object Management Group (OMG). Unified Modeling Language: Superstructure. Version 2.0, Final Adopted Specification, OMG, http://www.omg.org, August 2003.
-
(2003)
Unified Modeling Language: Superstructure. Version 2.0
-
-
|