-
1
-
-
44649147524
-
KPMG Int'l Canada
-
KPMG, 1996-2002
-
KPMG, Fraud Survey Reports 1996-2002. KPMG Int'l Canada, 2006.
-
(2006)
Fraud Survey Reports
-
-
-
2
-
-
44649178404
-
-
EU, Directive on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, Directive 95/46/EC, http://www.privacy.org/pi/intl_orgs/ec/eudp.html, 1995.
-
EU, Directive on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, Directive 95/46/EC, http://www.privacy.org/pi/intl_orgs/ec/eudp.html, 1995.
-
-
-
-
4
-
-
0023266943
-
A Comparison of Commercial and Military Computer Security Policies
-
87, pp
-
D.D. Clark and D.R. Wilson, "A Comparison of Commercial and Military Computer Security Policies," Proc. IEEE Symp. Security and Privacy (SSP '87), pp. 184-194, 1987.
-
(1987)
Proc. IEEE Symp. Security and Privacy (SSP
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
5
-
-
0030086382
-
Role-Based Access Control Models
-
Feb
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-Based Access Control Models," Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
6
-
-
0011044328
-
The RCL 2000 Language for Specifying Role-Based Authorization Constraints,
-
PhD dissertation, George Mason Univ
-
G.-J. Ahn, "The RCL 2000 Language for Specifying Role-Based Authorization Constraints," PhD dissertation, George Mason Univ., 1999.
-
(1999)
-
-
Ahn, G.-J.1
-
7
-
-
21144450607
-
-
Am. Nat'l Standards Inst. Incorporated, ANSI-INCITS 359-2004
-
Role Based Access Control, Am. Nat'l Standards Inst. Incorporated, ANSI-INCITS 359-2004, 2004.
-
(2004)
Role Based Access Control
-
-
-
8
-
-
85006937063
-
Practical Safety in Flexible Access Control Models
-
May
-
T. Jaeger and J. Tidswell, "Practical Safety in Flexible Access Control Models," ACM Trans. Information and System Security, vol. 4, no. 2, pp. 158-190, May 2001.
-
(2001)
ACM Trans. Information and System Security
, vol.4
, Issue.2
, pp. 158-190
-
-
Jaeger, T.1
Tidswell, J.2
-
10
-
-
0142161295
-
A Precise Approach to Validating UML Models and OCL Constraints,
-
PhD dissertation, BISS Monographs No. 14, Fachbereich Math. und Informatik, Universität Bremen
-
M. Richters, "A Precise Approach to Validating UML Models and OCL Constraints," PhD dissertation, BISS Monographs No. 14, Fachbereich Math. und Informatik, Universität Bremen, 2002.
-
(2002)
-
-
Richters, M.1
-
12
-
-
0003258017
-
Logics of Time and Computation
-
CSLI, Stanford Univ, second ed, revised and expanded, first ed., distributed by Univ. of Chicago Press
-
R. Goldblatt, Logics of Time and Computation, vol. 7, CSLI, Stanford Univ., second ed., revised and expanded, CSLI Lecture Notes, (first ed. 1987), distributed by Univ. of Chicago Press, 1992.
-
(1987)
CSLI Lecture Notes
, vol.7
-
-
Goldblatt, R.1
-
13
-
-
0031682433
-
On the Formal Definition of Separation-of-Duty Policies and Their Composition
-
98, pp, May
-
V.D. Gligor, S.I. Gavrila, and D. Ferraiolo, "On the Formal Definition of Separation-of-Duty Policies and Their Composition," Proc. IEEE Symp. Security and Privacy (SSP '98), pp. 172-185, May 1998.
-
(1998)
Proc. IEEE Symp. Security and Privacy (SSP
, pp. 172-185
-
-
Gligor, V.D.1
Gavrila, S.I.2
Ferraiolo, D.3
-
17
-
-
4143147399
-
Using UML to Visualize Role-Based Access Control Constraints
-
I. Ray, N. Li, R. France, and D.-K. Kim, "Using UML to Visualize Role-Based Access Control Constraints," Proc. Ninth ACM Symp. Access Control Models and Technologies (SACMAT '04), pp. 115-124, 2004.
-
(2004)
Proc. Ninth ACM Symp. Access Control Models and Technologies (SACMAT '04)
, pp. 115-124
-
-
Ray, I.1
Li, N.2
France, R.3
Kim, D.-K.4
-
20
-
-
30644477677
-
Supporting Conditional Delegation in Secure Workflow Management Systems
-
E. Ferrari and G.-J. Ahn, eds, pp
-
V. Atluri and J. Warner, "Supporting Conditional Delegation in Secure Workflow Management Systems," Proc. 10th ACM Symp. Access Control Models and Technologies (SACMAT '05), E. Ferrari and G.-J. Ahn, eds., pp. 49-58, 2005.
-
(2005)
Proc. 10th ACM Symp. Access Control Models and Technologies (SACMAT '05)
, pp. 49-58
-
-
Atluri, V.1
Warner, J.2
-
21
-
-
17444406680
-
A Generalized Temporal Role-Based Access Control Model
-
Jan
-
J. Joshi, E. Bertino, U. Latif, and A. Ghafoor, "A Generalized Temporal Role-Based Access Control Model," IEEE Trans. Knowledge and Data Eng., vol. 17, no. 1, pp. 4-23, Jan. 2005.
-
(2005)
IEEE Trans. Knowledge and Data Eng
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
22
-
-
0002848811
-
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems
-
E. Bertino, E. Ferrari, and V. Atluri, "The Specification and Enforcement of Authorization Constraints in Workflow Management Systems," ACM Trans. Information and System Security, vol. 2, no. 1, pp. 65-104, 1999.
-
(1999)
ACM Trans. Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
27
-
-
0031118725
-
Access Control for Large Collections
-
H.M. Gladney, "Access Control for Large Collections," ACM Trans. Information Systems, vol. 15, no. 2, pp. 154-194, 1997.
-
(1997)
ACM Trans. Information Systems
, vol.15
, Issue.2
, pp. 154-194
-
-
Gladney, H.M.1
-
30
-
-
3042684910
-
A Rule-Based Framework for Role-Based Delegation and Revocation
-
Aug
-
L. Zhang, G.-J. Ahn, and B.-T. Chu, "A Rule-Based Framework for Role-Based Delegation and Revocation," ACM Trans. Information and System Security, vol. 6, no. 3, pp. 404-441, Aug. 2003.
-
(2003)
ACM Trans. Information and System Security
, vol.6
, Issue.3
, pp. 404-441
-
-
Zhang, L.1
Ahn, G.-J.2
Chu, B.-T.3
-
31
-
-
0034829103
-
Revocations - A Classification
-
June
-
A. Hagström, S. Jajodia, F. Parisi-Presicce, and D. Wijesekera, "Revocations - A Classification," Proc. 14th IEEE Computer Security Foundations Workshop (CSFW '01), pp. 44-58, June 2001.
-
(2001)
Proc. 14th IEEE Computer Security Foundations Workshop (CSFW '01)
, pp. 44-58
-
-
Hagström, A.1
Jajodia, S.2
Parisi-Presicce, F.3
Wijesekera, D.4
-
33
-
-
84960561455
-
Proc. London Math. Soc. (2)
-
A. Turing, "On Computable Numbers with an Application to the Entscheidungs Problem," Proc. London Math. Soc. (2), vol. 42, pp. 230-265, www.abelard.org/turpap2, 1936.
-
(1936)
, vol.42
, pp. 230-265
-
-
Turing, A.1
-
34
-
-
14044273010
-
A First Step towards Formal Verification of Security Policy Properties for RBAC
-
M. Drouineaud, M. Bortin, P. Torrini, and K. Sohr, "A First Step towards Formal Verification of Security Policy Properties for RBAC," Proc. Fourth Int'l Conf. Quality Software (QSIC '04), pp. 60-67, 2004.
-
(2004)
Proc. Fourth Int'l Conf. Quality Software (QSIC '04)
, pp. 60-67
-
-
Drouineaud, M.1
Bortin, M.2
Torrini, P.3
Sohr, K.4
-
36
-
-
0003547470
-
The Unified Modeling Language Reference Manual
-
second ed, Addison Wesley Longman
-
J. Rumbaugh, I. Jacobson, and G. Booch, "The Unified Modeling Language Reference Manual," Object Technology Series, second ed., Addison Wesley Longman, 2004.
-
(2004)
Object Technology Series
-
-
Rumbaugh, J.1
Jacobson, I.2
Booch, G.3
-
37
-
-
44649125214
-
Specification and Validation of Authorisation Constraints with UML and OCL
-
K. Sohr, G.-J. Ahn, M. Gogolla, and L. Migge, "Specification and Validation of Authorisation Constraints with UML and OCL," Proc. 10th European Symp. Research in Computer Security (ESORICS), 2005.
-
(2005)
Proc. 10th European Symp. Research in Computer Security (ESORICS)
-
-
Sohr, K.1
Ahn, G.-J.2
Gogolla, M.3
Migge, L.4
-
38
-
-
0242370955
-
Validation of UML and OCL Models by Automatic Snapshot Generation
-
M. Gogolla, J. Bohling, and M. Richters, "Validation of UML and OCL Models by Automatic Snapshot Generation," Proc. Sixth Int'l Conf. Unified Modeling Language (UML '03), pp. 265-279, 2003.
-
(2003)
Proc. Sixth Int'l Conf. Unified Modeling Language (UML '03)
, pp. 265-279
-
-
Gogolla, M.1
Bohling, J.2
Richters, M.3
-
40
-
-
44649116899
-
-
OASIS, eXtensible Access Control Markup Language (XACML) Version 2.0, 2005
-
OASIS, eXtensible Access Control Markup Language (XACML) Version 2.0, http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core- spec-os.pdf, 2005.
-
-
-
-
41
-
-
33646121424
-
An OCL Extension for Formulating Temporal Constraints,
-
1/03, Universität Bremen
-
P. Ziemann and M. Gogolla, "An OCL Extension for Formulating Temporal Constraints," Research Report 1/03, Universität Bremen, 2003.
-
(2003)
Research Report
-
-
Ziemann, P.1
Gogolla, M.2
-
43
-
-
27544484252
-
A Role-Based Access Control Policy Verification Framework for Real-Time Systems
-
B. Shafiq, A. Masood, J. Joshi, and A. Ghafoor, "A Role-Based Access Control Policy Verification Framework for Real-Time Systems," Proc. 10th IEEE Int'l Workshop Object-Oriented Real-Time Dependable Systems (WORDS '05), pp. 13-20, 2005.
-
(2005)
Proc. 10th IEEE Int'l Workshop Object-Oriented Real-Time Dependable Systems (WORDS '05)
, pp. 13-20
-
-
Shafiq, B.1
Masood, A.2
Joshi, J.3
Ghafoor, A.4
-
44
-
-
18444367403
-
Graph-Based Specification of Access Control Policies
-
M. Koch, L. Mancini, and F. Parisi-Presicce, "Graph-Based Specification of Access Control Policies," J. Computer and System Sciences, vol. 71, no. 3, pp. 1-33, 2005.
-
(2005)
J. Computer and System Sciences
, vol.71
, Issue.3
, pp. 1-33
-
-
Koch, M.1
Mancini, L.2
Parisi-Presicce, F.3
-
46
-
-
30644480988
-
A Fine-Grained, Controllable, User-to-User Delegation Method in RBAC
-
June
-
J. Wainer and A. Kumar, "A Fine-Grained, Controllable, User-to-User Delegation Method in RBAC," Proc. 10th ACM Symp. Access Control Models and Technologies (SACMAT '05), pp. 59-66, June 2005.
-
(2005)
Proc. 10th ACM Symp. Access Control Models and Technologies (SACMAT '05)
, pp. 59-66
-
-
Wainer, J.1
Kumar, A.2
|