-
1
-
-
46749134814
-
-
Kandel, Fuzzy Statistics and Policy Analysis, Fuzzy Sets: Theory and Applications to Policy Analysis and Information Systems, ed. By P. Wang and S. Chang, Plenum Press, New York, 1980.
-
Kandel, Fuzzy Statistics and Policy Analysis, Fuzzy Sets: Theory and Applications to Policy Analysis and Information Systems, ed. By P. Wang and S. Chang, Plenum Press, New York, 1980.
-
-
-
-
3
-
-
85006381297
-
Using Fuzzy Relation Equations for Adaptive Access Control in Distributed Systems
-
L'Aquila, Rome, Italy, pp
-
R. Alo, A. Berrached, A. De Korvin, and M. Beheshti, Using Fuzzy Relation Equations for Adaptive Access Control in Distributed Systems, In proceedings of the International Conference In Advances In Infrastructure For e-Business And Education On The Internet. L'Aquila, Rome, Italy, pp. 176-184, 2000.
-
(2000)
proceedings of the International Conference In Advances In Infrastructure For e-Business And Education On The Internet
, pp. 176-184
-
-
Alo, R.1
Berrached, A.2
De Korvin, A.3
Beheshti, M.4
-
4
-
-
36248982868
-
An Access Control Model Based On Fuzzy Set Theory
-
Madrid, Spain, pp
-
A. Berrached, M. Beheshti, A. De Korvin, and R. Alo, An Access Control Model Based On Fuzzy Set Theory, In proceedings of the 8th International Conference on Information Processing and Management Of Uncertainty In Knowledge Based Systems. Madrid, Spain, pp. 890-895, 2000.
-
(2000)
proceedings of the 8th International Conference on Information Processing and Management Of Uncertainty In Knowledge Based Systems
, pp. 890-895
-
-
Berrached, A.1
Beheshti, M.2
De Korvin, A.3
Alo, R.4
-
5
-
-
84948682550
-
Applying Fuzzy Relation Equations to Threat Analysis
-
A. Berrached, M. Beheshti, A. De Korvin, and R. Alo, Applying Fuzzy Relation Equations to Threat Analysis, In proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp. 684-688, 2002.
-
(2002)
proceedings of the 35th Annual Hawaii International Conference on System Sciences
, pp. 684-688
-
-
Berrached, A.1
Beheshti, M.2
De Korvin, A.3
Alo, R.4
-
8
-
-
3042642561
-
Using Fuzzy Logic to Represent Security Policies in the Multipolicy Paradigm, ACM Special Interest Group on Security, Audit, and Control (SIGSAC)
-
H. Hosmer, Using Fuzzy Logic to Represent Security Policies in the Multipolicy Paradigm, ACM Special Interest Group on Security, Audit, and Control (SIGSAC) Review,Vol. 10, No. 4, pp. 12-21, 1992.
-
(1992)
Review
, vol.10
, Issue.4
, pp. 12-21
-
-
Hosmer, H.1
-
9
-
-
85006425144
-
Fuzzy Sets and Secure Computer Systems
-
Compton, Rhode Island, United States, pp
-
S. Ovchinnikov, Fuzzy Sets and Secure Computer Systems, In proceedings of the New Security Paradigms Workshop, Little Compton, Rhode Island, United States, pp. 54-62, 1994.
-
(1994)
proceedings of the New Security Paradigms Workshop, Little
, pp. 54-62
-
-
Ovchinnikov, S.1
-
10
-
-
36248998454
-
Modeling security systems in a fuzzy environment
-
Granada, Spain, pp
-
S. Ovchinnikov, Modeling security systems in a fuzzy environment, In proceedings of the IPMU Information Processing and Management Of Uncertainty In Knowledge Based Systems, Granada, Spain, pp. 617-622, 1996.
-
(1996)
proceedings of the IPMU Information Processing and Management Of Uncertainty In Knowledge Based Systems
, pp. 617-622
-
-
Ovchinnikov, S.1
-
11
-
-
0030086382
-
Role Based Access Control Models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, Role Based Access Control Models, IEEE Computer, Vol. 29, No. 2, pp. 38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
12
-
-
84992227458
-
Proposed NIST Standard for role based access control
-
D. F. Ferraiolo, R. Sandhu, S.Gavrila, D.R. Kuhn, and R. Chandramouli, Proposed NIST Standard for role based access control, ACM Transactions on Information and system securiy, Vol. 4, No. 3, pp. 224-274, 2001.
-
(2001)
ACM Transactions on Information and system securiy
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
13
-
-
84944792110
-
TRBAC: A Temporal Role-based Access Control Model
-
E. Bertino, P. A. Bonatti, and E. Ferrari, TRBAC: A Temporal Role-based Access Control Model, ACM Transactions on Information and System Security, Vol. 4, No. 3, pp. 191-233, 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
14
-
-
0035006262
-
Generalized Role-Based Access Control
-
Mesa, USA, pp
-
M. J. Moyer, and M. Ahamad, Generalized Role-Based Access Control, In proceedings of the 21st International Conference on Distributed Computing Systems, Mesa, USA, pp. 391-398, 2001.
-
(2001)
proceedings of the 21st International Conference on Distributed Computing Systems
, pp. 391-398
-
-
Moyer, M.J.1
Ahamad, M.2
-
16
-
-
17444406680
-
A Generalized Temporal Role-Based Access Control Model
-
J. B. D. Joshi, E. Bertino, U. Latif, and A. Ghafoor, A Generalized Temporal Role-Based Access Control Model, IEEE Transactions on Knowledge and Data Engineering, Vol. 17, No. 1, pp. 4-23, 2005
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.B.D.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
17
-
-
77954335599
-
Fuzzy Nature of Trust and Dynamic Trust Modelling in Service Oriented Environments
-
E. J. Chang, F. K. Hussain, and T. S. Dillon, Fuzzy Nature of Trust and Dynamic Trust Modelling in Service Oriented Environments, In Proceedings of the 2005 workshop on Secure web services, pp. 75-83, 2005.
-
(2005)
Proceedings of the 2005 workshop on Secure web services
, pp. 75-83
-
-
Chang, E.J.1
Hussain, F.K.2
Dillon, T.S.3
|