-
1
-
-
47949107132
-
-
Experiences Implementing a Higher-Level Policy Language for SELinux in Second Annual SELinux Symposium, 2006. Baltimore, Maryland
-
Experiences Implementing a Higher-Level Policy Language for SELinux in Second Annual SELinux Symposium, 2006. Baltimore, Maryland. http://selinux- symposium.org/2006/abstracts.php.
-
-
-
-
3
-
-
47949104740
-
-
The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. W3C Recommendation 16 April 2002.
-
The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. W3C Recommendation 16 April 2002.
-
-
-
-
4
-
-
47949084021
-
-
Trusted computing group teg
-
Trusted computing group (teg). https://www.trustedcomputinggroup.org/ specs/.
-
-
-
-
5
-
-
47949122178
-
-
Uml profile for corba components, may 2003. OMG Document mars/03-05-09.
-
Uml profile for corba components, may 2003. OMG Document mars/03-05-09.
-
-
-
-
6
-
-
33748543201
-
Distributed usage control
-
September
-
A. Pretschner et al. Distributed usage control. Communications of the ACM, 49(9):39-44, September 2006.
-
(2006)
Communications of the ACM
, vol.49
, Issue.9
, pp. 39-44
-
-
Pretschner, A.1
-
7
-
-
55049109759
-
-
M. Alam, R. Breu, and M. Hafner. Model-Driven Security Engineering for Trust Management in SECTET. JOURNAL OF SOFTWARE, 2, NO. 1, FEBRUARY 2007, ACADEMY PUBLISHER.
-
M. Alam, R. Breu, and M. Hafner. Model-Driven Security Engineering for Trust Management in SECTET. JOURNAL OF SOFTWARE, VOL. 2, NO. 1, FEBRUARY 2007, ACADEMY PUBLISHER.
-
-
-
-
8
-
-
47949097241
-
Constraint based Role Based Access Control for modelling administrative constraints in the SECTET
-
M. Alam, M. Hafner, and R. Breu. Constraint based Role Based Access Control for modelling administrative constraints in the SECTET. In Proceedings of the ACM PST 2006 - International Conference on Privacy, Security and Trust, October 30th, 2006 - November 1st, 2006.
-
Proceedings of the ACM PST 2006 - International Conference on Privacy, Security and Trust, October 30th, 2006 - November 1st, 2006
-
-
Alam, M.1
Hafner, M.2
Breu, R.3
-
10
-
-
47949123683
-
-
http://www.antlr.org.
-
-
-
-
11
-
-
35048860896
-
Actor-centric modelling of access rights
-
FASE 2004
-
R. Breu and G. Popp. Actor-centric modelling of access rights. In FASE 2004. Springer LNCS Vol. 2984, p. 165-179, 2004.
-
(2004)
Springer LNCS
, vol.2984
, pp. 165-179
-
-
Breu, R.1
Popp, G.2
-
12
-
-
47949127896
-
-
K. Czarnecki and S. Helsen. Administration Model for Or-BAC. In Classification of Model Transformation Approaches, 19, OOPSLA'03 Workshop on Generative Techniques in the Context of Model-Driven Architecture.
-
K. Czarnecki and S. Helsen. Administration Model for Or-BAC. In Classification of Model Transformation Approaches, volume 19, OOPSLA'03 Workshop on Generative Techniques in the Context of Model-Driven Architecture.
-
-
-
-
13
-
-
47949109004
-
-
A. M. Devices. AMD Secure Virtual Machine Architecture Reference Manual. AMD, 2005.
-
A. M. Devices. AMD Secure Virtual Machine Architecture Reference Manual. AMD, 2005.
-
-
-
-
15
-
-
47949093094
-
-
V Haldar, D. Chandra, and M. Franz. Semantic remote attestation, a virtual machine directed approach to trusted computing
-
V Haldar, D. Chandra, and M. Franz. Semantic remote attestation - a virtual machine directed approach to trusted computing.
-
-
-
-
16
-
-
33748062337
-
PRIMA: Policy-reduced integrity measurement architecture
-
New York, NY, USA, ACM Press
-
T. Jaeger, R. Sailer, and U. Shankar. PRIMA: policy-reduced integrity measurement architecture. In SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies, pages 19-28, New York, NY, USA, 2006. ACM Press.
-
(2006)
SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies
, pp. 19-28
-
-
Jaeger, T.1
Sailer, R.2
Shankar, U.3
-
17
-
-
4143132099
-
Resolving constraint conflicts
-
New York, NY, USA, ACM Press
-
T. Jaeger, R. Sailer, and X. Zhang. Resolving constraint conflicts. In SACMAT '04: Proceedings of the ninth ACM symposium on Access control models and technologies, pages 105-114, New York, NY, USA, 2004. ACM Press.
-
(2004)
SACMAT '04: Proceedings of the ninth ACM symposium on Access control models and technologies
, pp. 105-114
-
-
Jaeger, T.1
Sailer, R.2
Zhang, X.3
-
18
-
-
85087243734
-
Model-Driven Security Engineering for the realization of Dynamic Security Requirements in Collaborative Systems
-
Appeared in PhD Symposium of IEEE/ACM Models
-
M. Alam. Model-Driven Security Engineering for the realization of Dynamic Security Requirements in Collaborative Systems. Appeared in PhD Symposium of IEEE/ACM Models 2006 LNCS 4364.
-
(2006)
LNCS
, vol.4364
-
-
Alam, M.1
-
20
-
-
38149087053
-
Modeling Permissions in a (U/X)ML World
-
M. Alam et al. Modeling Permissions in a (U/X)ML World. In IEEEARES, 2006.
-
(2006)
IEEEARES
-
-
Alam, M.1
-
21
-
-
47949100113
-
Modeling Inter-organizational Workflow Security in a Peer-to-Peer Environment
-
M. Hafner et al. Modeling Inter-organizational Workflow Security in a Peer-to-Peer Environment. In IEEE ICWS 2005,ISBN: 0-7695-2409-5.
-
IEEE ICWS 2005,ISBN: 0-7695-2409-5
-
-
Hafner, M.1
-
22
-
-
47949119000
-
-
M. Hafner, M. Alam, R. Breu. A MOF/QVT-based Domain Architecture for Model Driven Security . In IEEE/ACM Models 2006 LNCS 4199.
-
M. Hafner, M. Alam, R. Breu. A MOF/QVT-based Domain Architecture for Model Driven Security . In IEEE/ACM Models 2006 LNCS 4199.
-
-
-
-
23
-
-
38349165472
-
A Security Architecture For Inter-organizational Workflows-Putting WS Security Standards Together
-
ISBN
-
M. Hafner., R. Breu, and M. Breu. A Security Architecture For Inter-organizational Workflows-Putting WS Security Standards Together. In ICEIS 2005,ISBN: 972-8865-19-8.
-
ICEIS 2005
-
-
Hafner, M.1
Breu, R.2
Breu, M.3
-
28
-
-
47949091458
-
Model Driven Security for InterOrganizational Workflows in e-Government
-
R. Breu et al. Model Driven Security for InterOrganizational Workflows in e-Government. In TCGOV 2005,Proceedings. ISBN 3-540-25016-6.
-
TCGOV 2005,Proceedings. ISBN 3-540-25016-6
-
-
Breu, R.1
-
29
-
-
26444432193
-
Web service engineering - advancing a new software engineering discipline
-
ICWE 2005, Springer
-
R. Breu et al. Web service engineering - advancing a new software engineering discipline. In ICWE 2005, LNCS 3579 Springer 2005.
-
(2005)
LNCS
, vol.3579
-
-
Breu, R.1
-
30
-
-
47949126255
-
-
Role Based Access Control avialable at. csrc.nist.gov/rbac
-
Role Based Access Control avialable at. csrc.nist.gov/rbac/.
-
-
-
-
31
-
-
14844291531
-
Attestation-based policy enforcement for remote access
-
New York, NY, USA, ACM Press
-
R. Sailer, T. Jaeger, X. Zhang, and L. van Doom. Attestation-based policy enforcement for remote access. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pages 308-317, New York, NY, USA, 2004. ACM Press.
-
(2004)
CCS '04: Proceedings of the 11th ACM conference on Computer and communications security
, pp. 308-317
-
-
Sailer, R.1
Jaeger, T.2
Zhang, X.3
van Doom, L.4
-
33
-
-
34247346997
-
Secure information sharing enabled by trusted computing and pei models
-
New York, NY, USA, ACM Press
-
R. Sandhu, K. Ranganathan, and X. Zhang. Secure information sharing enabled by trusted computing and pei models. In ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pages 2-12, New York, NY, USA, 2006. ACM Press.
-
(2006)
ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security
, pp. 2-12
-
-
Sandhu, R.1
Ranganathan, K.2
Zhang, X.3
-
34
-
-
33747846186
-
Client-side access control enforcement using trusted computing and pei models
-
3, 229, 245
-
R. Sandhu, X. Zhang, K. Ranganathan, and M. J. Covington. Client-side access control enforcement using trusted computing and pei models. In Journal of High Speed Network, Special issue on Managing Security Polices: Modeling, Verification and Configuration, pages 15(3): 229 - 245, 2006.
-
(2006)
Journal of High Speed Network, Special issue on Managing Security Polices: Modeling, Verification and Configuration
, pp. 15
-
-
Sandhu, R.1
Zhang, X.2
Ranganathan, K.3
Covington, M.J.4
-
37
-
-
47949096990
-
-
Trusted Computing Software Specification implementation, available at
-
Trusted Computing Software Specification implementation, available at. http://trousers.sourceforge.net/.
-
-
-
-
38
-
-
33749064387
-
Ws-attestation: Efficient and fine-grained remote attestation on web services
-
Washington, DC, USA, IEEE Computer Society
-
S. Yoshihama, T. Ebringer, M. Nakamura, S. Munetoh, and H. Maruyama. Ws-attestation: Efficient and fine-grained remote attestation on web services. In ICWS '05: Proceedings of the IEEE International Conference on Web Services (ICWS'05), pages 743-750, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
ICWS '05: Proceedings of the IEEE International Conference on Web Services (ICWS'05)
, pp. 743-750
-
-
Yoshihama, S.1
Ebringer, T.2
Nakamura, M.3
Munetoh, S.4
Maruyama, H.5
|