-
1
-
-
0029700344
-
Decentralized trust management
-
Washington, DC, USA, IEEE Computer Society
-
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In SP '96: Proceedings of the 1996 IEEE Symposium on Security and Privacy, page 164, Washington, DC, USA, 1996. IEEE Computer Society.
-
(1996)
SP '96: Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 164
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
2
-
-
0022706656
-
Automatic verification of finite-stale concurrent systems using temporal logic specifications
-
E. M. Clarke, E. A. Emerson, and A. P. Sistla. Automatic verification of finite-stale concurrent systems using temporal logic specifications. ACM Transactions on Programming Language ans Systems (TOPLAS), 8(2):244-263, 1986.
-
(1986)
ACM Transactions on Programming Language ans Systems (TOPLAS)
, vol.8
, Issue.2
, pp. 244-263
-
-
Clarke, E.M.1
Emerson, E.A.2
Sistla, A.P.3
-
5
-
-
27644537252
-
Modeling security requirements through ownership, permission and delegation
-
IEEE Computer Society
-
P. Glorgini, F. Massacci, J. Mylopoulos, and N. Zannone. Modeling security requirements through ownership, permission and delegation. In Proceedings of the 13th International Conference on Requirements Engineering (RE'05), pages 167-176. IEEE Computer Society, 2005.
-
(2005)
Proceedings of the 13th International Conference on Requirements Engineering (RE'05)
, pp. 167-176
-
-
Glorgini, P.1
Massacci, F.2
Mylopoulos, J.3
Zannone, N.4
-
6
-
-
35048849152
-
Model checking access control policies
-
Proceedings of the 7th Information Security Conference, of, Springer-Verlag
-
D. P. Guelev, M. Ryan, and P. Y. Schobbens. Model checking access control policies. In Proceedings of the 7th Information Security Conference, volume 3225 of Lecture Notes in Computer Science. Springer-Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3225
-
-
Guelev, D.P.1
Ryan, M.2
Schobbens, P.Y.3
-
7
-
-
0002426352
-
Lightweight formal methods, contribution to an invitation to formal methods
-
D. Jackson and J. Wing. Lightweight formal methods, contribution to an invitation to formal methods. IEEE Computer, 29:16-30, 1996.
-
(1996)
IEEE Computer
, vol.29
, pp. 16-30
-
-
Jackson, D.1
Wing, J.2
-
9
-
-
30544438141
-
Beyond proof-of-compliance: Security analysis in trust management
-
N. Li, J. C. Mitchell, and W. H. Winsborough. Beyond proof-of-compliance: Security analysis in trust management. Journal of the ACM (JACM), 52(3):474-514, 2005.
-
(2005)
Journal of the ACM (JACM)
, vol.52
, Issue.3
, pp. 474-514
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
13
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinsfern, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinsfern, H.L.3
Youman, C.E.4
-
16
-
-
33645964601
-
Evaluating access control policies through model checking
-
Proceedings of the 8th Information Security Conference, of, Springer-Verlag
-
N. Zhang, M. Ryan, and D. P. Guelev. Evaluating access control policies through model checking. In Proceedings of the 8th Information Security Conference, volume 3650 of Lecture Notes in Computer Science, pages 446-460. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3650
, pp. 446-460
-
-
Zhang, N.1
Ryan, M.2
Guelev, D.P.3
|