-
2
-
-
0035790640
-
A logical framework for reasoning about access control models
-
ACM Press
-
E. Bertino, B. Catania, E. Ferrari, and P. Perlasca. A Logical Framework for Reasoning about Access Control Models. In Proc. of 6th SACMAT, pages 41-52. ACM Press, 2001.
-
(2001)
Proc. of 6th SACMAT
, pp. 41-52
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
4
-
-
84865445501
-
Secrecy and group creation
-
Springer
-
L. Cardelli, G. Ghelli, and A. D. Gordon. Secrecy and group creation. In Proc. of CONCUR'00, volume 1877 of LNCS, pages 365-379. Springer, 2000.
-
(2000)
Proc. of CONCUR'00, Volume 1877 of LNCS
, vol.1877
, pp. 365-379
-
-
Cardelli, L.1
Ghelli, G.2
Gordon, A.D.3
-
7
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D. Ferraiolo, R. Sandhu, S. Gavrila, D. Kuhn, and R. Chandramouli. Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security, 4(3):224-274, 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.4
Chandramouli, R.5
-
8
-
-
0035817803
-
Bisimulations for the joincalculus
-
C. Fournet and C. Laneve. Bisimulations for the joincalculus. Theoretical Computer Science, 266(1-2):569-603, 2001.
-
(2001)
Theoretical Computer Science
, vol.266
, Issue.1-2
, pp. 569-603
-
-
Fournet, C.1
Laneve, C.2
-
9
-
-
14644392469
-
Typed behavioural equivalences for processes in the presence of subtyping
-
Elsevier Science Inc., New York. Full version to appear in Mathematical Structures in Computer Science
-
M. Hennessy and I. Rathke. Typed behavioural equivalences for processes in the presence of subtyping. In Proceedings of CATS '02, volume 61 of Electronic Notes on Theoretical Computer Science. Elsevier Science Inc., New York, 2002. Full version to appear in Mathematical Structures in Computer Science.
-
(2002)
Proceedings of CATS '02, Volume 61 of Electronic Notes on Theoretical Computer Science
-
-
Hennessy, M.1
Rathke, I.2
-
10
-
-
0037170503
-
Resource access control in systems of mobile agents
-
M. Hennessy and J. Riely. Resource Access Control in Systems of Mobile Agents. Information and Computation, 173:82-120, 2002.
-
(2002)
Information and Computation
, vol.173
, pp. 82-120
-
-
Hennessy, M.1
Riely, J.2
-
11
-
-
0029404929
-
On reduction-based process semantics
-
K. Honda and N. Yoshida. On reduction-based process semantics. Theoretical Computer Science, 152(2):437-486, 1995.
-
(1995)
Theoretical Computer Science
, vol.152
, Issue.2
, pp. 437-486
-
-
Honda, K.1
Yoshida, N.2
-
12
-
-
84944075708
-
A formal model for role-based access control using graph transformation
-
Springer
-
M. Koch, L. Mancini, and F. Parisi-Presicce. A Formal Model for Role-Based Access Control Using Graph Transformation. In Proc. of 5th ESORICS, volume 1895 of LNCS, pages 122-139. Springer, 2000.
-
(2000)
Proc. of 5th ESORICS, Volume 1895 of LNCS
, vol.1895
, pp. 122-139
-
-
Koch, M.1
Mancini, L.2
Parisi-Presicce, F.3
-
13
-
-
84957011508
-
Decidability of safety in graph-Based models for access control
-
Springer
-
M. Koch, L. Mancini, and F. Parisi-Presicce. Decidability of Safety in Graph-based Models for Access Control. In Proc. of 7th ESORICS, volume 2502 of LNCS, pages 229-243. Springer, 2002.
-
(2002)
Proc. of 7th ESORICS, Volume 2502 of LNCS
, vol.2502
, pp. 229-243
-
-
Koch, M.1
Mancini, L.2
Parisi-Presicce, F.3
-
16
-
-
0001518312
-
Typing and subtyping for mobile processes
-
B. C. Pierce and D. Sangiorgi. Typing and subtyping for mobile processes. Mathematical Structures in Computer Science, 6(5):409-454, 1996. An extract appeared in Proceedings of LINS '93: 376-385.
-
(1996)
Mathematical Structures in Computer Science
, vol.6
, Issue.5
, pp. 409-454
-
-
Pierce, B.C.1
Sangiorgi, D.2
-
17
-
-
4944258615
-
-
B. C. Pierce and D. Sangiorgi. Typing and subtyping for mobile processes. Mathematical Structures in Computer Science, 6(5):409-454, 1996. An extract appeared in Proceedings of LINS '93: 376-385.
-
Proceedings of LINS '93
, pp. 376-385
-
-
-
18
-
-
0030086382
-
Role-based access control models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-Based Access Control Models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
20
-
-
0242625217
-
A lightweight approach to specification and analysis of role-based access control extensions
-
ACM Press
-
A. Schaad and J. Moffett. A Lightweight Approach to Specification and Analysis of Role-based Access Control Extensions. In Proc. of 7th SACMAT, pages 13-22. ACM Press, 2002.
-
(2002)
Proc. of 7th SACMAT
, pp. 13-22
-
-
Schaad, A.1
Moffett, J.2
|