-
1
-
-
0027667638
-
-
ABADI, M., BURROWS, M., LAMPSON, B., AND PLOTKIN, G. 1993. A calculus for access control in distributed systems. ACM Trans. Prog. Lang. Syst. 15, 4 (Oct.), 706-734.
-
ABADI, M., BURROWS, M., LAMPSON, B., AND PLOTKIN, G. 1993. A calculus for access control in distributed systems. ACM Trans. Prog. Lang. Syst. 15, 4 (Oct.), 706-734.
-
-
-
-
3
-
-
84956993736
-
-
AHN, G.-J., AND SANDHU, R. S. 2000. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Sec. 3, 4 (Nov.), 207-226.
-
AHN, G.-J., AND SANDHU, R. S. 2000. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Sec. 3, 4 (Nov.), 207-226.
-
-
-
-
6
-
-
49449083516
-
-
BERTINO, E., FERRARI, E., AND ATLURI, V. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Sec. 2, 1 (Feb.), 65-104.
-
BERTINO, E., FERRARI, E., AND ATLURI, V. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Sec. 2, 1 (Feb.), 65-104.
-
-
-
-
7
-
-
34547243086
-
Managing digital rights using linear logic
-
IEEE Computer Society Press, Los Alamitos, CA
-
BARTH, A., AND MITCHELL, J. 2006. Managing digital rights using linear logic. In Proceedings of the 21 st Annual IEEE Symposium on Logic in Computer Science (LICS). IEEE Computer Society Press, Los Alamitos, CA, 127-136.
-
(2006)
Proceedings of the 21 st Annual IEEE Symposium on Logic in Computer Science (LICS)
, pp. 127-136
-
-
BARTH, A.1
MITCHELL, J.2
-
8
-
-
0034446895
-
A modular approach to composing access control policies
-
ACM, New York
-
BONATTI, P., DE CAPITANIDI VIMERCATI, S., AND SAMARATI, P. 2000. A modular approach to composing access control policies. In Proceedings of the ACM Conference on Computer and Communications Security (CCS). ACM, New York, 164-173.
-
(2000)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
, pp. 164-173
-
-
BONATTI, P.1
DE CAPITANIDI VIMERCATI, S.2
SAMARATI, P.3
-
9
-
-
85025424440
-
-
BONATTI, P., DE CAPITANIDI VLMERCATL, S., AND SAMARATI, P. 2002. An algebra for composing access control policies. ACM Trans. Inf. Syst. Sec. (TISSEC) 5, 1 (Feb.), 1-35.
-
BONATTI, P., DE CAPITANIDI VLMERCATL, S., AND SAMARATI, P. 2002. An algebra for composing access control policies. ACM Trans. Inf. Syst. Sec. (TISSEC) 5, 1 (Feb.), 1-35.
-
-
-
-
10
-
-
0023266943
-
-
CLARK, D. D., AND WILSON, D. R. 1987. A comparision of commercial and military computer security policies. In Proceedings of the 1987 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA, 184-194.
-
CLARK, D. D., AND WILSON, D. R. 1987. A comparision of commercial and military computer security policies. In Proceedings of the 1987 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA, 184-194.
-
-
-
-
14
-
-
0031682433
-
On the formal definition of separation-of-duty policies and their composition
-
IEEE Computer Society Press, Los Alamitos, CA
-
GLIGOR, V. D., GAVRILA, S. I., AND FERRAIOLO, D. F. 1998. On the formal definition of separation-of-duty policies and their composition. In Proceedings of IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA, 172-183.
-
(1998)
Proceedings of IEEE Symposium on Research in Security and Privacy
, pp. 172-183
-
-
GLIGOR, V.D.1
GAVRILA, S.I.2
FERRAIOLO, D.F.3
-
16
-
-
85006937063
-
-
JAEGER, T., AND TIDSWELL, J. E. 2001. Practical safety in flexible access control models. ACM Trans. Inf. Syst. Sec. 4, 2 (May), 158-190.
-
JAEGER, T., AND TIDSWELL, J. E. 2001. Practical safety in flexible access control models. ACM Trans. Inf. Syst. Sec. 4, 2 (May), 158-190.
-
-
-
-
17
-
-
0036085965
-
Design of a role-based trust management framework
-
IEEE Computer Society Press, Los Alamitos, CA
-
LI, N., MITCHELL, J. C., AND WINSBOROUGH, W. H. 2002. Design of a role-based trust management framework. In Proceedings of the 2002 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA, 114-130.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
LI, N.1
MITCHELL, J.C.2
WINSBOROUGH, W.H.3
-
18
-
-
34249745790
-
-
LI, N., TRIPUNITARA, M. V., AND BIZRI, Z. 2007. On mutually exclusive roles and separation-of-duty. ACM Trans. Inf. Syst. Sec. (TISSEC) 10, 2, 5.
-
LI, N., TRIPUNITARA, M. V., AND BIZRI, Z. 2007. On mutually exclusive roles and separation-of-duty. ACM Trans. Inf. Syst. Sec. (TISSEC) 10, 2, 5.
-
-
-
-
20
-
-
0025099231
-
Some conundrums concerning separation of duty
-
IEEE Computer Society Press, Los Alamitos, CA
-
NASH, M. J., AND POLAND, K. R. 1990. Some conundrums concerning separation of duty. In Proceedings of IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA, 201-209.
-
(1990)
Proceedings of IEEE Symposium on Research in Security and Privacy
, pp. 201-209
-
-
NASH, M.J.1
POLAND, K.R.2
-
22
-
-
26444483379
-
Towards an algebra for security policies (extended abstract)
-
Proceedings of ICATPN 2005, Springer-Verlag, New York
-
PINCUS, J., AND WING, J. M. 2005. Towards an algebra for security policies (extended abstract). In Proceedings of ICATPN 2005. Lecture Notes in Computer Science, vol. 3536. Springer-Verlag, New York, 17-25.
-
(2005)
Lecture Notes in Computer Science
, vol.3536
, pp. 17-25
-
-
PINCUS, J.1
WING, J.M.2
-
23
-
-
0016555241
-
-
SALTZER, J. H., AND SCHROEDER, M. D. 1975. The protection of information in computer systems. Proc. IEEE 63, 9 (Sep.), 1278-1308.
-
SALTZER, J. H., AND SCHROEDER, M. D. 1975. The protection of information in computer systems. Proc. IEEE 63, 9 (Sep.), 1278-1308.
-
-
-
-
26
-
-
0030086382
-
-
SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Comput. 29, 2 (Feb.), 38-47.
-
SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Comput. 29, 2 (Feb.), 38-47.
-
-
-
-
27
-
-
0030644642
-
Separation of duty in role-based environments
-
IEEE Computer Society Press, Los Alamitos, CA
-
SMON, T. T., AND ZURKO, M. E. 1997. Separation of duty in role-based environments. In Proceedings of The 10th Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos, CA, 183-194.
-
(1997)
Proceedings of The 10th Computer Security Foundations Workshop
, pp. 183-194
-
-
SMON, T.T.1
ZURKO, M.E.2
-
28
-
-
4944250730
-
The consistency of task-based authorization constraints in workflow systems
-
IEEE Computer Society Press, Los Alamitos, CA
-
TAN, K., CRAMPTON, J., AND GUNTER, C. 2004. The consistency of task-based authorization constraints in workflow systems. In Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW). IEEE Computer Society Press, Los Alamitos, CA, 155-169.
-
(2004)
Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW)
, pp. 155-169
-
-
TAN, K.1
CRAMPTON, J.2
GUNTER, C.3
-
31
-
-
3142523600
-
-
WUESEKERA, D., AND JAJODIA, S. 2003. A propositional policy algebra for access control. ACM Trans. Inf. Syst. Sec. 6, 2 (May), 286-325.
-
WUESEKERA, D., AND JAJODIA, S. 2003. A propositional policy algebra for access control. ACM Trans. Inf. Syst. Sec. 6, 2 (May), 286-325.
-
-
-
|