-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
ABADI, M., BURROWS, M., LAMPSON, B., AND PLOTKIN, G. D. 1993. A calculus for access control in distributed systems. ACM Trans. Program. Lang. Syst. 15, 4, 706-734.
-
(1993)
ACM Trans. Program. Lang. Syst
, vol.15
, Issue.4
, pp. 706-734
-
-
ABADI, M.1
BURROWS, M.2
LAMPSON, B.3
PLOTKIN, G.D.4
-
3
-
-
49449098093
-
-
Available at
-
APPLE COMPUTER, I. 2004. iTunes: Terms of sale. Available at http://www.apple.com/support/itunes/legal/policies.html.
-
(2004)
iTunes: Terms of sale
-
-
APPLE, C.I.1
-
5
-
-
0032153903
-
An access control model supporting periodicity constraints and temporal reasoning
-
BERTINO, E., BETTINI, C., FERRARI, E., AND SAMARATI, P. 1998. An access control model supporting periodicity constraints and temporal reasoning. ACM Trans. Database Syst. 23, 3, 231-285.
-
(1998)
ACM Trans. Database Syst
, vol.23
, Issue.3
, pp. 231-285
-
-
BERTINO, E.1
BETTINI, C.2
FERRARI, E.3
SAMARATI, P.4
-
6
-
-
0004078695
-
-
Available at
-
BLAZE, M., FEIGENBAUM, J., IOANNIDIS, J., AND KEROMYTIS, A. 1998. The KeyNote trust management system. Available at http://www.cis.upenn.edu/~angelos/keynote.html.
-
(1998)
The KeyNote trust management system
-
-
BLAZE, M.1
FEIGENBAUM, J.2
IOANNIDIS, J.3
KEROMYTIS, A.4
-
9
-
-
0003290817
-
The Classical Decision Problem
-
Universitext
-
BÖRGER, E., GRÄDEL, E., AND GUREVICH, Y. 1997. The Classical Decision Problem. Perspectives of Mathematical Logic. Springer-Verlag, Berlin, Germany. 2nd printing (Universitext) 2001.
-
(1997)
Perspectives of Mathematical Logic. Springer-Verlag, Berlin, Germany. 2nd printing
-
-
BÖRGER, E.1
GRÄDEL, E.2
GUREVICH, Y.3
-
10
-
-
0000590655
-
Proving theorems with the modification method
-
BRAND, D. 1975. Proving theorems with the modification method. SIAM J. Comput. 4, 4, 412-430.
-
(1975)
SIAM J. Comput
, vol.4
, Issue.4
, pp. 412-430
-
-
BRAND, D.1
-
14
-
-
0003546303
-
-
Available at
-
ELLISON, C., FRANTZ, B., LAMPSON, B., RIVEST, R., THOMAS, B., AND YLONEN, T. 1999a. Simple public key certificate. Available at http://world.std.com/~cme/ spki.txt. Internet RFC 2693.
-
(1999)
Simple public key certificate
-
-
ELLISON, C.1
FRANTZ, B.2
LAMPSON, B.3
RIVEST, R.4
THOMAS, B.5
YLONEN, T.6
-
15
-
-
0003593599
-
-
Available at
-
ELLISON, C., FRANTZ, B., LAMPSON, B., RIVEST, R., THOMAS, B., AND YLONEN, T. 1999b. SPKI certificate theory. Available at http://www.ietf.org/html.charters/ spki-charter.html. Internet RFC 2693.
-
(1999)
SPKI certificate theory
-
-
ELLISON, C.1
FRANTZ, B.2
LAMPSON, B.3
RIVEST, R.4
THOMAS, B.5
YLONEN, T.6
-
17
-
-
0002422823
-
A role based access control model and reference implementation within a corporate intranet
-
FERRAIOLO, D., BARKLEY, J., AND KUHN, D. 1999. A role based access control model and reference implementation within a corporate intranet. ACM Trans. Inform. Syst. Secur. 1, 2, 34-64.
-
(1999)
ACM Trans. Inform. Syst. Secur
, vol.1
, Issue.2
, pp. 34-64
-
-
FERRAIOLO, D.1
BARKLEY, J.2
KUHN, D.3
-
18
-
-
0013084629
-
-
Prentice Hall, New Jersey
-
GARCIA-MOLINA, H., ULLMAN, J. D., AND WIDOM, J. 2002. Database Systems: The Complete Book. Prentice Hall, New Jersey.
-
(2002)
Database Systems: The Complete Book
-
-
GARCIA-MOLINA, H.1
ULLMAN, J.D.2
WIDOM, J.3
-
19
-
-
0026900438
-
A logic for reasoning about security
-
GLASGOW, J., MACEWEN, G., AND PANANGADEN, P. 1992. A logic for reasoning about security. ACM Trans. Comput. Syst. 10, 3, 226-264.
-
(1992)
ACM Trans. Comput. Syst
, vol.10
, Issue.3
, pp. 226-264
-
-
GLASGOW, J.1
MACEWEN, G.2
PANANGADEN, P.3
-
20
-
-
84976657250
-
An authorization mechanism for a relational database system
-
GRIFFITHS, P. AND WADE, B. 1976. An authorization mechanism for a relational database system. ACM Trans. Database Syst. 1, 3, 242-255.
-
(1976)
ACM Trans. Database Syst
, vol.1
, Issue.3
, pp. 242-255
-
-
GRIFFITHS, P.1
WADE, B.2
-
21
-
-
0141528667
-
-
HALFERN, J. Y. AND VAN DER MEYDEN, R. 2003. A logical reconstruction of SPKI. J. Comput. Secur. 11, 4, 581-614.
-
HALFERN, J. Y. AND VAN DER MEYDEN, R. 2003. A logical reconstruction of SPKI. J. Comput. Secur. 11, 4, 581-614.
-
-
-
-
22
-
-
0005455170
-
Logical foundations for trust management
-
Unpublished manuscript
-
HALPERN, J. Y., VAN DER MEYDEN, R., AND SCHNEIDER, F. 1999. Logical foundations for trust management. Unpublished manuscript.
-
(1999)
-
-
HALPERN, J.Y.1
VAN DER MEYDEN, R.2
SCHNEIDER, F.3
-
24
-
-
40549112646
-
A formal foundation for XrML
-
HALPERN, J. Y. AND WEISSMAN, V. 2008. A formal foundation for XrML. J. ACM 55, 1.
-
(2008)
J. ACM
, vol.55
, pp. 1
-
-
HALPERN, J.Y.1
WEISSMAN, V.2
-
27
-
-
0039934964
-
Supporting inconsistent rules in database systems
-
IOANNIDIS, Y. AND SELLIS, T. 1992. Supporting inconsistent rules in database systems. J. Intell. Inform. Syst. 1, 3/4, 243-270.
-
(1992)
J. Intell. Inform. Syst
, vol.1
, Issue.3-4
, pp. 243-270
-
-
IOANNIDIS, Y.1
SELLIS, T.2
-
28
-
-
0001619596
-
-
JAJODIA, S., SAMARATI, P., SAPINO, M. L., AND SUBRAHMANIAN, V. 2001. Flexible support for multiple access control policies. ACM Trans. Database Syst. 26, 2, 214-260.
-
JAJODIA, S., SAMARATI, P., SAPINO, M. L., AND SUBRAHMANIAN, V. 2001. Flexible support for multiple access control policies. ACM Trans. Database Syst. 26, 2, 214-260.
-
-
-
-
30
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
LAMPSON, B., ABADI, M., BURROWS, M., AND WOBBER, E. 1992. Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst. 10, 4, 265-310.
-
(1992)
ACM Trans. Comput. Syst
, vol.10
, Issue.4
, pp. 265-310
-
-
LAMPSON, B.1
ABADI, M.2
BURROWS, M.3
WOBBER, E.4
-
31
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
LI, N., GROSOF, B. N., AND FEIGENBAUM, J. 2003. Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur. 6, 1, 128-171.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.1
, pp. 128-171
-
-
LI, N.1
GROSOF, B.N.2
FEIGENBAUM, J.3
-
33
-
-
33646242539
-
Understanding spki/sdsi using first-order logic
-
LI, N. AND MITCHELL, J. C. 2006. Understanding spki/sdsi using first-order logic. Int. J. Inform. Secur. 5, 1, 48-64.
-
(2006)
Int. J. Inform. Secur
, vol.5
, Issue.1
, pp. 48-64
-
-
LI, N.1
MITCHELL, J.C.2
-
35
-
-
49449095940
-
-
MICROSOFT. 2003. Information rights management in Office Professional Edition 2003. Available at http://www.microsoft.com/office/ editions/prodinfo/technologies/irm.mspx.
-
MICROSOFT. 2003. Information rights management in Office Professional Edition 2003. Available at http://www.microsoft.com/office/ editions/prodinfo/technologies/irm.mspx.
-
-
-
-
36
-
-
49449103269
-
-
MOSES, T. 2005. XACML: The Extensible Access Control Markup Language, version 2.0. Available at
-
MOSES, T. 2005. XACML: The Extensible Access Control Markup Language, version 2.0. Available at http://www.xacml.org.
-
-
-
-
37
-
-
49449117705
-
-
MPEG. 2004. Information technology - Multimedia framework (MPEG-21) - Part 5: Rights Expression Language (ISO/IEC 21000-5:2004). Available at http://www.iso.ch/iso/en/.
-
MPEG. 2004. Information technology - Multimedia framework (MPEG-21) - Part 5: Rights Expression Language (ISO/IEC 21000-5:2004). Available at http://www.iso.ch/iso/en/.
-
-
-
-
38
-
-
0019003680
-
Fast decision procedures based on congruence closure
-
NELSON, G. AND OPPEN, D. C. 1980. Fast decision procedures based on congruence closure. JACM 27, 2, 356-364.
-
(1980)
JACM
, vol.27
, Issue.2
, pp. 356-364
-
-
NELSON, G.1
OPPEN, D.C.2
-
43
-
-
0000625819
-
Paramodulation and theorem-proving in first-order theories with equality
-
J. Siekmann and G. Wrightson, Eds. Springer, Berlin, Heidelberg
-
ROBINSON, G. AND WOS, L. 1983. Paramodulation and theorem-proving in first-order theories with equality. In Automation of Reasoning 2: Classical Papers on Computational Logic 1967-1970, J. Siekmann and G. Wrightson, Eds. Springer, Berlin, Heidelberg, 298-313.
-
(1983)
Automation of Reasoning 2: Classical Papers on Computational Logic 1967-1970
, pp. 298-313
-
-
ROBINSON, G.1
WOS, L.2
-
44
-
-
0030086382
-
Role-based access control models
-
SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Comput. 29, 2, 38-47.
-
(1996)
IEEE Comput
, vol.29
, Issue.2
, pp. 38-47
-
-
SANDHU, R.S.1
COYNE, E.J.2
FEINSTEIN, H.L.3
YOUMAN, C.E.4
-
45
-
-
0020766586
-
A data structure for dynamic trees
-
SLEATOR, D. AND TARJAN, R. 1983. A data structure for dynamic trees. J. Comput. Syst. Sci. 26, 3, 362-391.
-
(1983)
J. Comput. Syst. Sci
, vol.26
, Issue.3
, pp. 362-391
-
-
SLEATOR, D.1
TARJAN, R.2
-
46
-
-
44649167785
-
The polynomial-time hierarchy
-
STOCKMEYER, L. J. 1977. The polynomial-time hierarchy. Theor. Comput. Sci. 3, 1-22.
-
(1977)
Theor. Comput. Sci
, vol.3
, pp. 1-22
-
-
STOCKMEYER, L.J.1
|