-
3
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
E. Bertino, E. Ferrari, and V. Atluri. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security, 2(1):65-104, 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
4
-
-
38849180913
-
Preventing injection attacks with syntax embeddings. A host and guest language independent approach
-
J. Lawall, editor, New York, NY, USA, October, ACM
-
M. Bravenboer, E. Dolstra, and E. Visser. Preventing injection attacks with syntax embeddings. A host and guest language independent approach. In J. Lawall, editor, Generative Programming and Component Engineering (GPCE 2007), pages 3-12, New York, NY, USA, October 2007. ACM.
-
(2007)
Generative Programming and Component Engineering (GPCE 2007)
, pp. 3-12
-
-
Bravenboer, M.1
Dolstra, E.2
Visser, E.3
-
5
-
-
12844281062
-
Concrete syntax for objects. Domain-specific language embedding and assimilation without restrictions
-
D. C. Schmidt, editor, Vancouver, Canada, October, ACM Press
-
M. Bravenboer and E. Visser. Concrete syntax for objects. Domain-specific language embedding and assimilation without restrictions. In D. C. Schmidt, editor, Object-Oriented Programing, Systems, Languages, and Applications (OOPSLA 2004), pages 365-383, Vancouver, Canada, October 2004. ACM Press.
-
(2004)
Object-Oriented Programing, Systems, Languages, and Applications (OOPSLA 2004)
, pp. 365-383
-
-
Bravenboer, M.1
Visser, E.2
-
6
-
-
0009233508
-
Policies for Distributed Systems and Networks: Int. Workshop, Policy 2001, Bristol, Uk, January 29-31, 2001: Proceedings
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder Policy Specification Language. Policies for Distributed Systems and Networks: Int. Workshop, Policy 2001, Bristol, Uk, January 29-31, 2001: Proceedings, 2001.
-
(2001)
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
7
-
-
14544298547
-
A case study in access control requirements for a health information system
-
Australia, Australian Computer Society, Inc
-
M. Evered and S. Bögeholz. A case study in access control requirements for a health information system. In ACSW Frontiers, pages 53-61, Darlinghurst, Australia, 2004. Australian Computer Society, Inc.
-
(2004)
ACSW Frontiers, pages 53-61, Darlinghurst
-
-
Evered, M.1
Bögeholz, S.2
-
10
-
-
82955230066
-
An overview of AspectJ
-
G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm, and W. Griswold. An overview of AspectJ. Lecture Notes in Computer Science, 2072(327-355):110-121, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2072
, Issue.327-355
, pp. 110-121
-
-
Kiczales, G.1
Hilsdale, E.2
Hugunin, J.3
Kersten, M.4
Palm, J.5
Griswold, W.6
-
12
-
-
51749104643
-
Web Applications: Spaghetti Code for the 21st Century
-
Technical Report TR-2007-166, Sun Microsystems, June
-
T. Mikkonen and A. Taivalsaari. Web Applications: Spaghetti Code for the 21st Century. Technical Report TR-2007-166, Sun Microsystems, June 2007.
-
(2007)
-
-
Mikkonen, T.1
Taivalsaari, A.2
-
13
-
-
51749108941
-
-
T. Moses et al. eXtensible Access Control Markup Language (XACML) Version 2.0. OASIS Standard, 200502, 2005
-
T. Moses et al. eXtensible Access Control Markup Language (XACML) Version 2.0. OASIS Standard, 200502, 2005.
-
-
-
-
15
-
-
84964853055
-
Access control: Policies, models, and mechanisms
-
London, UK, Springer-Verlag
-
P. Samarati and S. D. C. di Vimercati. Access control: Policies, models, and mechanisms. In Foundations of Security Analysis and Design on Foundations of Security Analysis and Design (FOSAD'00), pages 137-196, London, UK, 2001. Springer-Verlag.
-
(2001)
Foundations of Security Analysis and Design on Foundations of Security Analysis and Design (FOSAD'00)
, pp. 137-196
-
-
Samarati, P.1
di Vimercati, S.D.C.2
-
17
-
-
0028513932
-
Access control: Principle and practice
-
R. Sandhu and P. Samarati. Access control: principle and practice. Comm. Magazine, IEEE, 32(9):40-48, 1994.
-
(1994)
Comm. Magazine, IEEE
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
18
-
-
0027699087
-
Lattice-based access control models
-
R. S. Sandhu. Lattice-based access control models. Computer, 26(11):9-19, 1993.
-
(1993)
Computer
, vol.26
, Issue.11
, pp. 9-19
-
-
Sandhu, R.S.1
-
19
-
-
19344364618
-
Role-based access control
-
M. Zerkowitz, editor, Academic Press
-
R. S. Sandhu. Role-based access control. In M. Zerkowitz, editor, Advances in Computers, volume 48. Academic Press, 1998.
-
(1998)
Advances in Computers
, vol.48
-
-
Sandhu, R.S.1
-
20
-
-
33748055425
-
Towards reasonability properties for access-control policy languages
-
New York, NY, USA, ACM
-
M. C. Tschantz and S. Krishnamurthi. Towards reasonability properties for access-control policy languages. In Proceedings of the eleventh ACM symposium on Access control models and technologies, pages 160-169, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the eleventh ACM symposium on Access control models and technologies
, pp. 160-169
-
-
Tschantz, M.C.1
Krishnamurthi, S.2
-
22
-
-
84947264529
-
-
E. Visser. Program transformation with Stratego/XT: Rules, strategies, tools, and systems in StrategoXT-0.9. In C. Lengauer et al., editors, Domain-Specific Program Generation, 3016 of Lecture Notes in Computer Science, pages 216-238. Spinger-Verlag, June 2004.
-
E. Visser. Program transformation with Stratego/XT: Rules, strategies, tools, and systems in StrategoXT-0.9. In C. Lengauer et al., editors, Domain-Specific Program Generation, volume 3016 of Lecture Notes in Computer Science, pages 216-238. Spinger-Verlag, June 2004.
-
-
-
-
23
-
-
56649083315
-
WebDSL: A case study in domain-specific language engineering
-
Generative and Transformational Techniques in Software Engineering GTTSE 2007, Springer
-
E. Visser. WebDSL: A case study in domain-specific language engineering. In Generative and Transformational Techniques in Software Engineering (GTTSE 2007), Lecture Notes in Computer Science. Springer, 2008.
-
(2008)
Lecture Notes in Computer Science
-
-
Visser, E.1
-
25
-
-
3042684910
-
A rule-based framework for role-based delegation and revocation
-
L. Zhang, G. J. Ahn, and B. T. Chu. A rule-based framework for role-based delegation and revocation. ACM Transactions Information and System Security, 6(3):404-441, 2003.
-
(2003)
ACM Transactions Information and System Security
, vol.6
, Issue.3
, pp. 404-441
-
-
Zhang, L.1
Ahn, G.J.2
Chu, B.T.3
|