-
1
-
-
0032093523
-
The value of the four values
-
O. Arieli and A. Avron. The value of the four values. Artificial Intelligence, 102(1):97-141, 1998.
-
(1998)
Artificial Intelligence
, vol.102
, Issue.1
, pp. 97-141
-
-
Arieli, O.1
Avron, A.2
-
2
-
-
0001842932
-
A useful four-valued logic
-
J. M. Dunn and G. Epstein, editors, D. Reidel, Dordrecht
-
N. D. Belnap. A useful four-valued logic. In J. M. Dunn and G. Epstein, editors, Modern Uses of Multiple-Valued Logic, pages 8-37. D. Reidel, Dordrecht, 1977.
-
(1977)
Modern Uses of Multiple-Valued Logic
, pp. 8-37
-
-
Belnap, N.D.1
-
3
-
-
85025424440
-
An algebra for composing access control policies
-
P. Bonatti, S. de Capitani di Vimercati, and P. Samarati. An algebra for composing access control policies. ACM Transactions on Information and System Security, 5(1):1-35, 2002.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.1
de Capitani di Vimercati, S.2
Samarati, P.3
-
6
-
-
0022769976
-
Graph-based algorithms for boolean function manipulation
-
R. E. Bryant. Graph-based algorithms for boolean function manipulation. IEEE Transactions on Computers, 35(8):677-691, 1986.
-
(1986)
IEEE Transactions on Computers
, vol.35
, Issue.8
, pp. 677-691
-
-
Bryant, R.E.1
-
7
-
-
77952368110
-
Formal correctness of conflict detection for firewalls
-
New York, NY, USA, ACM Press
-
V. Capretta, B. Stepien, A. Felty, and S. Matwin. Formal correctness of conflict detection for firewalls. In Proc. of the 2007 ACM workshop on Formal Methods in Security Engineering (FMSE '07), pages 22-30, New York, NY, USA, 2007. ACM Press.
-
(2007)
Proc. of the 2007 ACM workshop on Formal Methods in Security Engineering (FMSE '07)
, pp. 22-30
-
-
Capretta, V.1
Stepien, B.2
Felty, A.3
Matwin, S.4
-
9
-
-
51749120038
-
-
T. M. (editor). extensible Access Control Markup Language (XACML) Version 2.0. Committee specification, OASIS, February 2005.
-
T. M. (editor). extensible Access Control Markup Language (XACML) Version 2.0. Committee specification, OASIS, February 2005.
-
-
-
-
11
-
-
0141911037
-
-
Second Edition, Artech House, Inc, Norwood, MA, USA
-
D. F. Ferraiolo, D. R. Kuhn, and R. Chandramouli. Role-Based Access Control (Second Edition). Artech House, Inc., Norwood, MA, USA, 2003.
-
(2003)
Role-Based Access Control
-
-
Ferraiolo, D.F.1
Kuhn, D.R.2
Chandramouli, R.3
-
12
-
-
33244470893
-
Verification and change-impact analysis of access-control policies
-
K. Fisler, S. Krishnamurthi, L. A. Meyerovich, and M. C. Tschantz. Verification and change-impact analysis of access-control policies. In 27th International Conference on Software Engineering (ICSE 2005), pages 196-205, 2005.
-
(2005)
27th International Conference on Software Engineering (ICSE 2005)
, pp. 196-205
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.A.3
Tschantz, M.C.4
-
13
-
-
51749088040
-
-
M. Fitting. Bilattices are nice things. In T. Bolander, V. Hendricks, and S. A. Pedersen, editors, Self-Reference, pages 53-77. Center for the Study of Language and Information, 2006.
-
M. Fitting. Bilattices are nice things. In T. Bolander, V. Hendricks, and S. A. Pedersen, editors, Self-Reference, pages 53-77. Center for the Study of Language and Information, 2006.
-
-
-
-
14
-
-
0000639470
-
Multivalued logics: A uniform approach to reasoning in AI
-
M. Ginsberg. Multivalued logics: a uniform approach to reasoning in AI. Computational Intelligence, 4:256-316, 1988.
-
(1988)
Computational Intelligence
, vol.4
, pp. 256-316
-
-
Ginsberg, M.1
-
18
-
-
34547271784
-
Defeasible security policy composition for web services
-
New York, NY, USA, ACM Press
-
A. J. Lee, J. P. Boyer, L. E. Olson, and C. A. Gunter. Defeasible security policy composition for web services. In FMSE '06: Proceedings of the fourth ACM workshop on Formal methods in security, pages 45-54, New York, NY, USA, 2006. ACM Press.
-
(2006)
FMSE '06: Proceedings of the fourth ACM workshop on Formal methods in security
, pp. 45-54
-
-
Lee, A.J.1
Boyer, J.P.2
Olson, L.E.3
Gunter, C.A.4
-
20
-
-
51749093014
-
-
D. of Defense of the United States of America. Trusted computer system evaluation criteria. DoD Standard 5200.28-STD.
-
D. of Defense of the United States of America. Trusted computer system evaluation criteria. DoD Standard 5200.28-STD.
-
-
-
-
21
-
-
49149147322
-
A logic for default reasoning
-
R. Reiter. A logic for default reasoning. Artif. Intell., 13(1-2):81-132, 1980.
-
(1980)
Artif. Intell
, vol.13
, Issue.1-2
, pp. 81-132
-
-
Reiter, R.1
-
23
-
-
0031634193
-
Proving security protocols with model checkers by data independence techniques
-
June
-
A. W. Roscoe. Proving security protocols with model checkers by data independence techniques. In Proc. of the 11th IEEE Computer Security Foundations Workshop, pages 84-95, June 1998.
-
(1998)
Proc. of the 11th IEEE Computer Security Foundations Workshop
, pp. 84-95
-
-
Roscoe, A.W.1
-
25
-
-
84974750564
-
Authorizations in distributed systems: A new approach
-
T. Y. C. Woo and S. S. Lam. Authorizations in distributed systems: A new approach. Journal of Computer Security, 2(2-3):107-136, 1993.
-
(1993)
Journal of Computer Security
, vol.2
, Issue.2-3
, pp. 107-136
-
-
Woo, T.Y.C.1
Lam, S.S.2
|