-
1
-
-
3142523603
-
The UCONABC usage control model
-
J. Park and R. S. Sandhu, "The UCONABC usage control model." ACM Trans. Inf. Syst. Secur., vol. 7, no. 1, pp. 128-174, 2004.
-
(2004)
ACM Trans. Inf. Syst. Secur
, vol.7
, Issue.1
, pp. 128-174
-
-
Park, J.1
Sandhu, R.S.2
-
2
-
-
0023365727
-
Statecharts: A visual formalism for complex systems
-
Online, Available
-
D. Hard, "Statecharts: A visual formalism for complex systems," Sci. Comput. Program., vol. 8, no. 3, pp. 231-274, 1987. [Online]. Available: http://www.wisdom.weizmann.ac.il/~dharel/ SCANNED.PAPERS/Statecharts. pdf
-
(1987)
Sci. Comput. Program
, vol.8
, Issue.3
, pp. 231-274
-
-
Hard, D.1
-
4
-
-
33745450500
-
Formal model, and policy specification of usage control
-
X. Zhang, F. Parisi-Presicce, R. S. Sandhu, and J. Park, "Formal model, and policy specification of usage control." ACM Trans. Inf. Syst. Secur., vol. 8, no. 4, pp. 351-387, 2005.
-
(2005)
ACM Trans. Inf. Syst. Secur
, vol.8
, Issue.4
, pp. 351-387
-
-
Zhang, X.1
Parisi-Presicce, F.2
Sandhu, R.S.3
Park, J.4
-
5
-
-
0024663219
-
The Chinese Wall Policy
-
Oakland, California, USA: IEEE, May
-
D. Brewer and M. Nash, "The Chinese Wall Policy," in IEEE Symposium on Research in Security and Privacy. Oakland, California, USA: IEEE, May 1989, pp. 206-214.
-
(1989)
IEEE Symposium on Research in Security and Privacy
, pp. 206-214
-
-
Brewer, D.1
Nash, M.2
-
6
-
-
84902461453
-
Attribute Mutability in Usage Control
-
C. Farkas and P. Samarati, Eds. Sitges, Catalonia, Spain: Kluwer, July
-
J. Park, X. Zhang, and R. S. Sandhu, "Attribute Mutability in Usage Control," in Proceedings of IFIP TCIlAVG 11.3 Eighteenth Annual Conference on Data and Applications Security, C. Farkas and P. Samarati, Eds. Sitges, Catalonia, Spain: Kluwer, July 2004, pp. 15-29.
-
(2004)
Proceedings of IFIP TCIlAVG 11.3 Eighteenth Annual Conference on Data and Applications Security
, pp. 15-29
-
-
Park, J.1
Zhang, X.2
Sandhu, R.S.3
-
7
-
-
34748885837
-
ISO/IEC 10181-3:1996 Information technology - Open Systems Interconnection - Security frameworks for open systems: Access control framework, March 2006. [Online]. Available: http://www.iso. org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=18199
-
ISO/IEC
-
ISO/IEC, "ISO/IEC 10181-3:1996 Information technology - Open Systems Interconnection - Security frameworks for open systems: Access control framework," March 2006. [Online]. Available: http://www.iso. org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=18199
-
-
-
-
8
-
-
51849147536
-
-
OASIS, extensible Access Control Markup Language (XACML) Version 2.0, February 2005, Online, Available
-
OASIS, "extensible Access Control Markup Language (XACML) Version 2.0," February 2005. [Online]. Available: http://www.oasis-open. org/co:mm.ittees/tc_home.php?wg_abbrev=xacrnl#XACML20
-
-
-
-
9
-
-
34548016799
-
A note on the formalisation of UCON
-
June
-
H. Janicke, A. Cau, F. Siewe, and H. Zedan, "A note on the formalisation of UCON," in Proceedings of the 11th ACM Symposium on Access Control Models and Technologies (SACMAT07), June 2007, pp. 163-168.
-
(2007)
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies (SACMAT07)
, pp. 163-168
-
-
Janicke, H.1
Cau, A.2
Siewe, F.3
Zedan, H.4
-
10
-
-
33845387201
-
A Compositional Event & Time-based Policy Model
-
London, Ontario, Canada. London, Ontario Canada: IEEE Computer Society, June
-
H. Janicke, A. Cau, F. Siewe, H. Zedan, and K. Jones, "A Compositional Event & Time-based Policy Model," in Proceedings of POLICY2006, London, Ontario, Canada. London, Ontario Canada: IEEE Computer Society, June 2006, pp. 173-182.
-
(2006)
Proceedings of POLICY2006
, pp. 173-182
-
-
Janicke, H.1
Cau, A.2
Siewe, F.3
Zedan, H.4
Jones, K.5
-
11
-
-
34748838372
-
Deriving Enforcement Mechanisms from Policies
-
June
-
H. Janicke, A. Cau, F. Siewe, and H. Zedan, "Deriving Enforcement Mechanisms from Policies," in Proceedings of the 8th IEEE international Workshop on Policies for Distributed Systems (POLICY2007), June 2007, pp. 161-170.
-
(2007)
Proceedings of the 8th IEEE international Workshop on Policies for Distributed Systems (POLICY2007)
, pp. 161-170
-
-
Janicke, H.1
Cau, A.2
Siewe, F.3
Zedan, H.4
-
12
-
-
0033333334
-
Conflicts in Policy-Based Distributed Systems Management
-
E. C. Lupu and M. Sloman, "Conflicts in Policy-Based Distributed Systems Management," IEEE Trans. Softw. Eng., vol. 25, no. 6, pp. 852-869, 1999.
-
(1999)
IEEE Trans. Softw. Eng
, vol.25
, Issue.6
, pp. 852-869
-
-
Lupu, E.C.1
Sloman, M.2
-
13
-
-
0001619596
-
Flexible support for multiple access control policies
-
S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian, "Flexible support for multiple access control policies," ACM Trans. Database Syst., vol. 26, no. 2, pp. 214-260, 2001.
-
(2001)
ACM Trans. Database Syst
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
14
-
-
51849089718
-
-
J. Chomicki and J. Lobo, Monitors for History-Based Policies, in Proceedings of the International Workshop on Policies For Distributed Systems and Networks, ser. Lecture Notes In Computer Science, M. Sloman, J. Lobo, and E. Lupu, Eds., 1995. Springer-Verlag, January 2001, pp. 57-72. [Online]. Available: http://www.cse.buffalo. edu/~chomi.cki/papers-policy01.ps
-
J. Chomicki and J. Lobo, "Monitors for History-Based Policies," in Proceedings of the International Workshop on Policies For Distributed Systems and Networks, ser. Lecture Notes In Computer Science, M. Sloman, J. Lobo, and E. Lupu, Eds., vol. 1995. Springer-Verlag, January 2001, pp. 57-72. [Online]. Available: http://www.cse.buffalo. edu/~chomi.cki/papers-policy01.ps
-
-
-
-
15
-
-
0032596611
-
A Policy Description Language
-
Online, Available
-
J. Lobo, R. Bhatia, and S. A. Naqvi, "A Policy Description Language," in AAAI/IAAI, 1999, pp. 291-298. [Online]. Available: http://citeseer.ist.psu.edu/lobo99policy.html
-
(1999)
AAAI/IAAI
, pp. 291-298
-
-
Lobo, J.1
Bhatia, R.2
Naqvi, S.A.3
-
16
-
-
84881225236
-
Enforceable Security Policies
-
February
-
F. B. Schneider, "Enforceable Security Policies," ACM Transactions on Information and System Security, vol. 3, no. 1, pp. 30-50, February 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
17
-
-
35248873970
-
Enforcing Obligations with Security Monitors
-
November
-
C. N. Ribeiro, A. Zuquete, P. Ferreira, and P. Guedes, "Enforcing Obligations with Security Monitors," in The Third International Conference on Information and Communication Security (ICICS'2001), November 2001.
-
(2001)
The Third International Conference on Information and Communication Security (ICICS'2001)
-
-
Ribeiro, C.N.1
Zuquete, A.2
Ferreira, P.3
Guedes, P.4
-
18
-
-
33745329295
-
Computability classes for enforcement mechanisms
-
K. W. Hamlen, G. Morrisett, and F. B. Schneider, "Computability classes for enforcement mechanisms," ACM Trans. Program. Lang. Syst., vol. 28, no. 1, pp. 175-205, 2006.
-
(2006)
ACM Trans. Program. Lang. Syst
, vol.28
, Issue.1
, pp. 175-205
-
-
Hamlen, K.W.1
Morrisett, G.2
Schneider, F.B.3
|