-
1
-
-
0026155356
-
Safety Analysis for the Extended Schematic Protection Model
-
91, pp, May
-
P. Ammann and R.S. Sandhu, "Safety Analysis for the Extended Schematic Protection Model," Proc. IEEE Symp. Security and Privacy (S&P '91), pp. 87-97, May 1991.
-
(1991)
Proc. IEEE Symp. Security and Privacy (S&P
, pp. 87-97
-
-
Ammann, P.1
Sandhu, R.S.2
-
2
-
-
38649084843
-
-
P. Ammann and R.S. Sandhu, Implementing Transaction Control Expressions by Checking for Absence of Access Rights, Proc. Eighth Ann. Computer Security Applications Conf. (ACSAC '92), Dec. 1992.
-
P. Ammann and R.S. Sandhu, "Implementing Transaction Control Expressions by Checking for Absence of Access Rights," Proc. Eighth Ann. Computer Security Applications Conf. (ACSAC '92), Dec. 1992.
-
-
-
-
3
-
-
55949092713
-
-
American National Standard for Information Technology, Role Based Access Control, Nat'l Standards Inst, Feb
-
American National Standard for Information Technology - Role Based Access Control, ANSI INCITS 359-2004, Am. Nat'l Standards Inst., Feb. 2004.
-
(2004)
ANSI INCITS 359-2004, Am
-
-
-
5
-
-
26844544427
-
Safety in Grammatical Protection Systems
-
T. Budd, "Safety in Grammatical Protection Systems," Int'l J. Computer and Information Sciences, vol. 12, no. 6, pp. 413-430, 1983.
-
(1983)
Int'l J. Computer and Information Sciences
, vol.12
, Issue.6
, pp. 413-430
-
-
Budd, T.1
-
6
-
-
0029695436
-
Tabled Evaluation with Delaying for General Logic Programs
-
Jan
-
W. Chen and D.S. Warren, "Tabled Evaluation with Delaying for General Logic Programs," J. ACM, vol. 43, no. 1, pp. 20-74, Jan. 1996.
-
(1996)
J. ACM
, vol.43
, Issue.1
, pp. 20-74
-
-
Chen, W.1
Warren, D.S.2
-
8
-
-
3142653715
-
Authorizations and Antichains,
-
PhD dissertation, Univ. of London, U.K
-
J. Crampton, "Authorizations and Antichains," PhD dissertation, Univ. of London, U.K., 2002.
-
(2002)
-
-
Crampton, J.1
-
9
-
-
3142510989
-
Administrative Scope: A Foundation for Role-Based Administrative Models
-
May
-
J. Crampton and G. Loizou, "Administrative Scope: A Foundation for Role-Based Administrative Models," ACM Trans. Information and System Security, vol. 6, no. 2, pp. 201-231, May 2003.
-
(2003)
ACM Trans. Information and System Security
, vol.6
, Issue.2
, pp. 201-231
-
-
Crampton, J.1
Loizou, G.2
-
10
-
-
0021509216
-
Linear-Time Algorithms for Testing the Satisfiability of Propositional Horn Formulae
-
W.F. Dowling and J.H. Gallier, "Linear-Time Algorithms for Testing the Satisfiability of Propositional Horn Formulae," J. Logic Programming, vol. 1, no. 3, pp. 267-284, 1984.
-
(1984)
J. Logic Programming
, vol.1
, Issue.3
, pp. 267-284
-
-
Dowling, W.F.1
Gallier, J.H.2
-
13
-
-
84992227458
-
Proposed NIST Standard for Role-Based Access Control
-
Aug
-
D.F. Ferraiolo, R.S. Sandhu, S. Gavrila, D.R. Kuhn, and R. Chandramouli, "Proposed NIST Standard for Role-Based Access Control," ACM Trans. Information and Systems Security, vol. 4, no. 3, pp. 224-274, Aug. 2001.
-
(2001)
ACM Trans. Information and Systems Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.S.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
15
-
-
55949109735
-
-
T.X.R. Group, The XSB Programming System, http://xsb.sourceforge. net/, 2008.
-
T.X.R. Group, The XSB Programming System, http://xsb.sourceforge. net/, 2008.
-
-
-
-
16
-
-
0009442659
-
Monotonic Protection Systems
-
R.A. DeMillo, D.P. Dobkin, A.K. Jones, and R.J. Lipton, eds, Academic Press, pp
-
M.A. Harrison and W.L. Ruzzo, "Monotonic Protection Systems," Foundations of Secure Computation, R.A. DeMillo, D.P. Dobkin, A.K. Jones, and R.J. Lipton, eds., Academic Press, pp. 461-471, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
-
17
-
-
0016984825
-
Protection in Operating Systems
-
Aug
-
M.A. Harrison, W.L. Ruzzo, and J.D. Ullman, "Protection in Operating Systems," Comm. ACM, vol. 19, no. 8, pp. 461-471, Aug. 1976.
-
(1976)
Comm. ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
19
-
-
84882574666
-
A Linear Time Algorithm for Deciding Security
-
Oct
-
A.K. Jones, R.J. Lipton, and L. Snyder, "A Linear Time Algorithm for Deciding Security," Proc. 17th Ann. IEEE Symp. Foundations of Computer Science (FOCS 76), pp. 33-41, Oct. 1976.
-
(1976)
Proc. 17th Ann. IEEE Symp. Foundations of Computer Science (FOCS 76)
, pp. 33-41
-
-
Jones, A.K.1
Lipton, R.J.2
Snyder, L.3
-
22
-
-
84957011508
-
Decidability of Safety in Graph-Based Models for Access Control
-
Oct
-
M. Koch, L.V. Mancini, and F. Parisi-Presicce, "Decidability of Safety in Graph-Based Models for Access Control," Proc. Seventh European Symp. Research in Computer Security (ESORICS '02), pp. 229-243, Oct. 2002.
-
(2002)
Proc. Seventh European Symp. Research in Computer Security (ESORICS '02)
, pp. 229-243
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
23
-
-
85008430937
-
A Graph-Based Formalism for RBAC
-
Aug
-
M. Koch, L.V. Mancini, and F. Parisi-Presicce, "A Graph-Based Formalism for RBAC," ACM Trans. Information and System Security, vol. 5, no. 3, pp. 332-365, Aug. 2002.
-
(2002)
ACM Trans. Information and System Security
, vol.5
, Issue.3
, pp. 332-365
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
24
-
-
0036085965
-
Design of a Role-Based Trust Management Framework
-
May
-
N. Li, J.C. Mitchell, and W.H. Winsborough, "Design of a Role-Based Trust Management Framework," Proc. IEEE Symp. Security and Privacy (S&P '02), pp. 114-130, May 2002.
-
(2002)
Proc. IEEE Symp. Security and Privacy (S&P '02)
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
25
-
-
30544438141
-
-
N. Li, J.C. Mitchell, and W.H. Winsborough, Beyond Proof-of-Compliance: Security Analysis in Trust Management, J. ACM, 52, no. 3, pp. 474-514, A preliminary version appeared in Proc. 2003 IEEE Symp. Security and Privacy (S&P), May 2005.
-
N. Li, J.C. Mitchell, and W.H. Winsborough, "Beyond Proof-of-Compliance: Security Analysis in Trust Management," J. ACM, vol. 52, no. 3, pp. 474-514, A preliminary version appeared in Proc. 2003 IEEE Symp. Security and Privacy (S&P), May 2005.
-
-
-
-
26
-
-
4143094794
-
-
N. Li and M.V. Tripunitara, Security Analysis in Role-Based Access Control, Proc. Ninth ACM Symp. Access Control Models and Technologies (SACMAT '04), pp. 126-135, June 2004.
-
N. Li and M.V. Tripunitara, "Security Analysis in Role-Based Access Control," Proc. Ninth ACM Symp. Access Control Models and Technologies (SACMAT '04), pp. 126-135, June 2004.
-
-
-
-
30
-
-
0033720107
-
Proc. 32nd Ann. ACM Symp. Theory of Computing (STOC '00)
-
extended abstract, pp, May
-
R. Motwani, R. Panigrahy, V.A. Saraswat, and S. Ventkatasubramanian, "On the Decidability of Accessibility Problems," Proc. 32nd Ann. ACM Symp. Theory of Computing (STOC '00), extended abstract, pp. 306-315, May 2000.
-
(2000)
, pp. 306-315
-
-
Motwani, R.1
Panigrahy, R.2
Saraswat, V.A.3
Ventkatasubramanian, S.4
-
35
-
-
0023999796
-
The Schematic Protection Model: Its Definition and Analysis for Acyclic Attenuating Systems
-
R.S. Sandhu, "The Schematic Protection Model: Its Definition and Analysis for Acyclic Attenuating Systems," J. ACM, vol. 35, no. 2, pp. 404-432, 1988.
-
(1988)
J. ACM
, vol.35
, Issue.2
, pp. 404-432
-
-
Sandhu, R.S.1
-
37
-
-
0033312487
-
Role-Based Administration of User-Role Assignment: The URA97 Model and Its Oracle Implementation
-
R.S. Sandhu and V. Bhamidipati, "Role-Based Administration of User-Role Assignment: The URA97 Model and Its Oracle Implementation," J. Computer Security, vol. 7, 1999.
-
(1999)
J. Computer Security
, vol.7
-
-
Sandhu, R.S.1
Bhamidipati, V.2
-
38
-
-
0001549660
-
The ARBAC97 Model for Role-Based Administration of Roles
-
Feb
-
R.S. Sandhu, V. Bhamidipati, and Q. Munawer, "The ARBAC97 Model for Role-Based Administration of Roles," ACM Trans. Information and Systems Security, vol. 2, no. 1, pp. 105-135, Feb. 1999.
-
(1999)
ACM Trans. Information and Systems Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.S.1
Bhamidipati, V.2
Munawer, Q.3
-
39
-
-
0030086382
-
Role-Based Access Control Models
-
Feb
-
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, "Role-Based Access Control Models," Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
40
-
-
0035790675
-
The Role-Based Access Control System of a European Bank: A Case Study and Discussion
-
A. Schaad, J. Moffett, and J. Jacob, "The Role-Based Access Control System of a European Bank: A Case Study and Discussion," Proc. Sixth ACM Symp. Access Control Models and Technologies (SACMAT '01), pp. 3-9, 2001.
-
(2001)
Proc. Sixth ACM Symp. Access Control Models and Technologies (SACMAT '01)
, pp. 3-9
-
-
Schaad, A.1
Moffett, J.2
Jacob, J.3
-
41
-
-
0036083194
-
Automated Generation and Analysis of Attack Graphs
-
O. Sheyner, J.W. Haines, S. Jha, R. Lippmann, and J.M. Wing, "Automated Generation and Analysis of Attack Graphs," Proc. IEEE Symp. Security and Privacy (S&P), 2002.
-
(2002)
Proc. IEEE Symp. Security and Privacy (S&P)
-
-
Sheyner, O.1
Haines, J.W.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
44
-
-
33947695249
-
Policy Analysis for Administrative Role-Based Access Control
-
July
-
A. Sasturkar, P. Yang, S. Stoller, and C. Ramakrishnan, "Policy Analysis for Administrative Role-Based Access Control," Proc. 19th Computer Security Foundations Workshop (CSFW '06), July 2006.
-
(2006)
Proc. 19th Computer Security Foundations Workshop (CSFW '06)
-
-
Sasturkar, A.1
Yang, P.2
Stoller, S.3
Ramakrishnan, C.4
|