-
1
-
-
57349117006
-
-
The ArgoUML Project
-
The ArgoUML Project, http://argouml.tigris.org.
-
-
-
-
2
-
-
34250778600
-
-
American National Standards Institute Inc
-
American National Standards Institute Inc. Role Based Access Control, ANSI-INCITS 359-2004, 2004.
-
(2004)
Role Based Access Control, ANSI-INCITS
, pp. 359-2004
-
-
-
3
-
-
34548089388
-
Towards realizing a formal RBAC model in real systems
-
New York, NY, USA, ACM
-
G.-J. Ahn and H. Hu. Towards realizing a formal RBAC model in real systems. In SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies, pages 215-224, New York, NY, USA, 2007. ACM.
-
(2007)
SACMAT '07: Proceedings of the 12th ACM symposium on Access control models and technologies
, pp. 215-224
-
-
Ahn, G.-J.1
Hu, H.2
-
4
-
-
84956993736
-
-
G.-J. Ahn and R. S. Sandhu. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. (TISSEC), 3(4):207-226, November 2000.
-
G.-J. Ahn and R. S. Sandhu. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. (TISSEC), 3(4):207-226, November 2000.
-
-
-
-
5
-
-
84856202162
-
Using event calculus to formalise policy specification and analysis
-
Washington, DC, USA, IEEE Computer Society
-
A. K. Bandara, E. C. Lupu, and A. Russo. Using event calculus to formalise policy specification and analysis. In POLICY '03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, page 26, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
POLICY '03: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks
, pp. 26
-
-
Bandara, A.K.1
Lupu, E.C.2
Russo, A.3
-
7
-
-
33244470893
-
Verification and change-impact analysis of access-control policies
-
New York, NY, USA, ACM
-
K. Fisler, S. Krishnamurthi, L. A. Meyerovich, and M. C. Tschantz. Verification and change-impact analysis of access-control policies. In ICSE '05: Proceedings of the 27th international conference on Software engineering, pages 196-205, New York, NY, USA, 2005. ACM.
-
(2005)
ICSE '05: Proceedings of the 27th international conference on Software engineering
, pp. 196-205
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.A.3
Tschantz, M.C.4
-
9
-
-
0038507387
-
Alloy: A lightweight object modelling notation
-
D. Jackson. Alloy: a lightweight object modelling notation. ACM Trans. Softw. Eng. Methodol., 11(2):256-290, 2002.
-
(2002)
ACM Trans. Softw. Eng. Methodol
, vol.11
, Issue.2
, pp. 256-290
-
-
Jackson, D.1
-
10
-
-
0033698475
-
Alcoa: The alloy constraint analyzer
-
New York, NY, USA, ACM
-
D. Jackson, I. Schechter, and H. Shlyahter. Alcoa: the alloy constraint analyzer. In ICSE '00: Proceedings of the 22nd international conference on Software engineering, pages 730-733, New York, NY, USA, 2000. ACM.
-
(2000)
ICSE '00: Proceedings of the 22nd international conference on Software engineering
, pp. 730-733
-
-
Jackson, D.1
Schechter, I.2
Shlyahter, H.3
-
11
-
-
84968352943
-
Policy management using access control spaces
-
T. Jaeger, X. Zhang, and A. Edwards. Policy management using access control spaces. ACM Trans. Inf. Syst. Secur., 6(3):327-364, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.3
, pp. 327-364
-
-
Jaeger, T.1
Zhang, X.2
Edwards, A.3
-
12
-
-
57349128486
-
A critique of the ANSI standard on role based access control
-
Technical Report TR 2005-29, Purdue University
-
N. Li, J.-W. Byun, and E. Bertino. A critique of the ANSI standard on role based access control. Technical Report TR 2005-29, Purdue University, 2005.
-
(2005)
-
-
Li, N.1
Byun, J.-W.2
Bertino, E.3
-
13
-
-
35348900179
-
A fault model and mutation testing of access control policies
-
New York, NY, USA, ACM
-
E. Martin and T. Xie. A fault model and mutation testing of access control policies. In WWW '07: Proceedings of the 16th international conference on World Wide Web, pages 667-676, New York, NY, USA, 2007. ACM.
-
(2007)
WWW '07: Proceedings of the 16th international conference on World Wide Web
, pp. 667-676
-
-
Martin, E.1
Xie, T.2
-
14
-
-
77949580340
-
Scalable and effective test generation for access control systems that employ RBAC policies that employ RBAC policies
-
Purdue University
-
A. Masood, A. Ghafoor, and A. Mathur. Scalable and effective test generation for access control systems that employ RBAC policies that employ RBAC policies. SERC-TR-285, Purdue University, 2005.
-
(2005)
SERC-TR-285
-
-
Masood, A.1
Ghafoor, A.2
Mathur, A.3
-
17
-
-
0242625217
-
A lightweight approach to specification and analysis of role-based access control extensions
-
New York, NY, USA, ACM
-
A. Schaad and J. D. Moffett. A lightweight approach to specification and analysis of role-based access control extensions. In SACMAT '02: Proceedings of the seventh A CM symposium, on Access control m,odels and technologies, pages 13-22, New York, NY, USA, 2002. ACM.
-
(2002)
SACMAT '02: Proceedings of the seventh A CM symposium, on Access control m,odels and technologies
, pp. 13-22
-
-
Schaad, A.1
Moffett, J.D.2
-
19
-
-
0028092505
-
A formal approach to conformance testing
-
Amsterdam, The Netherlands, The Netherlands, North-Holland Publishing Co
-
J. Tretmans. A formal approach to conformance testing. In Proceedings of the IFIP TC6/WG6.1 Sixth International W'orkshop on Protocol Test systems VI, pages 257-276, Amsterdam, The Netherlands, The Netherlands, 1994. North-Holland Publishing Co.
-
(1994)
Proceedings of the IFIP TC6/WG6.1 Sixth International W'orkshop on Protocol Test systems VI
, pp. 257-276
-
-
Tretmans, J.1
|