-
1
-
-
0242709308
-
Static verification of security requirements in role based cscw systems
-
New York, NY, USA, ACM Press
-
Tanvir Ahmed and Anand R. Tripathi. Static verification of security requirements in role based cscw systems. In SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies, pages 196-203, New York, NY, USA, 2003. ACM Press.
-
(2003)
SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies
, pp. 196-203
-
-
Ahmed, T.1
Tripathi, A.R.2
-
2
-
-
0023558367
-
Recognizing safety and liveness
-
Bowen Alpern and Fred B. Schneider. Recognizing safety and liveness. Distributed Computing, 2(3): 117-126, 1987.
-
(1987)
Distributed Computing
, vol.2
, Issue.3
, pp. 117-126
-
-
Alpern, B.1
Schneider, F.B.2
-
4
-
-
84944792110
-
Trbac: A temporal role-based access control model
-
Elisa Bertino, Piero Andrea Bonatti, and Elena Ferrari. Trbac: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur., 4(3): 191-233, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Andrea Bonatti, P.2
Ferrari, E.3
-
5
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
February
-
Elisa Bertino, Elena Ferrari, and Vijay Atluri. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security, 2(1):65-104, February 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
6
-
-
33749558954
-
Specifying and reasoning about dynamic access-control policies
-
Daniel J. Dougherty, Kathi Fisler, and Shriram Krishnamurthi. Specifying and reasoning about dynamic access-control policies. In IJCAR, pages 632-646, 2006.
-
(2006)
IJCAR
, pp. 632-646
-
-
Dougherty, D.J.1
Fisler, K.2
Krishnamurthi, S.3
-
7
-
-
0036090387
-
Statl: An attack language for state-based intrusion detection
-
Steven T. Eckmann, Giovanni Vigna, and Richard A. Kemmerer. Statl: an attack language for state-based intrusion detection. J. Comput. Secur., 10(1-2):71-103, 2002.
-
(2002)
J. Comput. Secur
, vol.10
, Issue.1-2
, pp. 71-103
-
-
Eckmann, S.T.1
Vigna, G.2
Kemmerer, R.A.3
-
8
-
-
33244470893
-
Verification and change-impact analysis of access-control policies
-
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyerovich, and Michael Carl Tschantz. Verification and change-impact analysis of access-control policies. In ICSE '05: Proceedings of the 27th international conference on Software engineering, pages 196-205, 2005.
-
(2005)
ICSE '05: Proceedings of the 27th international conference on Software engineering
, pp. 196-205
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.A.3
Carl Tschantz, M.4
-
9
-
-
33646187475
-
Extending the take-grant protection system
-
Department of Computer Science, University of California at Davis
-
Jeremy Frank and Matt Bishop. Extending the take-grant protection system. Technical Report Technical Report, Department of Computer Science, University of California at Davis, 1996.
-
(1996)
Technical Report Technical Report
-
-
Frank, J.1
Bishop, M.2
-
10
-
-
0016984825
-
Protection in operating systems
-
August
-
Michael A. Harrison, Walter L. Ruzzo, and Jeffrey D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461-471, August 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
12
-
-
0038825043
-
Beyond proof-of-compliance: Safety and availability analysis in trust management
-
IEEE Computer Society Press, May
-
Ninghui Li, William H. Winsborough, and John C. Mitchell. Beyond proof-of-compliance: Safety and availability analysis in trust management. In Proceedings of IEEE Symposium on Security and Privacy, pages 123-139. IEEE Computer Society Press, May 2003.
-
(2003)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 123-139
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
13
-
-
33845332032
-
Towards continuous usage control on grid computational services
-
0:82
-
Fabio Martinelli, Paolo Mori, and Anna Vaccarelli. Towards continuous usage control on grid computational services. icas-icns, 0:82, 2005.
-
(2005)
icas-icns
-
-
Martinelli, F.1
Mori, P.2
Vaccarelli, A.3
-
14
-
-
0026851842
-
The typed access matrix model
-
Washington, DC, USA, IEEE Computer Society
-
Ravi S. Sandhu. The typed access matrix model. In SP '92: Proceedings of the 1992 IEEE Symposium on Security and Privacy, page 122, Washington, DC, USA, 1992. IEEE Computer Society.
-
(1992)
SP '92: Proceedings of the 1992 IEEE Symposium on Security and Privacy
, pp. 122
-
-
Sandhu, R.S.1
-
15
-
-
33748067444
-
A model-checking approach to analysing organisational controls in a loan origination process
-
New York, NY, USA, ACM Press
-
Andreas Schaad, Volkmar Lotz, and Karsten Sohr. A model-checking approach to analysing organisational controls in a loan origination process. In SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies, pages 139-149, New York, NY, USA, 2006. ACM Press.
-
(2006)
SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies
, pp. 139-149
-
-
Schaad, A.1
Lotz, V.2
Sohr, K.3
-
16
-
-
33644553795
-
A Case Study of Separation of Duty Properties in The Context of the Austrian "eLaw" Process
-
Santa Fe, Nex Mexico, March
-
Andreas Schaad, Pascal Spadone, and Helmut Weischsel. A Case Study of Separation of Duty Properties in The Context of the Austrian "eLaw" Process. In Proceedings of the 20th Annual ACM Symposium on Applied Computing (SAC'05), Santa Fe, Nex Mexico, March 2005.
-
(2005)
Proceedings of the 20th Annual ACM Symposium on Applied Computing (SAC'05)
-
-
Schaad, A.1
Spadone, P.2
Weischsel, H.3
-
17
-
-
84881225236
-
Enforceable security policies
-
Fred B. Schneider. Enforceable security policies. ACM Trans. Inf. Syst. Secur., 3(1):30-50, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, Issue.1
, pp. 30-50
-
-
Schneider, F.B.1
-
18
-
-
11244282882
-
-
R. Sekar, V. Venkatakrishnan, S. Basu, S. Bhatkar, and D. DuVarney. Model-carrying code: A practical approach for safe execution of untrusted applications, 2003.
-
(2003)
Model-carrying code: A practical approach for safe execution of untrusted applications
-
-
Sekar, R.1
Venkatakrishnan, V.2
Basu, S.3
Bhatkar, S.4
DuVarney, D.5
-
19
-
-
84988603769
-
Towards a task-based paradigm for flexible and adaptable access control in distributed applications
-
New York, NY, USA, ACM Press
-
R. K. Thomas and R. S. Sandhu. Towards a task-based paradigm for flexible and adaptable access control in distributed applications. In NSPW '92-93: Proceedings on the 1992-1993 workshop on New security paradigms, pages 138-142, New York, NY, USA, 1993. ACM Press.
-
(1993)
NSPW '92-93: Proceedings on the 1992-1993 workshop on New security paradigms
, pp. 138-142
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
20
-
-
0002841051
-
Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management
-
London, UK, UK, Chapman & Hall, Ltd
-
Roshan K. Thomas and Ravi S. Sandhu. Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management. In Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI, pages 166-181, London, UK, UK, 1998. Chapman & Hall, Ltd.
-
(1998)
Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI
, pp. 166-181
-
-
Thomas, R.K.1
Sandhu, R.S.2
-
21
-
-
34748893646
-
Direct static enforcement of high-level security policies
-
New York, NY, USA, ACM Press
-
Qihua Wang and Ninghui Li. Direct static enforcement of high-level security policies. In ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security, pages 214-225, New York, NY, USA, 2007. ACM Press.
-
(2007)
ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security
, pp. 214-225
-
-
Wang, Q.1
Li, N.2
|