-
1
-
-
85031151129
-
The RSL99 language for role-based separation of duty constraints
-
ACM Press, New York
-
Ahn, G.-J., Sandhu, R.: The RSL99 language for role-based separation of duty constraints. In: Proc. of RBAC 1999, pp. 43–54. ACM Press, New York (1999)
-
(1999)
Proc. of RBAC 1999
, pp. 43-54
-
-
Ahn, G.-J.1
Sandhu, R.2
-
2
-
-
0031597160
-
The use of goals to surface requirements for evolving systems
-
IEEE Press, Los Alamitos
-
Antón, A.I., Potts, C.: The use of goals to surface requirements for evolving systems. In: Proc. of ICSE 1998, pp. 157–166. IEEE Press, Los Alamitos (1998)
-
(1998)
Proc. of ICSE 1998
, pp. 157-166
-
-
Antón, A.I.1
Potts, C.2
-
4
-
-
33745471209
-
Model Driven Security: From UML Models to Access Control Infrastructures
-
Basin, D., Doser, J., Lodderstedt, T.: Model Driven Security: from UML Models to Access Control Infrastructures. TOSEM 15(1), 39–91 (2006)
-
(2006)
TOSEM
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
5
-
-
4944223328
-
Cassandra: Flexible trust management, applied to electronic health records
-
IEEE Press, Los Alamitos
-
Becker, M.Y., Sewell, P.: Cassandra: flexible trust management, applied to electronic health records. In: Proc. of CSFW 2004, pp. 139–154. IEEE Press, Los Alamitos (2004)
-
(2004)
Proc. of CSFW 2004
, pp. 139-154
-
-
Becker, M.Y.1
Sewell, P.2
-
6
-
-
0003400251
-
Secure Computer System: Unified Exposition and MULTICS Interpretation
-
The MITRE Corporation, Bedford, MA
-
Bell, D.E., LaPadula, L.J.: Secure Computer System: Unified Exposition and MULTICS Interpretation. Technical Report MTR-2997 Rev. 1, The MITRE Corporation, Bedford, MA (1976)
-
(1976)
Technical Report MTR-2997 Rev
, vol.1
-
-
Bell, D.E.1
Lapadula, L.J.2
-
7
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. TISSEC 2(1), 65–104 (1999)
-
(1999)
TISSEC
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
8
-
-
35348977674
-
Model based development of access policies
-
Breu, R., Popp, G., Alam, M.: Model based development of access policies. STTT 9, 457–470 (2007)
-
(2007)
STTT
, vol.9
, pp. 457-470
-
-
Breu, R.1
Popp, G.2
Alam, M.3
-
9
-
-
33646062882
-
External Sources of Computation for Answer Set Solvers
-
Baral, C., Greco, G., Leone, N., Terracina, G. (eds.), Springer, Heidelberg
-
Calimeri, F., Ianni, G.: External Sources of Computation for Answer Set Solvers. In: Baral, C., Greco, G., Leone, N., Terracina, G. (eds.) LPNMR 2005. LNCS (LNAI), vol. 3662, pp. 105–118. Springer, Heidelberg (2005)
-
(2005)
LPNMR 2005. LNCS (LNAI)
, vol.3662
, pp. 105-118
-
-
Calimeri, F.1
Ianni, G.2
-
10
-
-
47649094419
-
Role engineering
-
Coyne, E.J.: Role engineering. In: Proc. of RBAC 1995, pp. 15–16. ACM Press, New York (1995)
-
(1995)
Proc. of RBAC
, pp. 15-16
-
-
Coyne, E.J.1
-
11
-
-
27644540336
-
On Modelling Access Policies: Relating Roles to their Organisational Context
-
Crook, R., Ince, D., Nuseibeh, B.: On Modelling Access Policies: Relating Roles to their Organisational Context. In: Proc. of RE 2005, pp. 157–166 (2005)
-
(2005)
Proc. of RE
, vol.2005
, pp. 157-166
-
-
Crook, R.1
Ince, D.2
Nuseibeh, B.3
-
12
-
-
84944048132
-
The Ponder Policy Specification Language
-
Sloman, M., Lobo, J., Lupu, E.C. (eds.), Springer, Heidelberg
-
Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, pp. 18–39. Springer, Heidelberg (2001)
-
(2001)
POLICY 2001. LNCS
, vol.1995
, pp. 18-39
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
13
-
-
0027574423
-
Goal-directed Requirements Acquisition
-
Dardenne, A., van Lamsweerde, A., Fickas, S.: Goal-directed Requirements Acquisition. Sci. of Comp. Prog. 20, 3–50 (1993)
-
(1993)
Sci. of Comp. Prog.
, vol.20
, pp. 3-50
-
-
Dardenne, A.1
Van Lamsweerde, A.2
Fickas, S.3
-
14
-
-
20444505719
-
MAC and UML for secure software design
-
ACM Press, New York
-
Doan, T., Demurjian, S., Ting, T.C., Ketterl, A.: MAC and UML for secure software design. In: Proc. of FMSE 2004, pp. 75–85. ACM Press, New York (2004)
-
(2004)
Proc. of FMSE 2004
, pp. 75-85
-
-
Doan, T.1
Demurjian, S.2
Ting, T.C.3
Ketterl, A.4
-
15
-
-
0024663629
-
A framework for expressing models of security policy
-
IEEE Press, Los Alamitos
-
Dobson, J.E., McDermid, J.A.: A framework for expressing models of security policy. In: Proc. of Symp. on Sec. and Privacy, pp. 229–239. IEEE Press, Los Alamitos (1989)
-
(1989)
Proc. of Symp. on Sec. and Privacy
, pp. 229-239
-
-
Dobson, J.E.1
McDermid, J.A.2
-
16
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate intranet
-
Ferraiolo, D.F., Barkley, J.F., Kuhn, D.R.: A role-based access control model and reference implementation within a corporate intranet. TISSEC 2(1), 34–64 (1999)
-
(1999)
TISSEC
, vol.2
, Issue.1
, pp. 34-64
-
-
Ferraiolo, D.F.1
Barkley, J.F.2
Kuhn, D.R.3
-
18
-
-
84924413055
-
Security and Trust Requirements Engineering
-
Aldini, A., Gorrieri, R., Martinelli, F. (eds.), Springer, Heidelberg
-
Giorgini, P., Massacci, F., Zannone, N.: Security and Trust Requirements Engineering. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005. LNCS, vol. 3655, pp. 237–272. Springer, Heidelberg (2005)
-
(2005)
FOSAD 2005. LNCS
, vol.3655
, pp. 237-272
-
-
Giorgini, P.1
Massacci, F.2
Zannone, N.3
-
19
-
-
0031682433
-
On the formal definition of separation-of-duty policies and their composition
-
IEEE Press, Los Alamitos
-
Gligor, V.D., Gavrila, S.I., Ferraiolo, D.: On the formal definition of separation-of-duty policies and their composition. In: Proc. of Symp. on Sec. and Privacy, pp. 172–183. IEEE Press, Los Alamitos (1998)
-
(1998)
Proc. of Symp. on Sec. and Privacy
, pp. 172-183
-
-
Gligor, V.D.1
Gavrila, S.I.2
Ferraiolo, D.3
-
20
-
-
24344462080
-
A Framework for Modeling Privacy Requirements in Role Engineering
-
He, Q., Antón, A.I.: A Framework for Modeling Privacy Requirements in Role Engineering. In: Proc. of REFSQ 2003, pp. 137–146 (2003)
-
(2003)
Proc. of REFSQ
, vol.2003
, pp. 137-146
-
-
He, Q.1
Antón, A.I.2
-
22
-
-
57349119890
-
Enabling verification and conformance testing for access control model
-
ACM Press, New York
-
Hu, H., Ahn, G.: Enabling verification and conformance testing for access control model. In: Proc. of SACMAT 2008, pp. 195–204. ACM Press, New York (2008)
-
(2008)
Proc. of SACMAT 2008
, pp. 195-204
-
-
Hu, H.1
Ahn, G.2
-
23
-
-
0001619596
-
Flexible support for multiple access control policies
-
Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. TODS 26(2), 214–260 (2001)
-
(2001)
TODS
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
25
-
-
0035790711
-
Access control mechanisms for inter-organizational workflow
-
ACM Press, New York
-
Kang, M.H., Park, J.S., Froscher, J.N.: Access control mechanisms for inter-organizational workflow. In: Proc. of SACMAT 2001, pp. 66–74. ACM Press, New York (2001)
-
(2001)
Proc. of SACMAT 2001
, pp. 66-74
-
-
Kang, M.H.1
Park, J.S.2
Froscher, J.N.3
-
26
-
-
33745244351
-
The DLV System for Knowledge Representation and Reasoning
-
Leone, N., Pfeifer, G., Faber, W., Eiter, T., Gottlob, G., Perri, S., Scarcello, F.: The DLV System for Knowledge Representation and Reasoning. TOCL 7(3), 499–562 (2006)
-
(2006)
TOCL
, vol.7
, Issue.3
, pp. 499-562
-
-
Leone, N.1
Pfeifer, G.2
Faber, W.3
Eiter, T.4
Gottlob, G.5
Perri, S.6
Scarcello, F.7
-
27
-
-
62349090353
-
RT: A Role-based Trust-management Framework
-
IEEE Press, Los Alamitos
-
Li, N., Mitchell, J.C.: RT: A Role-based Trust-management Framework. In: Proc. of DISCEX 2003, vol. 1, pp. 201–212. IEEE Press, Los Alamitos (2003)
-
(2003)
Proc. of DISCEX 2003
, vol.1
, pp. 201-212
-
-
Li, N.1
Mitchell, J.C.2
-
28
-
-
84942866002
-
Security and Privacy Requirements Analysis within a Social Setting
-
IEEE Press, Los Alamitos
-
Liu, L., Yu, E.S.K., Mylopoulos, J.: Security and Privacy Requirements Analysis within a Social Setting. In: Proc. of RE 2003, pp. 151–161. IEEE Press, Los Alamitos (2003)
-
(2003)
Proc. of RE 2003
, pp. 151-161
-
-
Liu, L.1
Yu, E.S.K.2
Mylopoulos, J.3
-
29
-
-
34548563765
-
Computer-Aided Support for Secure Tropos
-
Massacci, F., Mylopoulos, J., Zannone, N.: Computer-Aided Support for Secure Tropos. ASE 14(3), 341–364 (2007)
-
(2007)
ASE
, vol.14
, Issue.3
, pp. 341-364
-
-
Massacci, F.1
Mylopoulos, J.2
Zannone, N.3
-
30
-
-
84898314703
-
An Ontology for Secure Socio-Technical Systems
-
The IDEA Group
-
Massacci, F., Mylopoulos, J., Zannone, N.: An Ontology for Secure Socio-Technical Systems. In: Handbook of Ontologies for Business Interaction, ch. XI, p. 188. The IDEA Group (2008)
-
(2008)
Handbook of Ontologies for Business Interaction, Ch. XI
, pp. 188
-
-
Massacci, F.1
Mylopoulos, J.2
Zannone, N.3
-
31
-
-
33746078483
-
Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank
-
MIT Press, Cambridge (to appear
-
Massacci, F., Zannone, N.: Detecting Conflicts between Functional and Security Requirements with Secure Tropos: John Rusnak and the Allied Irish Bank. In: Social Modeling for Requirements Engineering. MIT Press, Cambridge (to appear, 2008)
-
Social Modeling for Requirements Engineering
, pp. 2008
-
-
Massacci, F.1
Zannone, N.2
-
32
-
-
33750273034
-
Applying a Security Requirements Engineering Process
-
Gollmann, D., Meier, J., Sabelfeld, A. (eds.), Springer, Heidelberg
-
Mellado, D., Fernández-Medina, E., Piattini, M.: Applying a Security Requirements Engineering Process. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 192–206. Springer, Heidelberg (2006)
-
(2006)
ESORICS 2006. LNCS
, vol.4189
, pp. 192-206
-
-
Mellado, D.1
Fernández-Medina, E.2
Piattini, M.3
-
34
-
-
85025160414
-
Wachtell, Lipton, Rosen, and Katz
-
Allfirst Financial Inc., and Allfirst Bank Concerning Currency Trading Losses (March 12, 2003)
-
Promontory Financial Group, Wachtell, Lipton, Rosen, and Katz. Report to the Board and Directors of Allied Irish Bank P.L.C., Allfirst Financial Inc., and Allfirst Bank Concerning Currency Trading Losses (March 12, 2003)
-
Report to the Board and Directors of Allied Irish Bank P.L.C.
-
-
-
35
-
-
4143147399
-
Using UML to visualize role-based access control constraints
-
ACM Press, New York
-
Ray, I., Li, N., France, R., Kim, D.-K.: Using UML to visualize role-based access control constraints. In: Proc. of SACMAT 2004, pp. 115–124. ACM Press, New York (2004)
-
(2004)
Proc. of SACMAT 2004
, pp. 115-124
-
-
Ray, I.1
Li, N.2
France, R.3
Kim, D.-K.4
-
36
-
-
85025138424
-
Data Protection & Compliance in Context
-
Room, S.: Data Protection & Compliance in Context. BCS (2007)
-
(2007)
BCS
-
-
Room, S.1
-
37
-
-
0016555241
-
The Protection of Information in Computer Systems
-
Saltzer, J.H., Schroeder, M.D.: The Protection of Information in Computer Systems. Proceedings of the IEEE 63(9), 1278–1308 (1975)
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
38
-
-
0037848141
-
Access Control: Policies, Models, and Mechanisms
-
Focardi, R., Gorrieri, R. (eds.), Springer, Heidelberg
-
Samarati, P., di Vimercati, S.D.C.: Access Control: Policies, Models, and Mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2001. LNCS, vol. 2946, pp. 137–196. Springer, Heidelberg (2004)
-
(2004)
FOSAD 2001. LNCS
, vol.2946
, pp. 137-196
-
-
Samarati, P.1
Di Vimercati, S.D.C.2
-
39
-
-
0030086382
-
Role-Based Access Control Models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Comp. 29(2), 38–47 (1996)
-
(1996)
IEEE Comp
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
40
-
-
33748067444
-
A model-checking approach to analysing organisational controls in a loan origination process
-
ACM Press, New York
-
Schaad, A., Lotz, V., Sohr, K.: A model-checking approach to analysing organisational controls in a loan origination process. In: Proc. of SACMAT 2006, pp. 139–149. ACM Press, New York (2006)
-
(2006)
Proc. of SACMAT 2006
, pp. 139-149
-
-
Schaad, A.1
Lotz, V.2
Sohr, K.3
-
41
-
-
0030644642
-
Separation of duty in role-based environments
-
IEEE Press, Los Alamitos
-
Simon, R., Zurko, M.E.: Separation of duty in role-based environments. In: Proc. of CSFW 1997, pp. 183–194. IEEE Press, Los Alamitos (1997)
-
(1997)
Proc. of CSFW 1997
, pp. 183-194
-
-
Simon, R.1
Zurko, M.E.2
-
42
-
-
44649149548
-
Analyzing and managing role-based access control policies
-
Sohr, K., Drouineaud, M., Ahn, G.-J., Gogolla, M.: Analyzing and managing role-based access control policies. TKDE 20(7), 924–939 (2008)
-
(2008)
TKDE
, vol.20
, Issue.7
, pp. 924-939
-
-
Sohr, K.1
Drouineaud, M.2
Ahn, G.-J.3
Gogolla, M.4
|