-
1
-
-
84964853055
-
Access Control: Policies, Models, and Mechanisms
-
Foundations of Security Analysis and Design
-
Samarati, P., di Vimercati, S.d.C.: Access control: Policies, models, and mechanisms. In: Focardi, R., Gorrieri, R. (eds.) FOSAD 2000. LNCS, vol.2171, pp. 137-196. Springer, Heidelberg (2001) (Pubitemid 33364380)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2171
, pp. 137-196
-
-
Samarati, P.1
De Vimercati, S.D.C.2
-
2
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38-47 (1996)
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
3
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224-274 (2001)
-
(2001)
ACM Trans. Inf. Syst. Secur
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
4
-
-
0141902726
-
Role based access control for the world wiDe web
-
Barkley, J.F., Cincotta, A.V., Ferraiolo, D.F., Gavrila, S., Kuhn, D.R.: Role based access control for the world wiDe web. In: Proc. 20th NISTNCSC National Information Systems Security Conference, pp. 331-340 (1997), http://citeseer.ist.psu.edu/101918.html
-
(1997)
Proc. 20th NISTNCSC National Information Systems Security Conference
, pp. 331-340
-
-
Barkley, J.F.1
Cincotta, A.V.2
Ferraiolo, D.F.3
Gavrila, S.4
Kuhn, D.R.5
-
5
-
-
34249933531
-
-
STTT
-
Jensen, K., Kristensen, L.M., Wells, L.: Coloured petri nets and CPN tools for modelling and validation of concurrent systems. STTT 9(3-4), 213-254 (2007)
-
(2007)
Coloured Petri Nets and CPN Tools for Modelling and Validation of Concurrent Systems
, vol.9
, Issue.3-4
, pp. 213-254
-
-
Jensen, K.1
Kristensen, L.M.2
Wells, L.3
-
6
-
-
27544484252
-
A Role-Based Access Control policy verification framework for real-time systems
-
Proceedings - 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems, WORDS 2005
-
Shafiq, B., Masood, A., Joshi, J., Ghafoor, A.: A role-based access control policy verification framework for real-time systems. In: WORDS 2005: Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems, pp. 13-20. IEEE Computer Society, Washington (2005), http://dx.doi.org/10.1109/WORDS.2005.11 (Pubitemid 41543712)
-
(2005)
Proceedings - International Workshop on Object-Oriented Real-Time Dependable Systems, WORDS
, pp. 13-20
-
-
Shafiq, B.1
Masood, A.2
Joshi, J.3
Ghafoor, A.4
-
7
-
-
0004068620
-
-
Ph.D. Thesis Institut Für Instrumentelle Mathematik Bonn
-
Petri, C.A.: Kommunikation mit automaten. Ph.D. thesis, Institut für instrumentelle Mathematik, Bonn (1962)
-
(1962)
Kommunikation Mit Automaten
-
-
Petri, C.A.1
-
9
-
-
34547247707
-
Modeling Chinese Wall policy using colored petri nets
-
DOI 10.1109/CIT.2006.123, Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006
-
Zhang, Z.L., Hong, F., Liao, J.G.: Modeling chinese wall policy using colored petri nets. In: CIT 2006: Proceedings of the Sixth IEEE International Conference on Computer and Information Technology, p. 162. IEEE Computer Society, Washington (2006), http://dx.doi.org/10.1109/CIT.2006.123 (Pubitemid 47145963)
-
(2006)
Proceedings - Sixth IEEE International Conference on Computer and Information Technology, CIT 2006
, pp. 4019950
-
-
Zhang, Z.-L.1
Hong, F.2
Liao, J.-G.3
-
10
-
-
84944792110
-
TRBAC: A temporal role-based access control model
-
doi:10.1145/501978.501979
-
Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4(3), 191-233 (2001), doi:10.1145/501978.501979
-
(2001)
ACM Trans. Inf. Syst. Secur
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
11
-
-
34548089388
-
Towards realizing a formal RBAC model in real systems
-
DOI 10.1145/1266840.1266875, SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
-
Ahn, G.J., Hu, H.: Towards realizing a formal RBAC model in real systems. In: SACMAT 2007: Proceedings of the 12th ACM symposium on Access control models and technologies, pp. 215-224. ACM, New York (2007), http://doi.acm.org/10. 1145/1266840.1266875 (Pubitemid 47287492)
-
(2007)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, pp. 215-224
-
-
Ahn, G.-J.1
Hu, H.2
-
12
-
-
17444406680
-
A generalized temporal role-based access control model
-
doi:10.1109/TKDE.2005.1
-
Joshi, J., Bertino, E., Latif, U., Ghafoor, A.: A generalized temporal role-based access control model. IEEE Transactions on Knowledge and Data Engineering 17(1), 4-23 (2005), doi:10.1109/TKDE.2005.1
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
13
-
-
0031611731
-
Formal specification for role based access control user/role and role/role relationship management
-
ACM, New York
-
Gavrila, S.I., Barkley, J.F.: Formal specification for role based access control user/role and role/role relationship management. In: RBAC 1998: Proceedings of the third ACM workshop on Role-based access control, pp. 81-90. ACM, New York (1998), http://doi.acm.org/10.1145/286884.286902
-
(1998)
RBAC 1998 Proceedings of the Third ACM Workshop on Role-based Access Control
, vol.1998
, pp. 81-90
-
-
Gavrila, S.I.1
Barkley, J.F.2
-
14
-
-
1542395657
-
Performance modeling and analysis of workflow
-
doi:10.1109/TSMCA.2003.819490
-
Li, J., Fan, Y., Zhou, M.: Performance modeling and analysis of workflow. IEEE Transactions on Systems, Man and Cybernetics, Part A 34(2), 229-242 (2004), doi:10.1109/TSMCA.2003.819490
-
(2004)
IEEE Transactions on Systems Man and Cybernetics Part A
, vol.34
, Issue.2
, pp. 229-242
-
-
Li, J.1
Fan, Y.2
Zhou, M.3
-
15
-
-
0242709308
-
Static verification of security requirements in role based CSCW systems
-
ACM, New York
-
Ahmed, T., Tripathi, A.R.: Static verification of security requirements in role based CSCW systems. In: SACMAT 2003: Proceedings of the eighth ACM symposium on Access control models and technologies, pp. 196-203. ACM, New York (2003), http://doi.acm.org/10.1145/775412.775438
-
(2003)
SACMAT 2003 Proceedings of the eighth ACM symposium on Access control models and technologies, pp.
, vol.2003
, pp. 196-203
-
-
Ahmed, T.1
Tripathi, A.R.2
-
16
-
-
0002719897
-
The application of Petri nets to workflow management
-
Van Der Aalst, W.: The application of petri nets to workflow management. The Journal of Circuits, Systems and Computers 8(1), 21-66 (1998) (Pubitemid 128540249)
-
(1998)
Journal of Circuits, Systems and Computers
, vol.8
, Issue.1
, pp. 21-66
-
-
Van Der Aalst, W.M.P.1
-
18
-
-
84955587319
-
Hook-up property for information flow secure nets
-
doi:10.1109/CSFW.1991.151582
-
Varadharajan, V.: Hook-up property for information flow secure nets. In: Proceedings of Computer Security Foundations Workshop IV, pp. 154-175 (1991), doi:10.1109/CSFW.1991.151582
-
(1991)
Proceedings of Computer Security Foundations Workshop IV
, pp. 154-175
-
-
Varadharajan, V.1
-
19
-
-
67650300785
-
PrT-net based analysis of information flow security nets
-
Juopperi, J.: PrT-net based analysis of information flow security nets. Research Report A34, Helsinki University of Technology, Department of Computer Science and Engineering, Digital Systems Laboratory, Espoo, Finland (1995)
-
(1995)
Research Report A34, Helsinki University of Technology, Department of Computer Science and Engineering, Digital Systems Laboratory, Espoo, Finland
-
-
Juopperi, J.1
-
23
-
-
15744367528
-
Security analysis of mandatory access control model
-
2004 IEEE International Conference on Systems, Man and Cybernetics, SMC 2004
-
Jiang, Y., Lin, C., Yin, H., Tan, Z.: Security analysis of mandatory access control model. In: IEEE International Conference on Systems, Man and Cybernetics, 2004, vol.6, pp. 5013-5018 (2004), doi:10.1109/ICSMC.2004.1400987 (Pubitemid 40408135)
-
(2004)
Conference Proceedings - IEEE International Conference on Systems, Man and Cybernetics
, vol.6
, pp. 5013-5018
-
-
Jiang, Y.1
Lin, C.2
Yin, H.3
Tan, Z.4
-
24
-
-
40249115100
-
Verification of strict integrity policy via petri nets
-
DOI 10.1109/ICSNC.2006.76, Second International Conference on Systems and Networks Communications, ICSNC 2006
-
Zhang, Z.L., Hong, F., Xiao, H.J.: Verification of strict integrity policy via petri nets. In: ICSNC 2006: Proceedings of the International Conference on Systems and Networks Communication, p. 23. IEEE Computer Society, Washington (2006), http://dx.doi.org/10.1109/ICSNC.2006.76 (Pubitemid 351332958)
-
(2006)
Second International Conference on Systems and Networks Communications, ICSNC 2006
, pp. 4041538
-
-
Zhang, Z.-L.1
Hong, F.2
Xiao, H.-J.3
-
26
-
-
0003400251
-
Secure computer systems mathematical foundations
-
MITRE Corporation, Bedford
-
Bell, D.E., LaPadula, L.J.: Secure computer systems: Mathematical foundations. Tech. Rep. MTR-2547, MITRE Corporation, Bedford (1973)
-
(1973)
Tech. Rep. MTR-2547
-
-
Bell, D.E.1
LaPadula, L.J.2
-
27
-
-
84874267738
-
Predicate/transition nets
-
In: Brauer, W., Reisig, W., Rozenberg, G. (eds.) LNCS. Springer, Heidelberg
-
Genrich, H.J.: Predicate/transition nets. In: Brauer, W., Reisig, W., Rozenberg, G. (eds.) APN 1986. LNCS, vol.254, pp. 207-247. Springer, Heidelberg (1987)
-
(1987)
APN 1986
, vol.254
, pp. 207-247
-
-
Genrich, H.J.1
-
29
-
-
0003400255
-
Integrity considerations for secure computer systems
-
MITRE Corporation, Bedford
-
Biba, K.J.: Integrity considerations for secure computer systems. Tech. Rep. MTR- 3153, MITRE Corporation, Bedford (1977)
-
(1977)
Tech. Rep. MTR- 3153
-
-
Biba, K.J.1
-
30
-
-
84949747356
-
An Authorization Model for Workflows
-
Atluri, V., kuang Huang, W.: An authorization model for workflows. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol.1146, pp. 44-64. Springer, Heidelberg (1996) (Pubitemid 126128893)
-
(1996)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1146
, pp. 44-64
-
-
Atluri, V.1
Huang, W.-K.2
-
31
-
-
12844263500
-
Modeling and analyzing of workflow authorization management
-
DOI 10.1007/s10922-004-0674-3
-
Yi, Z., Yong, Z., Weinong, W.: Modeling and analyzing of workflow authorization management. J. Netw. Syst. Manage. 12(4), 507-535 (2004), http://dx.doi.org/10.1007/s10922-004-0674-3 (Pubitemid 40168769)
-
(2004)
Journal of Network and Systems Management
, vol.12
, Issue.4
, pp. 507-535
-
-
Yi, Z.1
Yong, Z.2
Weinong, W.3
-
32
-
-
4444250230
-
Modular authorization and administration
-
Wedde, H.F., Lischka, M.: Modular authorization and administration. ACM Trans. Inf. Syst. Secur. 7(3), 363-391 (2004), http://doi.acm.org/10.1145/ 1015040.1015042
-
(2004)
ACM Trans. Inf. Syst. Secur
, vol.7
, Issue.3
, pp. 363-391
-
-
WedDe, H.F.1
Lischka, M.2
-
34
-
-
67650297770
-
-
Zao, J., Wee, H., Chu, J., Jackson, D.: RBAC schema verification using lightweight formal model and constraint analysis (2002), http://alloy.mit.edu/ community/node/221
-
(2002)
RBAC Schema Verification Using Lightweight Formal Model and Constraint Analysis
-
-
Zao, J.1
Wee, H.2
Chu, J.3
Jackson, D.4
-
35
-
-
33845944921
-
A verifiable formal specification for RBAC model with constraints of separation of duty
-
Information Security and Cryptology - Second SKLOIS Conference, Inscrypt 2006, Proceedings
-
Yuan, C., He, Y., He, J., Zhou, Z.: A verifiable formal specification for RBAC model with constraints of separation of duty. In: Lipmaa, H., Yung, M., Lin, D. (eds.) Inscrypt 2006. LNCS, vol.4318, pp. 196-210. Springer, Heidelberg (2006) (Pubitemid 46030733)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4318
, pp. 196-210
-
-
Yuan, C.1
He, Y.2
He, J.3
Zhou, Y.4
-
36
-
-
14044273010
-
A first step towards formal verification of security policy properties for RBAC
-
Proceedings - Fourth International Conference on Quality Software, QSIC 2004
-
Drouineaud, M., Bortin, M., Torrini, P., Sohr, K.: A first step towards formal verification of security policy properties for RBAC. In: QSIC 2004: Proceedings of the Quality Software, Fourth International Conference, pp. 60-67. IEEE Computer Society, Washington (2004), http://dx.doi.org/10.1109/QSIC.2004.2 (Pubitemid 40276398)
-
(2004)
Proceedings - Fourth International Conference on Quality Software, QSIC 2004
, pp. 60-67
-
-
Drouineaud, M.1
Bortin, M.2
Torrini, P.3
Sohr, K.4
-
37
-
-
33646406549
-
Representation and reasoning on RBAC: A description logic approach
-
In: Van Hung, D., Wirsing, M. (eds.) LNCS. Springer, Heidelberg
-
Zhao, C., Heilili, N., Liu, S., Lin, Z.: Representation and reasoning on RBAC: A description logic approach. In: Van Hung, D., Wirsing, M. (eds.) ICTAC 2005. LNCS, vol.3722, pp. 381-393. Springer, Heidelberg (2005)
-
(2005)
ICTAC 2005
, vol.3722
, pp. 381-393
-
-
Zhao, C.1
Heilili, N.2
Liu, S.3
Lin, Z.4
-
38
-
-
0038507387
-
Alloy: A lightweight object modelling notation
-
DOI 10.1145/505145.505149
-
Jackson, D.: Alloy: a lightweight object modelling notation. ACM Trans. Softw. Eng. Methodol. 11(2), 256-290 (2002), http://doi.acm.org/10.1145/505145. 505149 (Pubitemid 44159313)
-
(2002)
ACM Transactions on Software Engineering and Methodology
, vol.11
, Issue.2
, pp. 256-290
-
-
Jackson, D.1
-
40
-
-
84957612105
-
Z/EVES version 1.5: An overview
-
In: Hutter, D., Traverso, P. (eds.) LNCS. Springer, Heidelberg
-
Canada, O.: Z/EVES version 1.5: An overview. In: Hutter, D., Traverso, P. (eds.) FM-Trends 1998. LNCS, vol.1641, pp. 367-376. Springer, Heidelberg (1999)
-
(1999)
FM-Trends 1998
, vol.1641
, pp. 367-376
-
-
Canada, O.1
-
41
-
-
16244410402
-
HOL-Z 2.0: A proof environment for Z-specifications
-
Brucker, A.D., Rittinger, F., Wol, B., ludwigs-universitat Freiburg, A.: HOL-Z 2.0: A proof environment for Z-specifications. Journal of Universal Computer Science 9, 152-172 (2002) (Pubitemid 41151358)
-
(2003)
Journal of Universal Computer Science
, vol.9
, Issue.2
, pp. 152-172
-
-
Brucker, A.D.1
Ritthiger, F.2
Wolff, B.3
-
43
-
-
84955590178
-
Analyzing Separation of Duties in Petri Net Workflows
-
Information Assurance in Computer Networks Methods, Models and Architectures for Network Security
-
Knorr, K., Weidner, H.: Analyzing separation of duties in petri net workflows. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol.2052, pp. 102-114. Springer, Heidelberg (2001) (Pubitemid 33275970)
-
(2001)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2052
, pp. 102-114
-
-
Knorr, K.1
Weidner, H.2
-
44
-
-
85006937063
-
-
ACM Trans. Inf. Syst. Secur
-
Jaeger, T., Tidswell, J.E.: Practical safety in flexible access control models. ACM Trans. Inf. Syst. Secur. 4(2), 158-190 (2001), http://doi.acm.org/ 10.1145/501963.501966
-
(2001)
Practical safety in flexible access control models
, vol.4
, Issue.2
, pp. 158-190
-
-
Jaeger, T.1
Tidswell, J.E.2
-
45
-
-
0242625198
-
An approach to engineer and enforce context constraints in an RBAC environment
-
ACM, New York
-
Neumann, G., Strembeck, M.: An approach to engineer and enforce context constraints in an RBAC environment. In: SACMAT 2003: Proceedings of the eighth ACM symposium on Access control models and technologies, pp. 65-79. ACM, New York (2003), http://doi.acm.org/10.1145/775412.775421
-
(2003)
SACMAT 2003 Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies
, vol.2003
, pp. 65-79
-
-
Neumann, G.1
Strembeck, M.2
-
46
-
-
0001940210
-
The role graph model and conflict of interest
-
Nyanchama, M., Osborn, S.: The role graph model and conflict of interest. ACM Trans. Inf. Syst. Secur. 2(1), 3-33 (1999), http://doi.acm.org/10.1145/ 300830.300832
-
(1999)
ACM Trans. Inf. Syst. Secur
, vol.2
, Issue.1
, pp. 3-33
-
-
Nyanchama, M.1
Osborn, S.2
-
47
-
-
85008430937
-
A graph-based formalism for RBAC
-
Koch, M., Mancini, L.V., Parisi-Presicce, F.: A graph-based formalism for RBAC. ACM Trans. Inf. Syst. Secur. 5(3), 332-365 (2002), http://doi.acm.org/10. 1145/545186.545191
-
(2002)
ACM Trans. Inf. Syst. Secur
, vol.5
, Issue.3
, pp. 332-365
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
48
-
-
0016984825
-
Protection in operating systems
-
Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Commun. ACM 19(8), 461-471 (1976), http://doi.acm.org/10.1145/360303. 360333
-
(1976)
Commun. ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
49
-
-
45849143181
-
Designing coloured petri net models: A method
-
Denmark
-
Choppy, C., Petrucci, L., Reggio, G.: Designing coloured petri net models: a method. In: Proceedings of the 8th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools Aarhus, Denmark, pp. 22-24 (2007)
-
(2007)
Proceedings of the 8th Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools Aarhus
, pp. 22-24
-
-
Choppy, C.1
Petrucci, L.2
Reggio, G.3
|