-
1
-
-
84856019272
-
A formal model for parameterized role-based access control
-
Dimitrakos, T, Martinelli, F, eds, Springer, Heidelberg
-
Abdallah, A.E., Khayat, E.J.: A formal model for parameterized role-based access control. In: Dimitrakos, T., Martinelli, F. (eds.) Formal Aspects in Security and Trust, pp. 233-246. Springer, Heidelberg (2004)
-
(2004)
Formal Aspects in Security and Trust
, pp. 233-246
-
-
Abdallah, A.E.1
Khayat, E.J.2
-
2
-
-
34248232936
-
A framework for implementing pluggable type systems
-
ACM Press, New York
-
Andreae, C., Noble, J., Markstrum, S., Millstein, T.: A framework for implementing pluggable type systems. In: OOPSLA 2006: Proceedings of the 21st annual ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications, pp. 57-74. ACM Press, New York (2006)
-
(2006)
OOPSLA 2006: Proceedings of the 21st annual ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications
, pp. 57-74
-
-
Andreae, C.1
Noble, J.2
Markstrum, S.3
Millstein, T.4
-
3
-
-
0347380552
-
Supporting relationships in access control using role based access control
-
ACM, New York
-
Barkley, J., Beznosov, K., Uppal, J.: Supporting relationships in access control using role based access control. In: RBAC 1999: Proceedings of the fourth ACM workshop on Role-based access control, pp. 55-65. ACM, New York (1999)
-
(1999)
RBAC 1999: Proceedings of the fourth ACM workshop on Role-based access control
, pp. 55-65
-
-
Barkley, J.1
Beznosov, K.2
Uppal, J.3
-
4
-
-
35048898814
-
Privacy and utility in business processes. In: CSF
-
Los Alamitos
-
Barth, A., Mitchell, J., Datta, A., Sundaram, S.: Privacy and utility in business processes. In: CSF 2007, pp. 279-294. IEEE Computer Society Press, Los Alamitos (2007)
-
(2007)
279-294. IEEE Computer Society Press
, pp. 2007
-
-
Barth, A.1
Mitchell, J.2
Datta, A.3
Sundaram, S.4
-
5
-
-
33947705701
-
Information governance in nhs's npfit: A case for policy specification
-
Becker, M.: Information governance in nhs's npfit: A case for policy specification. International Journal of Medical Informatics (IJMI) 76(5-6) (2007)
-
(2007)
International Journal of Medical Informatics (IJMI)
, vol.76
, Issue.5-6
-
-
Becker, M.1
-
7
-
-
0348137542
-
Ownership types for flexible alias protection
-
ACM Press, New York
-
Clarke, D.G., Potter, J.M., Noble, J.: Ownership types for flexible alias protection. In: Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, pp. 48-64. ACM Press, New York (1998)
-
(1998)
Proceedings of the 13th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
, pp. 48-64
-
-
Clarke, D.G.1
Potter, J.M.2
Noble, J.3
-
8
-
-
69949153690
-
-
eXtensible Access Control Markup Language (XACML) Version 2.03. OASIS Standard February 2005
-
eXtensible Access Control Markup Language (XACML) Version 2.03. OASIS Standard (February 2005)
-
-
-
-
10
-
-
69949183423
-
Fine-grained access control with objectsensitive roles
-
Technical Report CSD-TR-090010, UCLA Comp. Sci. Dept
-
Fischer, J., Marino, D., Majumdar, R., Millstein, T.: Fine-grained access control with objectsensitive roles. Technical Report CSD-TR-090010, UCLA Comp. Sci. Dept. (2009)
-
(2009)
-
-
Fischer, J.1
Marino, D.2
Majumdar, R.3
Millstein, T.4
-
13
-
-
38449084253
-
-
home
-
Hibernate home page, http://www.hibernate.org
-
Hibernate
-
-
-
14
-
-
0012583283
-
Featherweight Java: A minimal core calculus for Java and GJ
-
Igarashi, A., Pierce, B.C., Wadler, P.: Featherweight Java: a minimal core calculus for Java and GJ. ACM Transactions on Programming Languages and Systems 23(3), 396-450 (2001)
-
(2001)
ACM Transactions on Programming Languages and Systems
, vol.23
, Issue.3
, pp. 396-450
-
-
Igarashi, A.1
Pierce, B.C.2
Wadler, P.3
-
15
-
-
85024244520
-
Access control in a virtual university
-
Washington, DC, USA, pp, IEEE Computer Society Press, Los Alamitos
-
Jaeger, T., Michailidis, T., Rada, R.: Access control in a virtual university. In: WETICE 1999: Proceedings of the 8th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises, Washington, DC, USA, pp. 135-140. IEEE Computer Society Press, Los Alamitos (1999)
-
(1999)
WETICE 1999: Proceedings of the 8th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
, pp. 135-140
-
-
Jaeger, T.1
Michailidis, T.2
Rada, R.3
-
17
-
-
57449104653
-
Practical enforcement and testing of pluggable type systems
-
Technical Report CSD-TR-080013, UCLA Comp. Sci. Dept
-
Markstrum, S., Marino, D., Esquivel, M., Millstein, T.: Practical enforcement and testing of pluggable type systems. Technical Report CSD-TR-080013, UCLA Comp. Sci. Dept. (2008)
-
(2008)
-
-
Markstrum, S.1
Marino, D.2
Esquivel, M.3
Millstein, T.4
-
18
-
-
77956962293
-
Constructive mathematics and computer programming
-
North-Holland, Amsterdam
-
Martin-Löf, P.: Constructive mathematics and computer programming. In: Sixth International Congress for Logic, Methodology, and Philosophy of Science, pp. 153-175. North-Holland, Amsterdam (1982)
-
(1982)
Sixth International Congress for Logic, Methodology, and Philosophy of Science
, pp. 153-175
-
-
Martin-Löf, P.1
-
19
-
-
63549151109
-
Constrained types for object-oriented languages
-
ACM Press, New York
-
Nystrom, N., Saraswat, V., Palsberg, J., Grothoff, C.: Constrained types for object-oriented languages. In: OOPSLA 2008: Proceedings of the 23rd ACM SIGPLAN Conference on Object Oriented Programming Systems Languages and Applications, pp. 457-474. ACM Press, New York (2008)
-
(2008)
OOPSLA 2008: Proceedings of the 23rd ACM SIGPLAN Conference on Object Oriented Programming Systems Languages and Applications
, pp. 457-474
-
-
Nystrom, N.1
Saraswat, V.2
Palsberg, J.3
Grothoff, C.4
-
20
-
-
69949149767
-
A formal framework for reflective database access control policies
-
ACM Press, New York
-
Olson, L., Gunter, C., Madhusudan, P.: A formal framework for reflective database access control policies. In: CCS 2008: Proceedings of the 15th ACM conference on Computer and communications security, pp. 289-298. ACM Press, New York (2008)
-
(2008)
CCS 2008: Proceedings of the 15th ACM conference on Computer and communications security
, pp. 289-298
-
-
Olson, L.1
Gunter, C.2
Madhusudan, P.3
-
21
-
-
69949113853
-
-
OpenMRS home
-
OpenMRS home page, http://openmrs.org
-
-
-
-
22
-
-
69949181463
-
-
g Virtual Private Database (2009), http://www.oracle.com/technology/deploy/security/database-security/ virtual-private-database/index.html
-
g Virtual Private Database (2009), http://www.oracle.com/technology/deploy/security/database-security/ virtual-private-database/index.html
-
-
-
-
23
-
-
84947907563
-
Providing fine-grained access control for Java programs
-
Guerraoui, R, ed, ECOOP 1999, Springer, Heidelberg
-
Pandey, R., Hashii, B.: Providing fine-grained access control for Java programs. In: Guerraoui, R. (ed.) ECOOP 1999. LNCS, vol. 1628, pp. 668-692. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1628
, pp. 668-692
-
-
Pandey, R.1
Hashii, B.2
-
25
-
-
34548808043
-
When role models have flaws: Static validation of enterprise security policies. In: ICSE
-
Los Alamitos
-
Pistoia, M., Fink, S., Flynn, R., Yahav, E.: When role models have flaws: Static validation of enterprise security policies. In: ICSE 2007, pp. 478-488. IEEE, Los Alamitos (2007)
-
(2007)
478-488. IEEE
, pp. 2007
-
-
Pistoia, M.1
Fink, S.2
Flynn, R.3
Yahav, E.4
-
26
-
-
3142702944
-
Extending query rewriting techniques for fine-grained access control
-
ACM Press, New York
-
Rizvi, S., Mendelzon, A., Sudarshan, S., Roy, P.: Extending query rewriting techniques for fine-grained access control. In: SIGMOD 2004: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pp. 551-562. ACM Press, New York (2004)
-
(2004)
SIGMOD 2004: Proceedings of the 2004 ACM SIGMOD international conference on Management of data
, pp. 551-562
-
-
Rizvi, S.1
Mendelzon, A.2
Sudarshan, S.3
Roy, P.4
-
27
-
-
0030086382
-
Role-based access control models
-
Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Computer 29(2), 38-47 (1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
29
-
-
0000189545
-
Typed memory management via static capabilities
-
Walker, D., Crary, K., Morrisett, G.: Typed memory management via static capabilities. ACM Trans. Program. Lang. Syst. 22(4), 701-771 (2000)
-
(2000)
ACM Trans. Program. Lang. Syst
, vol.22
, Issue.4
, pp. 701-771
-
-
Walker, D.1
Crary, K.2
Morrisett, G.3
|