-
1
-
-
0037125845
-
CASL: The common algebraic specification language
-
Astesiano, E., Bidoit, M., Kirchner, H., Krieg-Brückner, B., Mosses, P.D., Sannella, D., Tar-lecki, A.: CASL: the common algebraic specification language. Theor. Comput. Sci. 286(2), 153-196 (2002)
-
(2002)
Theor. Comput. Sci
, vol.286
, Issue.2
, pp. 153-196
-
-
Astesiano, E.1
Bidoit, M.2
Kirchner, H.3
Krieg-Brückner, B.4
Mosses, P.D.5
Sannella, D.6
Tar-lecki, A.7
-
2
-
-
33746684330
-
-
Barker, S., Fernández, M.: Term rewriting for access control. In: DBSec, pp. 179-193 (2006)
-
Barker, S., Fernández, M.: Term rewriting for access control. In: DBSec, pp. 179-193 (2006)
-
-
-
-
3
-
-
31844457357
-
Composing security policies with polymer
-
Bauer, L., Ligatti, J., Walker, D.: Composing security policies with polymer. In: PLDI, pp. 305-314 (2005)
-
(2005)
PLDI
, pp. 305-314
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
4
-
-
70350387207
-
-
Bell, D., LaPadula, L.: Secure computer systems: A mathematical model. Journal of Computer Security ii. 4(2/3), 229-263 (1996)
-
Bell, D., LaPadula, L.: Secure computer systems: A mathematical model. Journal of Computer Security ii. 4(2/3), 229-263 (1996)
-
-
-
-
5
-
-
0032153903
-
An access control model supporting periodicity constraints and temporal reasoning
-
Bertino, E., Bettini, C., Ferrari, E., Samarati, P.: An access control model supporting periodicity constraints and temporal reasoning. ACM Trans. Database Syst. 23(3), 231-285 (1998)
-
(1998)
ACM Trans. Database Syst
, vol.23
, Issue.3
, pp. 231-285
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
7
-
-
57549084474
-
A rewriting framework for the composition of access control policies
-
Valencia. ACM Press, New York
-
Bertolissi, C., Fernández, M.: A rewriting framework for the composition of access control policies. In: Proceedings of PPDP 2008, Valencia. ACM Press, New York (2008)
-
(2008)
Proceedings of PPDP
-
-
Bertolissi, C.1
Fernández, M.2
-
8
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Technical Report TR-3153, Mitre, Bedford, MA
-
Biba, K.: Integrity considerations for secure computer systems. Technical Report TR-3153, Mitre, Bedford, MA (1975)
-
(1975)
-
-
Biba, K.1
-
9
-
-
85025424440
-
An algebra for composing access control policies
-
Bonatti, P., De Capitani di Vimercati, S., Samarati, P.: An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur. 5(1), 1-35 (2002)
-
(2002)
ACM Trans. Inf. Syst. Secur
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.1
De Capitani di Vimercati, S.2
Samarati, P.3
-
11
-
-
0036311802
-
A uniform framework for regulating service access and information release on the web
-
Bonatti, P., Samarati, P.: A uniform framework for regulating service access and information release on the web. Journal of Computer Security 10(3), 241-272 (2002)
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.1
Samarati, P.2
-
13
-
-
70450229409
-
A simple and expressive semantic framework for policy composition in access control
-
ACM Press, New York
-
Bruns, G., Dantas, D., Huth, M.: A simple and expressive semantic framework for policy composition in access control. In: FMSE 2007: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, pp. 12-21. ACM Press, New York (2007)
-
(2007)
FMSE 2007: Proceedings of the 2007 ACM workshop on Formal methods in security engineering
, pp. 12-21
-
-
Bruns, G.1
Dantas, D.2
Huth, M.3
-
14
-
-
51749123140
-
Access-control policies via belnap logic: Effective and efficient composition and analysis
-
IEEE Computer Society Press, Los Alamitos
-
Bruns, G., Huth, M.: Access-control policies via belnap logic: Effective and efficient composition and analysis. In: 21st IEEE Computer Security Foundations Symposium (CSF), pp. 163-176. IEEE Computer Society Press, Los Alamitos (2008)
-
(2008)
21st IEEE Computer Security Foundations Symposium (CSF)
, pp. 163-176
-
-
Bruns, G.1
Huth, M.2
-
15
-
-
24644520728
-
-
Campbell, R., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards security and privacy for pervasive computing. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, 2609, pp. 1-15. Springer, Heidelberg (2003)
-
Campbell, R., Al-Muhtadi, J., Naldurg, P., Sampemane, G., Mickunas, M.D.: Towards security and privacy for pervasive computing. In: Okada, M., Pierce, B.C., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) ISSS 2002. LNCS, vol. 2609, pp. 1-15. Springer, Heidelberg (2003)
-
-
-
-
18
-
-
70350388059
-
Rewrite based specification of access control policies
-
Dougherty, D, Escobar, S, eds, Security and Rewriting Techniques, 3rd International Workshop SecRet, Elsevier, Amsterdam
-
Cirstea, H., Moreau, P., Santana de Oliveira, A.: Rewrite based specification of access control policies. In: Dougherty, D., Escobar, S. (eds.) Security and Rewriting Techniques, 3rd International Workshop SecRet 2008. Electronic Notes in Theoretical Computer Science. Elsevier, Amsterdam (2008)
-
(2008)
Electronic Notes in Theoretical Computer Science
-
-
Cirstea, H.1
Moreau, P.2
Santana de Oliveira, A.3
-
19
-
-
28144457207
-
A security model with non-atomic actions and deadlines. In: CSFW
-
Los Alamitos
-
Cuppens, F., Cuppens-Boulahia, N., Sans, T.: A security model with non-atomic actions and deadlines. In: CSFW, pp. 186-196. IEEE Society, Los Alamitos (2005)
-
(2005)
IEEE Society
, pp. 186-196
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Sans, T.3
-
20
-
-
62849128528
-
Weaving rewrite-based access control policies
-
ACM, New York
-
de Oliveira, A.S., Wang, E.K., Kirchner, C., Kirchner, H.: Weaving rewrite-based access control policies. In: FMSE 2007: Proceedings of the 2007 ACM workshop on Formal methods in security engineering. ACM, New York (2007)
-
(2007)
FMSE 2007: Proceedings of the 2007 ACM workshop on Formal methods in security engineering
-
-
de Oliveira, A.S.1
Wang, E.K.2
Kirchner, C.3
Kirchner, H.4
-
21
-
-
0141502155
-
An approach for modeling and analysis of security system architectures
-
Deng, Y., Wang, J.C., Tsai, J., Beznosov, K.: An approach for modeling and analysis of security system architectures. IEEE Transactions on Knowledge and Data Engineering 15(5), 1099-1119 (2003)
-
(2003)
IEEE Transactions on Knowledge and Data Engineering
, vol.15
, Issue.5
, pp. 1099-1119
-
-
Deng, Y.1
Wang, J.C.2
Tsai, J.3
Beznosov, K.4
-
22
-
-
33749558954
-
-
Dougherty, DJ., Fisler, K., Krishnamurthi, S.: Specifying and reasoning about dynamic access-control policies. In: Furbach, U., Shankar, N. (eds.) IJCAR 2006. LNCS (LNAI), 4130, pp. 632-646. Springer, Heidelberg (2006)
-
Dougherty, DJ., Fisler, K., Krishnamurthi, S.: Specifying and reasoning about dynamic access-control policies. In: Furbach, U., Shankar, N. (eds.) IJCAR 2006. LNCS (LNAI), vol. 4130, pp. 632-646. Springer, Heidelberg (2006)
-
-
-
-
23
-
-
38049036409
-
Modular access control via strategic rewriting
-
Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
-
Dougherty, DJ., Kirchner, C., Kirchner, H., Santana de Oliveira, A.: Modular access control via strategic rewriting. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 578-593. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4734
, pp. 578-593
-
-
Dougherty, D.J.1
Kirchner, C.2
Kirchner, H.3
Santana de Oliveira, A.4
-
24
-
-
55349128227
-
A formal comparison of the bell & lapadula and rbac models
-
IEEE Computer Society Press, Los Alamitos
-
Habib, L., Jaume, M., Morisset, C.: A formal comparison of the bell & lapadula and rbac models. In: Fourth International Symposium on Information Assurance and Security (IAS 2008), pp. 3-8. IEEE Computer Society Press, Los Alamitos (2008)
-
(2008)
Fourth International Symposium on Information Assurance and Security (IAS
, pp. 3-8
-
-
Habib, L.1
Jaume, M.2
Morisset, C.3
-
25
-
-
84942243858
-
-
Halpern, J.Y., Weissman, V.: Using first-order logic to reason about policies. In: CSFW, pp. 187-201 (2003)
-
Halpern, J.Y., Weissman, V.: Using first-order logic to reason about policies. In: CSFW, pp. 187-201 (2003)
-
-
-
-
26
-
-
0016984825
-
Protection in operating systems
-
Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Commun. ACM 19(8), 461-471 (1976)
-
(1976)
Commun. ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
28
-
-
70350369274
-
-
Huang, HJ., Kirchner, H.: Modular security policy design based on extended Petri nets. Technical Report inria-00396924, INRIA (2009), http://hal.inria.fr/inria-000396924/fr/
-
Huang, HJ., Kirchner, H.: Modular security policy design based on extended Petri nets. Technical Report inria-00396924, INRIA (2009), http://hal.inria.fr/inria-000396924/fr/
-
-
-
-
29
-
-
0001619596
-
Flexible support for multiple access control policies
-
Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Trans. Database Syst. 26(2), 214-260 (2001)
-
(2001)
ACM Trans. Database Syst
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
30
-
-
33750686900
-
-
Jarvis, B., Jain, L.: Trust in LORA: Towards a formal definition of trust in BDI agents. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds.) KES 2006. LNCS (LNAI), 4252, pp. 458-463. Springer, Heidelberg (2006)
-
Jarvis, B., Jain, L.: Trust in LORA: Towards a formal definition of trust in BDI agents. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds.) KES 2006. LNCS (LNAI), vol. 4252, pp. 458-463. Springer, Heidelberg (2006)
-
-
-
-
31
-
-
55349100370
-
Towards a formal specification of access control
-
Degano, P, Küsters, R, Vigano, L, Zdancewic, S, eds
-
Jaume, M., Morisset, C.: Towards a formal specification of access control. In: Degano, P., Küsters, R., Vigano, L., Zdancewic, S. (eds.) Proceedings of the Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis FCS-ARSPA 2006, pp. 213-232 (2006)
-
(2006)
Proceedings of the Joint Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis FCS-ARSPA
, pp. 213-232
-
-
Jaume, M.1
Morisset, C.2
-
34
-
-
77952407814
-
Organization based access control
-
IEEE Society, Los Alamitos
-
Kalam, A., Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miege, A., Saurel, C., Trouessin, G.: Organization based access control. In: Proceedings IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY), pp. 120-131. IEEE Society, Los Alamitos (2003)
-
(2003)
Proceedings IEEE 4th International Workshop on Policies for Distributed Systems and Networks (POLICY)
, pp. 120-131
-
-
Kalam, A.1
Baida, R.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miege, A.7
Saurel, C.8
Trouessin, G.9
-
35
-
-
77957782581
-
Analysis of rewrite-based access control policies
-
Dougherty, D, Escobar, S, eds, Security and Rewriting Techniques, 3rd International Workshop Secret, Elsevier, Amsterdam
-
Kirchner, C., Kirchner, H., Santana de Oliveira, A.: Analysis of rewrite-based access control policies. In: Dougherty, D., Escobar, S. (eds.) Security and Rewriting Techniques, 3rd International Workshop Secret 2008, Electronic Notes in Theoretical Computer Science. Elsevier, Amsterdam (2008)
-
(2008)
Electronic Notes in Theoretical Computer Science
-
-
Kirchner, C.1
Kirchner, H.2
Santana de Oliveira, A.3
-
38
-
-
34547271784
-
-
Lee, A.J., Boyer, J.P., Olson, L., Gunter, C.A.: Defeasible security policy composition for web services. In: Winslett, M., Gordon, A.D., Sands, D. (eds.) FMSE, pp. 45-54. ACM Press, New York (2006)
-
Lee, A.J., Boyer, J.P., Olson, L., Gunter, C.A.: Defeasible security policy composition for web services. In: Winslett, M., Gordon, A.D., Sands, D. (eds.) FMSE, pp. 45-54. ACM Press, New York (2006)
-
-
-
-
39
-
-
35248834606
-
-
Li, N., Mitchell, J.C.: Datalog with constraints: A foundation for trust management languages. In: PADL, pp. 58-73 (2003)
-
Li, N., Mitchell, J.C.: Datalog with constraints: A foundation for trust management languages. In: PADL, pp. 58-73 (2003)
-
-
-
-
41
-
-
84947263112
-
Automatic code generation method based on coloured Petri net models applied on an access control system
-
Nielsen, M, Simpson, D, eds, ICATPN 2000, Springer, Heidelberg
-
Mortensen, K.: Automatic code generation method based on coloured Petri net models applied on an access control system. In: Nielsen, M., Simpson, D. (eds.) ICATPN 2000. LNCS, vol. 1825, pp. 367-386. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1825
, pp. 367-386
-
-
Mortensen, K.1
-
42
-
-
70350379800
-
-
Moses, T, Extensible access control markup language (XACML) version 2.0. Technical report, OASIS February 2005
-
Moses, T.: Extensible access control markup language (XACML) version 2.0. Technical report, OASIS (February 2005)
-
-
-
-
44
-
-
0024645936
-
Petri nets: Properties, analysis, and applications
-
Murata, T.: Petri nets: Properties, analysis, and applications. Proceedings of IEEE 77(4), 541-580 (1985)
-
(1985)
Proceedings of IEEE
, vol.77
, Issue.4
, pp. 541-580
-
-
Murata, T.1
-
46
-
-
27544484252
-
A role-based access control policy verification framework for real-time systems
-
Shafiq, B., Masood, A., Joshi, J., Ghafoor, A.: A role-based access control policy verification framework for real-time systems. In: Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (2005)
-
(2005)
Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems
-
-
Shafiq, B.1
Masood, A.2
Joshi, J.3
Ghafoor, A.4
-
47
-
-
0030086382
-
Role-based access control models
-
Shandu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Computer 29(2), 38-47 (1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Shandu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
48
-
-
70350420343
-
-
Stehr, M.-O., Meseguer, J., Olveczky, P.C.: Rewriting logic as a unifying framework for Petri nets. In: Ehrig, H., Juhás, G., Padberg, J., Rozenberg, G. (eds.) APN 2001. LNCS, 2128, pp. 250-303. Springer, Heidelberg (2001)
-
Stehr, M.-O., Meseguer, J., Olveczky, P.C.: Rewriting logic as a unifying framework for Petri nets. In: Ehrig, H., Juhás, G., Padberg, J., Rozenberg, G. (eds.) APN 2001. LNCS, vol. 2128, pp. 250-303. Springer, Heidelberg (2001)
-
-
-
-
49
-
-
70350363750
-
-
Tiplea, F., Jucan, T., Masalagiu, C.: Term rewriting systems and Petri nets. Analele Stiintifice ale Universitatii Al. I. Cuza 34(4), 305-317 (1988)
-
Tiplea, F., Jucan, T., Masalagiu, C.: Term rewriting systems and Petri nets. Analele Stiintifice ale Universitatii Al. I. Cuza 34(4), 305-317 (1988)
-
-
-
-
50
-
-
33748055425
-
-
Tschantz, M.C., Krishnamurthi, S.: Towards reasonability properties for access-control policy languages. In: Ferraiolo, D.R., Ray, I. (eds.) SACMAT, pp. 160-169. ACM Press, New York (2006)
-
Tschantz, M.C., Krishnamurthi, S.: Towards reasonability properties for access-control policy languages. In: Ferraiolo, D.R., Ray, I. (eds.) SACMAT, pp. 160-169. ACM Press, New York (2006)
-
-
-
-
51
-
-
0035328989
-
Algorithms and reductions for rewriting problems
-
Verma, R., Rusinowitch, M., Lugiez, D.: Algorithms and reductions for rewriting problems. Fundamental Informatics 46(3), 257-276 (2001)
-
(2001)
Fundamental Informatics
, vol.46
, Issue.3
, pp. 257-276
-
-
Verma, R.1
Rusinowitch, M.2
Lugiez, D.3
-
52
-
-
3142523600
-
A propositional policy algebra for access control
-
Wijesekera, D., Jajodia, S.: A propositional policy algebra for access control. ACM Trans. Inf. Syst. Secur. 6(2), 286-325 (2003)
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.2
, pp. 286-325
-
-
Wijesekera, D.1
Jajodia, S.2
|