-
3
-
-
62849105556
-
Modular access control via strategic rewriting
-
Dresden (Sep)
-
Dougherty, D.J., Kirchner, C., Kirchner, H., Santana de Oliveira, A.: Modular access control via strategic rewriting. In: Proceedings of 12th European Symposium On Research In Computer Security (ESORICS' 07), Dresden (Sep 2007
-
(2007)
Proceedings of 12th European Symposium on Research in Computer Security (ESORICS' 07)
-
-
Dougherty, D.J.1
Kirchner, C.2
Kirchner, H.3
Santana De Oliveira, A.4
-
7
-
-
85006239926
-
The mobility workbench - A tool for the π- Calculus
-
Alur, R., Peled, D., eds.: Proc. 6th International Conference Computer Aided Verification (CAV'94) ., Springer
-
Victor, B., Moller, F.: The mobility workbench - a tool for the π- calculus. In Alur, R., Peled, D., eds.: Proc. 6th International Conference Computer Aided Verification (CAV'94). Volume 818 of Lecture Notes in Computer Science., Springer (1994) 428-440
-
(1994)
Lecture Notes in Computer Science
, vol.818
, pp. 428-440
-
-
Victor, B.1
Moller, F.2
-
8
-
-
38649141810
-
Automated verification of selected equivalences for security protocols
-
Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. Journal of Logic and Algebraic Programming 75(1) (2008) 3-51
-
(2008)
Journal of Logic and Algebraic Programming
, vol.75
, Issue.1
, pp. 3-51
-
-
Blanchet, B.1
Abadi, M.2
Fournet, C.3
-
9
-
-
84988393004
-
Classification of security properties (Part I: Information flow)
-
Springer
-
Focardi, R., Gorrieri, R.: Classification of Security Properties (Part I: Information Flow). Volume 2171 of Lecture Notes in Computer Science. Springer (2001
-
(2001)
Lecture Notes in Computer Science
, vol.2171
-
-
Focardi, R.1
Gorrieri, R.2
-
10
-
-
27544484252
-
A role-based access control policy verification framework for real-time systems
-
Shafiq, B., Masood, A., Joshi, J., Ghafoor, A.: A role-based access control policy verification framework for real-time systems. In: Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems. (2005
-
(2005)
Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems
-
-
Shafiq, B.1
Masood, A.2
Joshi, J.3
Ghafoor, A.4
-
11
-
-
84947263112
-
Automatic code generation method based on coloured petri net models applied on an access control system
-
Mortensen, K.H.: Automatic code generation method based on coloured petri net models applied on an access control system. Lecture Notes in Computer Science 1825 (2000) 367-386
-
(1825)
Lecture Notes in Computer Science
, vol.2000
, pp. 367-386
-
-
Mortensen, K.H.1
-
16
-
-
0141502155
-
An approach for modeling and analysis of security system architectures
-
Deng, Y., Wang, J.C., Tsai, J., Beznosov, K.: An approach for modeling and analysis of security system architectures. IEEE Transactions on Knowledge and Data Engineering 15(5) (2003) 1099-1119
-
(2003)
IEEE Transactions on Knowledge and Data Engineering
, vol.15
, Issue.5
, pp. 1099-1119
-
-
Deng, Y.1
Wang, J.C.2
Tsai, J.3
Beznosov, K.4
-
17
-
-
85025424440
-
An algebra for composing access control policies
-
Bonatti, P.A., di Vimercati, S.D.C., Samarati, P.: An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur. 5(1) (2002) 1-35
-
(2002)
ACM Trans. Inf. Syst. Secur.
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.A.1
Di Vimercati, S.D.C.2
Samarati, P.3
-
18
-
-
3142523600
-
A propositional policy algebra for access control
-
Wijesekera, D., Jajodia, S.: A propositional policy algebra for access control. ACM Trans. Inf. Syst. Secur. 6(2) (2003) 286-325
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.2
, pp. 286-325
-
-
Wijesekera, D.1
Jajodia, S.2
-
19
-
-
31844457357
-
Composing security policies with polymer
-
Bauer, L., Ligatti, J., Walker, D.: Composing security policies with polymer. In: PLDI. (2005) 305-314
-
(2005)
PLDI
, pp. 305-314
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
20
-
-
34547271784
-
Defeasible security policy composition for web services
-
Winslett M., Gordon, A.D., Sands, D., eds.
-
Lee, A.J., Boyer, J.P., Olson, L., Gunter, C.A.: Defeasible security policy composition for web services. In Winslett, M., Gordon, A.D., Sands, D., eds.: FMSE, ACM (2006) 45-54
-
(2006)
FMSE, ACM
, pp. 45-54
-
-
Lee, A.J.1
Boyer, J.P.2
Olson, L.3
Gunter, C.A.4
-
21
-
-
70450229409
-
A simple and expressive semantic framework for policy composition in access control
-
New York, NY, USA, ACM
-
Bruns, G., Dantas, D.S., Huth, M.: A simple and expressive semantic framework for policy composition in access control. In: FMSE '07: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, New York, NY, USA, ACM (2007) 12-21
-
FMSE '07: Proceedings of the 2007 ACM Workshop on Formal Methods in Security Engineering
, vol.2007
, pp. 12-21
-
-
Bruns, G.1
Dantas, D.S.2
Huth, M.3
-
22
-
-
57549084474
-
A rewriting framework for the composition of access control policies
-
Bertolissi, C., Fernndez, M.: A rewriting framework for the composition of access control policies. Proceedings of PPDP'08 (2008
-
(2008)
Proceedings of PPDP'08
-
-
Bertolissi, C.1
Fernndez, M.2
-
23
-
-
0024645936
-
Petri nets: Properties, analysis, and applications
-
Murata, T.: Petri nets: Properties, analysis, and applications. Proceedings of IEEE 77(4) (1985) 541-580
-
(1985)
Proceedings of IEEE
, vol.77
, Issue.4
, pp. 541-580
-
-
Murata, T.1
-
24
-
-
33748055425
-
Towards reasonability properties for access-control policy languages
-
In Ferraiolo, D.F., Ray I., eds.
-
Tschantz, M.C., Krishnamurthi, S.: Towards reasonability properties for access-control policy languages. In Ferraiolo, D.F., Ray, I., eds.: SACMAT, ACM (2006) 160-169
-
(2006)
SACMAT, ACM
, pp. 160-169
-
-
Tschantz, M.C.1
Krishnamurthi, S.2
-
25
-
-
33746684330
-
Term rewriting for access control
-
Barker, S., Fernández, M.: Term rewriting for access control. In: DBSec. (2006) 179-193
-
(2006)
DBSec.
, pp. 179-193
-
-
Barker, S.1
Fernández, M.2
-
27
-
-
33846167404
-
Deadlock avoidance petri net controller for manufacturing systems with multiple resource service
-
Xing, K.L., Jin, X.J., Feng, Y.: Deadlock avoidance petri net controller for manufacturing systems with multiple resource service. Proc. IEEE Conference on Robotics and Automation (2005) 4757-4761
-
(2005)
Proc. IEEE Conference on Robotics and Automation
, pp. 4757-4761
-
-
Xing, K.L.1
Jin, X.J.2
Feng, Y.3
-
28
-
-
70449651935
-
Scheduling analysis with resources share using the transitive matrix based on p-invariant
-
Lee, J.K.: Scheduling analysis with resources share using the transitive matrix based on p-invariant. Proc. 41st SICE Annual Conference 2 (2002) 1359-1364
-
(2002)
Proc. 41st SICE Annual Conference
, vol.2
, pp. 1359-1364
-
-
Lee, J.K.1
|