-
2
-
-
38049005345
-
UML2Alloy: A Challenging Model Transformation
-
Nashville, TN, USA, October
-
Kyriakos Anastasakis, Behzad Bordbar, Geri Georg, and Indrakshi Ray. UML2Alloy: A Challenging Model Transformation. In Proceedings of the ACM/IEEE 10th International Conference on Model Driven Engineering Languages and Systems, pages 436-450, Nashville, TN, USA, October 2007.
-
(2007)
Proceedings of the ACM/IEEE 10th International Conference on Model Driven Engineering Languages and Systems
, pp. 436-450
-
-
Anastasakis, K.1
Bordbar, B.2
Georg, G.3
Ray, I.4
-
3
-
-
34247380764
-
Supporting location-based conditions in access control policies
-
Taipei, Taiwan, March
-
Claudio A. Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, and Pierangela Samarati. Supporting location-based conditions in access control policies. In Proceedings of the ACM Symposium on Information, Computer and Communications Security, pages 212-222, Taipei, Taiwan, March 2006.
-
(2006)
Proceedings of the ACM Symposium on Information, Computer and Communications Security
, pp. 212-222
-
-
Ardagna, C.A.1
Cremonini, M.2
Damiani, E.3
Capitani di Vimercati, S.D.4
Samarati, P.5
-
4
-
-
0033645572
-
TRBAC: A temporal role-based access control model
-
Berlin, Germany, July
-
Elisa Bertino, Piero Andrea Bonatti, and Elena Ferrari. TRBAC: a temporal role-based access control model. In Proceedings of the 5th ACM Workshop on Role-Based Access Control, pages 21-30, Berlin, Germany, July 2000.
-
(2000)
Proceedings of the 5th ACM Workshop on Role-Based Access Control
, pp. 21-30
-
-
Bertino, E.1
Andrea Bonatti, P.2
Ferrari, E.3
-
5
-
-
30644474741
-
GEO-RBAC: A spatially aware RBAC
-
Stockholm, Sweden, June
-
Elisa Bertino, Barbara Catania, Maria Luisa Damiani, and Paolo Perlasca. GEO-RBAC: a spatially aware RBAC. In Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, pages 29-37, Stockholm, Sweden, June 2005.
-
(2005)
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies
, pp. 29-37
-
-
Bertino, E.1
Catania, B.2
Luisa Damiani, M.3
Perlasca, P.4
-
6
-
-
33745594017
-
MDA and Analysis of Web Applications
-
Trends in Enterprise Application Architecture, of, Trondheim, Norway, August
-
Behzad Bordbar and Kyriakos Anastasakis. MDA and Analysis of Web Applications. In Trends in Enterprise Application Architecture, volume 3888 of Lecture notes in Computer Science, pages 44-55, Trondheim, Norway, August 2005.
-
(2005)
Lecture notes in Computer Science
, vol.3888
, pp. 44-55
-
-
Bordbar, B.1
Anastasakis, K.2
-
8
-
-
33744789667
-
-
New York, NY, USA, November
-
Suroop Mohan Chandran and James B. D. Joshi. LoT-RBAC: A Location and Time-Based RBAC Model. In Proceedings of the 6th International Conference on Web Information Systems Engineering, pages 361-375, New York, NY, USA, November 2005.
-
(2005)
LoT-RBAC: A Location and Time-Based RBAC Model. In Proceedings of the 6th International Conference on Web Information Systems Engineering
, pp. 361-375
-
-
Mohan Chandran, S.1
Joshi, J.B.D.2
-
9
-
-
84948995473
-
A Context-Aware Security Architecture for Emerging Applications
-
Las Vegas, NV, USA, December
-
Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan, and Mustaque Ahamad. A Context-Aware Security Architecture for Emerging Applications. In Proceedings of the Annual Computer Security Applications Conference, pages 249-260, Las Vegas, NV, USA, December 2002.
-
(2002)
Proceedings of the Annual Computer Security Applications Conference
, pp. 249-260
-
-
Covington, M.J.1
Fogla, P.2
Zhan, Z.3
Ahamad, M.4
-
10
-
-
0035791053
-
Securing Context-Aware Applications Using Environment Roles
-
Chantilly, VA, USA, May
-
Michael J. Covington, Wende Long, Srividhya Srinivasan, Anind Dey, Mustaque Ahamad, and Gregory Abowd. Securing Context-Aware Applications Using Environment Roles. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, pages 10-20, Chantilly, VA, USA, May 2001.
-
(2001)
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies
, pp. 10-20
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dey, A.4
Ahamad, M.5
Abowd, G.6
-
11
-
-
84992227458
-
Proposed NIST Standard for Role-Based Access Control
-
August
-
David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn, and Ramaswamy Chandramouli. Proposed NIST Standard for Role-Based Access Control. ACM Transactions on Information and Systems Security, 4(3):224-274, August 2001.
-
(2001)
ACM Transactions on Information and Systems Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.S.2
Gavrila, S.I.3
Richard Kuhn, D.4
Chandramouli, R.5
-
12
-
-
60849085437
-
-
G. Georg, I. Ray, K. Anastasakis, B. Bordbar, M. Toahchoodee, and S. H. Houmb. An Aspect-oriented Methodology for Designing Secure Applications. Information and Software Technology, Special Issue on Model-Driven Development for Secure Information Systems, 51(5):846-864, May 2009.
-
G. Georg, I. Ray, K. Anastasakis, B. Bordbar, M. Toahchoodee, and S. H. Houmb. An Aspect-oriented Methodology for Designing Secure Applications. Information and Software Technology, Special Issue on Model-Driven Development for Secure Information Systems, 51(5):846-864, May 2009.
-
-
-
-
13
-
-
70450252939
-
-
Geri Georg, James Bieman, and Robert B. France. Using Alloy and UML/OCL to Specify Run-Time Configuration Management: A Case Study. In Andy Evans, Robert France, Ana Moreira, and Bernhard Rumpe, editors, Practical UML-Based Rigorous Development Methods - Countering or Integrating the eXtremists., P-7 of LNI, pages 128-141, 2001.
-
Geri Georg, James Bieman, and Robert B. France. Using Alloy and UML/OCL to Specify Run-Time Configuration Management: A Case Study. In Andy Evans, Robert France, Ana Moreira, and Bernhard Rumpe, editors, Practical UML-Based Rigorous Development Methods - Countering or Integrating the eXtremists., volume P-7 of LNI, pages 128-141, 2001.
-
-
-
-
14
-
-
4143078106
-
Implementing Access Control to People Location Information
-
Yorktown Heights, NY, USA, June
-
Urs Hengartner and Peter Steenkiste. Implementing Access Control to People Location Information. In Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, pages 11-20, Yorktown Heights, NY, USA, June 2004.
-
(2004)
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies
, pp. 11-20
-
-
Hengartner, U.1
Steenkiste, P.2
-
15
-
-
57349119890
-
Enabling verification and conformance testing for access control model
-
Estes Park, CO, USA, June
-
Hongxin Hu and GailJoon Ahn. Enabling verification and conformance testing for access control model. In Proceedings of the 13th ACM Symposium on Access control Models and Technologies, pages 195-204, Estes Park, CO, USA, June 2008.
-
(2008)
Proceedings of the 13th ACM Symposium on Access control Models and Technologies
, pp. 195-204
-
-
Hu, H.1
Ahn, G.2
-
16
-
-
0034449066
-
Automating first-order relational logic
-
San Diego, CA, USA, November
-
Daniel Jackson. Automating first-order relational logic. In Proceedings of the 8th ACM SIGSOFT international symposium on Foundations of Software Engineering, pages 130-139, San Diego, CA, USA, November 2000.
-
(2000)
Proceedings of the 8th ACM SIGSOFT international symposium on Foundations of Software Engineering
, pp. 130-139
-
-
Jackson, D.1
-
20
-
-
33748952774
-
-
The MIT Press, London, England
-
Daniel Jackson. Software Abstractions: Logic, Language, and Analysis. The MIT Press, London, England, 2006.
-
(2006)
Software Abstractions: Logic, Language, and Analysis
-
-
Jackson, D.1
-
21
-
-
17444406680
-
A Generalized Temporal Role-Based Access Control Model
-
January
-
James B.D. Joshi, Elisa Bertino, Usman Latif, and Arif Ghafoor. A Generalized Temporal Role-Based Access Control Model. IEEE Transactions on Knowledge and Data Engineering, 17(1):4-23, January 2005.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.B.D.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
22
-
-
0344990694
-
-
Addison-Wesley Longman Publishing Co, Inc, Boston, MA, USA
-
Anneke G. Kleppe, Jos Warmer, and Wim Bast. MDA Explained: The Model Driven Architecture: Practice and Promise. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2003.
-
(2003)
MDA Explained: The Model Driven Architecture: Practice and Promise
-
-
Kleppe, A.G.1
Warmer, J.2
Bast, W.3
-
25
-
-
70450254074
-
-
OMG. OCL Version 2.0. Document id: formal/06-05-01
-
OMG. OCL Version 2.0. Document id: formal/06-05-01. http://www.omg.org.
-
-
-
-
26
-
-
70450240483
-
-
OMG. UML: Superstructure. Version 2.0. Document id: formal/05-07-04
-
OMG. UML: Superstructure. Version 2.0. Document id: formal/05-07-04. http://www.omg.org.
-
-
-
-
27
-
-
70450271609
-
-
OMG. Unified Modeling Language: Superstructure Version 2.1.2 Formal/07/11/02. At, 2002
-
OMG. Unified Modeling Language: Superstructure Version 2.1.2 Formal/07/11/02. At http://www.omg.org/docs/formal/07-11-02.pdf., 2002.
-
-
-
-
28
-
-
32444439291
-
Towards a Location-Based Mandatory Access Control Model
-
February
-
Indrakshi Ray and Mahendra Kumar. Towards a Location-Based Mandatory Access Control Model. Computers & Security, 25(1), February 2006.
-
(2006)
Computers & Security
, vol.25
, Issue.1
-
-
Ray, I.1
Kumar, M.2
-
29
-
-
85015437589
-
LRBAC: A Location-Aware Role-Based Access Control Model
-
Kolkata, India, December
-
Indrakshi Ray, Mahendra Kumar, and Lijun Yu. LRBAC: A Location-Aware Role-Based Access Control Model. In Proceedings of the 2nd International Conference on Information Systems Security, pages 147-161, Kolkata, India, December 2006.
-
(2006)
Proceedings of the 2nd International Conference on Information Systems Security
, pp. 147-161
-
-
Ray, I.1
Kumar, M.2
Yu, L.3
-
30
-
-
4143147399
-
Using UML to Visualize Role-Based Access Control Constraints
-
Yorktown Heights, NY, USA, June
-
Indrakshi Ray, Na Li, Robert France, and Dae-Kyoo Kim. Using UML to Visualize Role-Based Access Control Constraints. In Proceedings of the 9th ACM symposium on Access Control Models and Technologies, pages 115-124, Yorktown Heights, NY, USA, June 2004.
-
(2004)
Proceedings of the 9th ACM symposium on Access Control Models and Technologies
, pp. 115-124
-
-
Ray, I.1
Li, N.2
France, R.3
Kim, D.-K.4
-
32
-
-
52149090713
-
A Spatio-Temporal Access Control Model Supporting Delegation for Pervasive Computing Applications
-
Turin, Italy, September
-
Indrakshi Ray and Manachai Toahchoodee. A Spatio-Temporal Access Control Model Supporting Delegation for Pervasive Computing Applications. In Proceedings of the 5th International Conference on Trust, Privacy & Security in Digital Business, pages 48-58, Turin, Italy, September 2008.
-
(2008)
Proceedings of the 5th International Conference on Trust, Privacy & Security in Digital Business
, pp. 48-58
-
-
Ray, I.1
Toahchoodee, M.2
-
33
-
-
0142161295
-
-
PhD thesis, Universitaet Bremen, Logos Verlag, Berlin, BISS Monographs, No. 14
-
Mark Richters. A Precise Approach to Validating UML Models and OCL Constraints. PhD thesis, Universitaet Bremen, 2002. Logos Verlag, Berlin, BISS Monographs, No. 14.
-
(2002)
A Precise Approach to Validating UML Models and OCL Constraints
-
-
Richters, M.1
-
34
-
-
84948983013
-
Access Control for Active Spaces
-
Las Vegas, NV, USA, December
-
Geetanjali Sampemane, Prasad Naldurg, and Roy H. Campbell. Access Control for Active Spaces. In Proceedings of the Annual Computer Security Applications Conference, pages 343-352, Las Vegas, NV, USA, December 2002.
-
(2002)
Proceedings of the Annual Computer Security Applications Conference
, pp. 343-352
-
-
Sampemane, G.1
Naldurg, P.2
Campbell, R.H.3
-
35
-
-
50249147519
-
A Framework for Specification and Verification of Generalized Spatio-Temporal Role Based Access Control Model
-
Technical report, Purdue University, February, CERIAS TR 2007-08
-
Arjmand Samuel, Arif Ghafoor, and Elisa Bertino. A Framework for Specification and Verification of Generalized Spatio-Temporal Role Based Access Control Model. Technical report, Purdue University, February 2007. CERIAS TR 2007-08.
-
(2007)
-
-
Samuel, A.1
Ghafoor, A.2
Bertino, E.3
-
36
-
-
0030086382
-
Role-based access control models
-
February
-
Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
37
-
-
0242625217
-
A Lightweight Approach to Specification and Analysis of Role-Based Access Control Extensions
-
Monterey, CA, USA, June
-
Andreas Schaad and Jonathan D. Moffett. A Lightweight Approach to Specification and Analysis of Role-Based Access Control Extensions. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, pages 13-22, Monterey, CA, USA, June 2002.
-
(2002)
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies
, pp. 13-22
-
-
Schaad, A.1
Moffett, J.D.2
-
38
-
-
0030644642
-
Separation of Duty in Role-based Environments
-
Rockport, MA, USA, June
-
Richard Simon and Mary Ellen Zurko. Separation of Duty in Role-based Environments. In Proceedings of the 10th Computer Security Foundations Workshop, pages 183-194, Rockport, MA, USA, June 1997.
-
(1997)
Proceedings of the 10th Computer Security Foundations Workshop
, pp. 183-194
-
-
Simon, R.1
Ellen Zurko, M.2
-
39
-
-
35248816057
-
A lightweight formal analysis of a multicast key management scheme
-
Fo r m a l Techniques for Networked and Distributed Systems, FORTE 2003, of
-
Mana Taghdiri and Daniel Jackson. A lightweight formal analysis of a multicast key management scheme. In Fo r m a l Techniques for Networked and Distributed Systems - FORTE 2003, volume 2767 of Lecture Notes in Computer Science, pages 240-256, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2767
, pp. 240-256
-
-
Taghdiri, M.1
Jackson, D.2
-
41
-
-
69549108311
-
Using Alloy to Analyze a Spatio-Temporal Access Control Model Supporting Delegation
-
To appear
-
Manachai Toahchoodee and Indrakshi Ray. Using Alloy to Analyze a Spatio-Temporal Access Control Model Supporting Delegation. IET Information Security, 2009. To appear.
-
(2009)
IET Information Security
-
-
Toahchoodee, M.1
Ray, I.2
-
42
-
-
33845944921
-
A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty
-
Beijing, China, November
-
Chunyang Yuan, Yeping He, Jianbo He, and Zhouyi Zhou. A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty. In Proceedings of the 2nd SKLOIS Conference on Information Security and Cryptology, pages 196-210, Beijing, China, November 2006.
-
(2006)
Proceedings of the 2nd SKLOIS Conference on Information Security and Cryptology
, pp. 196-210
-
-
Yuan, C.1
He, Y.2
He, J.3
Zhou, Z.4
|