-
1
-
-
84888520341
-
-
http://fke.utm.my/downloads/espresso/.
-
-
-
-
2
-
-
84888531742
-
-
Extensible access control markup language (XACML) version 2.0. OASIS Standard, 2005
-
Extensible access control markup language (XACML) version 2.0. OASIS Standard, 2005.
-
-
-
-
3
-
-
33244479658
-
Evaluating xacml as a policy language
-
Technical report, OASIS
-
A. Anderson. Evaluating xacml as a policy language. Technical report, OASIS, 2003.
-
(2003)
-
-
Anderson, A.1
-
4
-
-
0032093523
-
The value of the four values
-
O. Arieli and A. Avron. The value of the four values. Artificial Intelligence, 102(1):97-141, 1998.
-
(1998)
Artificial Intelligence
, vol.102
, Issue.1
, pp. 97-141
-
-
Arieli, O.1
Avron, A.2
-
5
-
-
24944578141
-
Enterprise privacy authorization language (EPAL)
-
3485, IBM Research
-
P. Ashley, S. Hada, G. Karjoth, C. Powers, and M. Schunter. Enterprise privacy authorization language (EPAL). Research report 3485, IBM Research, 2003.
-
(2003)
Research report
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
6
-
-
35048879817
-
An algebra for composing enterprise privacy policies
-
Proceedings of 9th European Symposium on Research in Computer Security ESORICS, of, Springer, September
-
M. Backes, M. Duermuth, and R. Steinwandt. An algebra for composing enterprise privacy policies. In Proceedings of 9th European Symposium on Research in Computer Security (ESORICS), volume 3193 of Lecture Notes in Computer Science, pages 33-52. Springer, September 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3193
, pp. 33-52
-
-
Backes, M.1
Duermuth, M.2
Steinwandt, R.3
-
7
-
-
85025424440
-
An algebra for composing access control policies
-
P. Bonatti, S. D. C. D. Vimercati, and P. Samarati. An algebra for composing access control policies. ACM Transactions on Information and System Security (TISSEC), 5(1):1-35, 2002.
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.1
Vimercati, S.D.C.D.2
Samarati, P.3
-
9
-
-
33244470893
-
Verification and change-impact analysis of access-control policies
-
K. Fisler, S. Krishnamurthi, L. A. Meyerovich, and M. C. Tschantz. Verification and change-impact analysis of access-control policies. In Proceedings of the 27th International Conference on Software Engineering (ICSE), pages 196-205, 2005.
-
(2005)
Proceedings of the 27th International Conference on Software Engineering (ICSE)
, pp. 196-205
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.A.3
Tschantz, M.C.4
-
10
-
-
0031120522
-
Multi-terminal binary decision diagrams: An efficient datastructure for matrix representation
-
M. Fujita, P. C. McGeer, and J. C.-Y. Yang. Multi-terminal binary decision diagrams: An efficient datastructure for matrix representation. Formal Methods in System Design, 10(2-3):149-169, 1997.
-
(1997)
Formal Methods in System Design
, vol.10
, Issue.2-3
, pp. 149-169
-
-
Fujita, M.1
McGeer, P.C.2
Yang, J.C.-Y.3
-
12
-
-
84942243858
-
-
J. Halpern and V. Weissman. Using first-order logic to reason about policies. In Proceedings of the Computer Security Foundations Workshop (CSFW'03), 2003.
-
J. Halpern and V. Weissman. Using first-order logic to reason about policies. In Proceedings of the Computer Security Foundations Workshop (CSFW'03), 2003.
-
-
-
-
13
-
-
33746064509
-
Timed constraint programming: A declarative approach to usage control
-
R. Jagadeesan, W. Marrero, C. Pitcher, and V. Saraswat. Timed constraint programming: a declarative approach to usage control. In Proc. of the 7th ACM SIGPLAN international conference on Principles and practice of declarative programming (PPDP), pages 164-175, 2005.
-
(2005)
Proc. of the 7th ACM SIGPLAN international conference on Principles and practice of declarative programming (PPDP)
, pp. 164-175
-
-
Jagadeesan, R.1
Marrero, W.2
Pitcher, C.3
Saraswat, V.4
-
14
-
-
37549064145
-
The sheffer functions of 3-valued logic
-
N. Martin. The sheffer functions of 3-valued logic. The Journal of Symbolic Logic, 19(1):45-51, 1954.
-
(1954)
The Journal of Symbolic Logic
, vol.19
, Issue.1
, pp. 45-51
-
-
Martin, N.1
-
17
-
-
51849120745
-
An algebra for fine-grained integration of xacml policies
-
Technical report, CERIAS
-
P. Rao, D. Lin, E. Bertino, N. Li, and J. Lobo. An algebra for fine-grained integration of xacml policies. Technical report, CERIAS, 2008.
-
(2008)
-
-
Rao, P.1
Lin, D.2
Bertino, E.3
Li, N.4
Lobo, J.5
-
18
-
-
84968502292
-
Completeness in finite algebras with a single operation
-
G. Rousseau. Completeness in finite algebras with a single operation. Proceedings of the American Mathematical Society, 18(6):1009-1013, 1966.
-
(1966)
Proceedings of the American Mathematical Society
, vol.18
, Issue.6
, pp. 1009-1013
-
-
Rousseau, G.1
-
20
-
-
84963095575
-
Complete connectives for 3-valued propositional calculus
-
R. Wheeler. Complete connectives for 3-valued propositional calculus. Proceedings of London Mathematical Society, 3(16):167-191, 1966.
-
(1966)
Proceedings of London Mathematical Society
, vol.3
, Issue.16
, pp. 167-191
-
-
Wheeler, R.1
|