-
1
-
-
34548769351
-
Fuzzy multilevel security: An experiment on quantified risk.adaptive access control
-
Oakland, California, USA: ACM, May
-
P. Cheng, P. Rohatgi, C. Keser, P. A. Karger, G. M. Wagner, and A. S. Reninger, "Fuzzy multilevel security: An experiment on quantified risk.adaptive access control," in Proceedings of 2007 IEEE Symposium on Security and Privacy(SP'07). Oakland, California, USA: ACM, May 2007, pp. 222 - 230.
-
(2007)
Proceedings of 2007 IEEE Symposium on Security and Privacy(SP'07).
, pp. 222-230
-
-
Cheng, P.1
Rohatgi, P.2
Keser, C.3
Karger, P.A.4
Wagner, G.M.5
Reninger, A.S.6
-
2
-
-
33845437573
-
Horizontal integration: Broader access models for realizing information dominance
-
JASON, , Tech. Rep. JSR-04-132
-
JASON, "Horizontal integration: Broader access models for realizing information dominance," MITRE Corporation, http://www.fas.org/irp/agency/ dod/jason/classpol.pdf, Tech. Rep. JSR-04-132, 2004.
-
(2004)
MITRE Corporation
-
-
-
3
-
-
33845414618
-
Toward information sharing: Benefit and risk access control (barac)
-
L. Zhang, A. Brodsky, and S. Jajodia, "Toward information sharing: Benefit and risk access control (barac)," in Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06), 2006, pp. 45-53.
-
(2006)
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'06)
, pp. 45-53
-
-
Zhang, L.1
Brodsky, A.2
Jajodia, S.3
-
4
-
-
3042684910
-
A rule-based framework for role-based delegation and revocation
-
September
-
L. Zhang, G.-J. Ahn, and B.-T. Chu, "A rule-based framework for role-based delegation and revocation," ACM Transaction on Information and System Security, vol.6, no.3, pp. 404-441, September 2003.
-
(2003)
ACM Transaction on Information and System Security
, vol.6
, Issue.3
, pp. 404-441
-
-
Zhang, L.1
Ahn, G.-J.2
Chu, B.-T.3
-
5
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
N. Li, B. N. Grosof, and J. Feigenbaum, "Delegation logic: A logic-based approach to distributed authorization," ACM Transactions on Information and System Security (TISSEC), vol.6, no.1, pp. 128-171, 2003.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
6
-
-
84992227458
-
Proposed nist standard for role-based access control
-
August
-
D. F. Ferraiola, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, "Proposed nist standard for role-based access control," ACM Transactions on Information and System Security (TISSEC), vol.4, no.3, pp. 224-274, August 2001.
-
(2001)
ACM Transactions on Information and System Security (TISSEC),.
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiola, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
7
-
-
77950607501
-
Trading in risk: Using markets to improve access control
-
Lake Tahoe, California, USA: ACM, September
-
I. Molloy, P.-C. Cheng, and P. Rohatgi, "Trading in risk: Using markets to improve access control," in Proceedings of New Security Paradigms Workshop (NSPW'08). Lake Tahoe, California, USA: ACM, September 2008, pp. 1-19.
-
(2008)
Proceedings of New Security Paradigms Workshop (NSPW'08).
, pp. 1-19
-
-
Molloy, I.1
Cheng, P.-C.2
Rohatgi, P.3
-
9
-
-
0029718539
-
Risk analysis modelling with the use of fuzzy logic
-
DOI 10.1016/0167-4048(96)00008-9
-
[9] W. Ru and J. Eloff, "Risk analysis modelling with the use of fuzzy logic," Computers & Security, vol.15, no.3, pp. 239-248, 1996. (Pubitemid 126351696)
-
(1996)
Computers and Security
, vol.15
, Issue.3
, pp. 239-248
-
-
De Ru, W.G.1
Eloff, J.H.P.2
-
10
-
-
27644580886
-
Using bayesian networks to model expected and unexpected operational losses
-
M. Neil, N. Fenton, and M. Tailor, "Using bayesian networks to model expected and unexpected operational losses," Risk Analysis, vol.25, no.4, pp. 963-972, 2005.
-
(2005)
Risk Analysis
, vol.25
, Issue.4
, pp. 963-972
-
-
Neil, M.1
Fenton, N.2
Tailor, M.3
-
11
-
-
33747074188
-
An overview of workflow management: From process modeling to workflow automation infrastructure
-
D. Georgakopoulos, M. Hornick, and A. Sheth, "An overview of workflow management: From process modeling to workflow automation infrastructure," Distributed and Parallel Databases, vol.3, no.2, pp. 119-153, 1995.
-
(1995)
Distributed and Parallel Databases
, vol.3
, Issue.2
, pp. 119-153
-
-
Georgakopoulos, D.1
Hornick, M.2
Sheth, A.3
-
12
-
-
69649097286
-
Answers to questions about fuzzy logic and fuzzy expert systems
-
Carnegie Mellon University
-
M. Kantrowitz, "Answers to questions about fuzzy logic and fuzzy expert systems," Carnegie Mellon University, http://www.cs.cmu.edu/Groups/ AI/html/faqs/ai/fuzzy/, Tech. Rep., 1997.
-
(1997)
Tech. Rep.
-
-
Kantrowitz, M.1
-
14
-
-
34548775488
-
Fuzzy multilevel security: An experiment on quantified risk.adaptive access control
-
Tech. Rep.
-
P.-C. Cheng, P. Rohatgi, and C. Keser, "Fuzzy multilevel security: An experiment on quantified risk.adaptive access control," IBM Thomas J. Watson Research Center, http://domino.research.ibm.com/comm/research-projects. nsf/pages/system-s-security.index.html/SFILE/ATTH4YZ5.pdf, Tech. Rep., 2007.
-
(2007)
IBM Thomas J. Watson Research Center
-
-
Cheng, P.-C.1
Rohatgi, P.2
Keser, C.3
-
15
-
-
0242456725
-
Dynamic and risk-aware network access management
-
Yorktown Heights, New York, USA, June
-
L. Teo, G. Ahn, and Y. Zheng, "Dynamic and risk-aware network access management," in Proceedings of the eighth ACM symposium on Access control models and technologies (SACMAT'03), Yorktown Heights, New York, USA, June 2003, pp. 156 - 162.
-
(2003)
Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies (SACMAT'03)
, pp. 156-162
-
-
Teo, L.1
Ahn, G.2
Zheng, Y.3
-
16
-
-
4143058053
-
Using trust and risk in role-based access control policies
-
Yorktown Heights, New York, USA: ACM, June
-
N. Dimmock, A. Belokosztolszki, and D. Eyers, "Using trust and risk in role-based access control policies," in Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies , (SACMAT04). Yorktown Heights, New York, USA: ACM, June 2004, pp. 156-162.
-
(2004)
Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies, (SACMAT04).
, pp. 156-162
-
-
Dimmock, N.1
Belokosztolszki, A.2
Eyers, D.3
|