-
1
-
-
85084164092
-
Enforcing well-formed and partially-formed transactions for Unix
-
USENIX Association
-
D. Povey, "Enforcing well-formed and partially-formed transactions for Unix," in Proceedings of the 8th conference on USENIX Security Symposium, vol.8. USENIX Association, 1999, pp. 5-5
-
(1999)
Proceedings of the 8th Conference on USENIX Security Symposium
, vol.8
, pp. 5-5
-
-
Povey, D.1
-
2
-
-
75949113807
-
On the importance of the separation-of-concerns principle in secure software engineering
-
(Serban, C., ed.)
-
B. D. Win, F. Piessens, W. Joosen, and T. Verhanneman, "On the importance of the separation-of-concerns principle in secure software engineering," in ACSA Workshop on the Application of Engineering Principles to System Security Design (Serban, C., ed.), 2003, pp. 1-10.
-
(2003)
ACSA Workshop on the Application of Engineering Principles to System Security Design
, pp. 1-10
-
-
Win, B.D.1
Piessens, F.2
Joosen, W.3
Verhanneman, T.4
-
7
-
-
49049100147
-
Secure computer systems: A mathematical model, volume II
-
D. E. Bell and L. J. LaPadula, "Secure computer systems: A mathematical model, volume II," in Journal of Computer Security 4, 1996, pp. 229-263,
-
(1996)
Journal of Computer Security 4
, pp. 229-263
-
-
Bell, D.E.1
Lapadula, L.J.2
-
10
-
-
33746862231
-
Using XML and XACML to support attribute based delegation
-
Washington, DC, USA: IEEE Computer Society
-
C. Ye and Z. Wu, "Using XML and XACML to support attribute based delegation," in CIT '05: Proceedings of the The Fifth International Conference on Computer and Information Technology. Washington, DC, USA: IEEE Computer Society, 2005, pp. 751-756.
-
(2005)
CIT '05: Proceedings of the the Fifth International Conference on Computer and Information Technology
, pp. 751-756
-
-
Ye, C.1
Wu, Z.2
-
11
-
-
79960190515
-
Break-glass: An approach to granting emergency access to healthcare systems
-
Joint NEMA/COCIR/JIRA White paper
-
"Break-glass: An approach to granting emergency access to healthcare systems," Joint NEMA/COCIR/JIRA Security and Privacy Committee (SPC), White paper, 2004.
-
(2004)
Security and Privacy Committee (SPC)
-
-
-
13
-
-
34548016797
-
Using semantics for automatic enforcement of access control policies among dynamic coalitions
-
V. Lotz and B. M. Thuraisingham, Eds. New York, NY USA: ACM Press
-
J. Warner, V. Atluri, R. Mukkamala, and J. Vaidya, "Using semantics for automatic enforcement of access control policies among dynamic coalitions," in SACMAT, V. Lotz and B. M. Thuraisingham, Eds. New York, NY USA: ACM Press, 2007, pp. 235-244.
-
(2007)
SACMAT
, pp. 235-244
-
-
Warner, J.1
Atluri, V.2
Mukkamala, R.3
Vaidya, J.4
-
14
-
-
33244470893
-
Verification and change-impact analysis of access-control policies
-
Proceedings - 27th International Conference on Software Engineering, ICSE05
-
[13] K. Fisler, S. Krishnamurthi, L. A. Meyerovich, and M. C. Tschantz, "Verification and change-impact analysis of accesscontrol policies," in ICSE, G.-C. Roman, W. G. Griswold, and B. Nuseibeh, Eds. New York, NY USA: ACM Press, 2005, pp. 196-205. (Pubitemid 43283593)
-
(2005)
Proceedings - 27th International Conference on Software Engineering, ICSE05
, pp. 196-205
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.A.3
Tschantz, M.C.4
-
16
-
-
34548023083
-
An approach to evaluate policy similarity
-
V. Lotz and B. M. Thuraisingham, Eds. New York, NY USA: ACM Press
-
D. Lin, P Rao, E. Bertino, and J. Lobo, "An approach to evaluate policy similarity," in SACMAT, V. Lotz and B. M. Thuraisingham, Eds. New York, NY USA: ACM Press, 2007, pp. 1-10.
-
(2007)
SACMAT
, pp. 1-10
-
-
Lin, D.1
Rao, P.2
Bertino, E.3
Lobo, J.4
-
17
-
-
60649103778
-
Pro active access control for business process-driven environments
-
Los Alamitos, CA, USA: IEEE Computer Society
-
M. Kohler and A. Schaad, "Pro active access control for business process-driven environments," in Annual Computer Security Applications Conference. Los Alamitos, CA, USA: IEEE Computer Society, 2008, pp. 153-162.
-
(2008)
Annual Computer Security Applications Conference
, pp. 153-162
-
-
Kohler, M.1
Schaad, A.2
|