-
1
-
-
84992227458
-
Proposed nist standard for role-based access control
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli, "Proposed nist standard for role-based access control," ACM Trans. Inf. Syst. Secur., vol.4, no.3, pp. 224-274, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
2
-
-
0038049299
-
Tools for domain-based policy management of distributed systems
-
N. Damianou, N. Dulay, E. Lupu, M. Sloman, and T. Tonouchi, "Tools for domain-based policy management of distributed systems," in In Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2002, pp. 203-217.
-
(2002)
In Proceedings of the IEEE/IFIP Network Operations and Management Symposium
, pp. 203-217
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
Tonouchi, T.5
-
3
-
-
77952407814
-
Organization Based Access Control
-
A. Abou El Kalam, R. E. Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miège, C. Saurel, and G. Trouessin, "Organization Based Access Control," in POLICY, 2003.
-
(2003)
POLICY
-
-
Abou El Kalam, A.1
Baida, R.E.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miège, A.7
Saurel, C.8
Trouessin, G.9
-
5
-
-
84893077785
-
Obligation monitoring in policy management
-
C. Bettini, S. Jajodia, X. Wang, and D. Wijesekera, "Obligation monitoring in policy management," in POLICY, 2002.
-
(2002)
POLICY
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.3
Wijesekera, D.4
-
6
-
-
84944048132
-
The ponder policy specification language
-
S. B. Heidelberg, Ed.
-
Damianou, Dulay, Lupu, and Sloman, "The ponder policy specification language," in Policies for Distributed Systems and Networks, S. B. Heidelberg, Ed., 2001, pp. 18-38.
-
(2001)
Policies for Distributed Systems and Networks
, pp. 18-38
-
-
Damianou1
Dulay2
Lupu3
Sloman4
-
8
-
-
84893084758
-
A policy language for a pervasive computing environment
-
L. Kagal, T. Finin, and A. Joshi, "A policy language for a pervasive computing environment," in POLICY., 2003.
-
(2003)
POLICY.
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
9
-
-
70449344125
-
Formal characterizations of active databases: Part ii
-
S. B. . Heidelberg, Ed., [Online]. Available
-
C. Baral, J. Lobo, and G. Trajcevski, "Formal characterizations of active databases: Part ii," in Deductive and Object-Oriented Databases, S. B. . Heidelberg, Ed., 1997. [Online]. Available: http://dx.doi.org/10.1007/3- 540-63792-3-19
-
(1997)
Deductive and Object-Oriented Databases
-
-
Baral, C.1
Lobo, J.2
Trajcevski, G.3
-
11
-
-
47649083260
-
Modeling contextual security policies
-
F. Cuppens and N. Cuppens-Boulahia, "Modeling contextual security policies," Int. J. Inf. Secur., vol.7, no.4, pp. 285-305, 2008.
-
(2008)
Int. J. Inf. Secur.
, vol.7
, Issue.4
, pp. 285-305
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
-
12
-
-
84956993736
-
Role-based authorization constraints specification
-
G.-J. Ahn and R. Sandhu, "Role-based authorization constraints specification," ACM Trans. Inf. Syst. Secur., vol.3, no.4, pp. 207-226, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.4
, pp. 207-226
-
-
Ahn, G.-J.1
Sandhu, R.2
-
13
-
-
0033333334
-
Conflicts in policy-based distributed systems management
-
DOI 10.1109/32.824414
-
[13] E. Lupu and M. Sloman, "Conflicts in policy-based distributed systems management," IEEE Trans. Software Eng., vol.25, no.6, pp. 852-869, 1999. (Pubitemid 30583219)
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.6
, pp. 852-869
-
-
Lupu, E.C.1
Sloman, M.2
-
14
-
-
0000788149
-
Law-governed interaction: A coordination and control mechanism for heterogeneous distributed systems
-
N. H. Minsky and V. Ungureanu, "Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems," ACM Trans. Softw. Eng. Methodol, vol.9, pp. 273-305, 2000.
-
(2000)
ACM Trans. Softw. Eng. Methodol
, vol.9
, pp. 273-305
-
-
Minsky, N.H.1
Ungureanu, V.2
-
15
-
-
4143096953
-
On the role of roles: From role-based to role-sensitive access control
-
X. Ao and N. H. Minsky, "On the role of roles: from role-based to role-sensitive access control," in SACMAT, 2004.
-
(2004)
SACMAT
-
-
Ao, X.1
Minsky, N.H.2
-
16
-
-
28144457207
-
Nomad: A security model with non atomic actions and deadlines
-
F. Cuppens, N. Cuppens-Boulahia, and T. Sans, "Nomad: a security model with non atomic actions and deadlines," CSFW, 2005.
-
(2005)
CSFW
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Sans, T.3
|