-
2
-
-
84956993736
-
Role-based authorization constraints specification
-
G-J. Ahn and R. Sandhu, "Role-Based Authorization Constraints Specification," ACM Trans. Information and System Security, vol.3, no.4, pp. 207-226, 2000.
-
(2000)
ACM Trans. Information and System Security
, vol.3
, Issue.4
, pp. 207-226
-
-
Ahn, G.-J.1
Sandhu, R.2
-
3
-
-
0026260631
-
An optimization technique for protocol conformance test generation based on uio sequences and rural Chinese postman tours
-
Nov.
-
A.V. Aho, A.T. Dahbura, D. Lee, and M.U. Uyar, "An Optimization Technique for Protocol Conformance Test Generation Based on UIO Sequences and Rural Chinese Postman Tours," IEEE Trans. Comm., vol.39, no.11, pp. 1604-1615, Nov. 1991.
-
(1991)
IEEE Trans. Comm.
, vol.39
, Issue.11
, pp. 1604-1615
-
-
Aho, A.V.1
Dahbura, A.T.2
Lee, D.3
Uyar, M.U.4
-
6
-
-
23244445557
-
X-GTRBAC: An XML-based policy specification framework and architecture for enterprise-wide access control
-
R. Bhatti, A. Ghafoor, E. Bertino, and J.B.D. Joshi, "X-GTRBAC: An XML-Based Policy Specification Framework and Architecture for Enterprise-Wide Access Control," ACM Trans. Information and System Security, vol.8, no.2, pp. 187-227, 2005.
-
(2005)
ACM Trans. Information and System Security
, vol.8
, Issue.2
, pp. 187-227
-
-
Bhatti, R.1
Ghafoor, A.2
Bertino, E.3
Joshi, J.B.D.4
-
7
-
-
12344337151
-
Automated testing of security functions using a combined model & interface driven approach
-
R. Chandramouli and M. Blackburn, "Automated Testing of Security Functions Using a Combined Model & Interface Driven Approach," Proc. 37th Hawaii Int'l Conf. System Sciences, pp. 299- 308, 2004.
-
(2004)
Proc. 37th Hawaii Int'l Conf. System Sciences
, pp. 299-308
-
-
Chandramouli, R.1
Blackburn, M.2
-
8
-
-
0017973244
-
Testing software design modelled by finite state machines
-
May
-
T.S. Chow, "Testing Software Design Modelled by Finite State Machines," IEEE Trans. Software Eng., vol.4, no.3, pp. 178-187, May 1978.
-
(1978)
IEEE Trans. Software Eng.
, vol.4
, Issue.3
, pp. 178-187
-
-
Chow, T.S.1
-
9
-
-
0030242266
-
The combinatorial design approach to automatic test generation
-
Sept.
-
D.M. Cohen, S.R. Dalal, J. Parelius, and G.C. Patton, "The Combinatorial Design Approach to Automatic Test Generation," IEEE Software, vol.13, no.5, pp. 83-89, Sept. 1996.
-
(1996)
IEEE Software
, vol.13
, Issue.5
, pp. 83-89
-
-
Cohen, D.M.1
Dalal, S.R.2
Parelius, J.3
Patton, G.C.4
-
11
-
-
0017959155
-
Hints on test data selection
-
Apr.
-
R.A. DeMillo, R.J. Lipton, and F.G. Sayward, "Hints on Test Data Selection," Computer, vol.11, no.4, pp. 34-41, Apr. 1978.
-
(1978)
Computer
, vol.11
, Issue.4
, pp. 34-41
-
-
Demillo, R.A.1
Lipton, R.J.2
Sayward, F.G.3
-
12
-
-
14044273010
-
A first step towards formal verification of security policy properties for RBAC
-
M. Drouineaud, M. Bortin, P. Torrini, and K. Sohr, "A First Step Towards Formal Verification of Security Policy Properties for RBAC," Proc. Int'l Conf. Quality Software, pp. 60-67, 2004.
-
(2004)
Proc. Int'l Conf. Quality Software
, pp. 60-67
-
-
Drouineaud, M.1
Bortin, M.2
Torrini, P.3
Sohr, K.4
-
14
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D.F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn, and R. Chandramouli, "Proposed NIST Standard for Role-Based Access Control," ACM Trans. Information and System Security, vol.4, no.3, pp. 224-274, 2001.
-
(2001)
ACM Trans. Information and System Security
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
15
-
-
0036986572
-
Projected state machine coverage for software testing
-
G. Friedman, A. Hartman, K. Nagin, and T. Shiran, "Projected State Machine Coverage for Software Testing," Proc. Int'l Symp. Software Testing and Analysis, pp. 134-143, 2002.
-
(2002)
Proc. Int'l Symp. Software Testing and Analysis
, pp. 134-143
-
-
Friedman, G.1
Hartman, A.2
Nagin, K.3
Shiran, T.4
-
16
-
-
0026172995
-
Test selection based on finite state models
-
June
-
S. Fujiwara, G.V. Bochmann, F. Khendek, M. Amalou, and A. Ghedamsi, "Test Selection Based on Finite State Models," IEEE Trans. Software Eng., vol.17, no.6, pp. 591-603, June 1991.
-
(1991)
IEEE Trans. Software Eng.
, vol.17
, Issue.6
, pp. 591-603
-
-
Fujiwara, S.1
Bochmann, G.V.2
Khendek, F.3
Amalou, M.4
Ghedamsi, A.5
-
17
-
-
73449117962
-
Conformance checking of RBAC policy and its implementation
-
R.H. Deng, F. Bao, H-H. Pang, and J. Zhou, eds.
-
F. Hansen and V. Oleshchuk, "Conformance Checking of RBAC Policy and Its Implementation," Proc. Information Security Practice and Experience Conf., R.H. Deng, F. Bao, H-H. Pang, and J. Zhou, eds., 2005.
-
(2005)
Proc. Information Security Practice and Experience Conf.
-
-
Hansen, F.1
Oleshchuk, V.2
-
18
-
-
73449116782
-
-
ANSI RBAC Standard, http://ite.gmu.edu/list/journals/tissec/ ANSI+INCITS+359 2004.pdf, 2008.
-
(2008)
ANSI RBAC Standard
-
-
-
19
-
-
73449107769
-
-
Common Vulnerabilities and Exposures, http://www.cve.mitre.org/, 2009.
-
(2009)
-
-
-
20
-
-
0030211668
-
Better verification through symmetry
-
C.N. Ip and D.L. Dill, "Better Verification through Symmetry," Formal Methods System Design, vol.9, nos. 1/2, pp. 41-75, 1996.
-
(1996)
Formal Methods System Design
, vol.9
, Issue.1-2
, pp. 41-75
-
-
Ip, C.N.1
Dill, D.L.2
-
21
-
-
17444406680
-
A generalized temporal role-based access control model
-
DOI 10.1109/TKDE.2005.1
-
J.B.D. Joshi, E. Bertino, U. Latif, and A. Ghafoor, "A Generalized Temporal Role-Based Access Control Model," IEEE Trans. Knowledge and Data Eng., vol.17, no.1, pp. 4-23, Jan. 2005. (Pubitemid 40536468)
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.1
, pp. 4-23
-
-
Joshi, J.B.D.1
Bertino, E.2
Latif, U.3
Ghafoor, A.4
-
22
-
-
0242456740
-
Dependencies and separation of duty constraints in GTRBAC
-
J.B.D. Joshi, B. Shafiq, A. Ghafoor, and E. Bertino, "Dependencies and Separation of Duty Constraints in GTRBAC," Proc. Symp. Access Control Models and Technologies, pp. 51-64, 2003.
-
(2003)
Proc. Symp. Access Control Models and Technologies
, pp. 51-64
-
-
Joshi, J.B.D.1
Shafiq, B.2
Ghafoor, A.3
Bertino, E.4
-
23
-
-
0033333334
-
Conflicts in policy-based distributed systems management
-
Nov./Dec.
-
E.C. Lupu and M. Sloman, "Conflicts in Policy-Based Distributed Systems Management," IEEE Trans. Software Eng., vol.25, no.6, pp. 852-869, Nov./Dec. 1999.
-
(1999)
IEEE Trans. Software Eng.
, vol.25
, Issue.6
, pp. 852-869
-
-
Lupu, E.C.1
Sloman, M.2
-
24
-
-
20844460416
-
MuJava: An automated class mutation system
-
Y-S. Ma, J. Offutt, and Y-R. Kwon, "MuJava: An Automated Class Mutation System," Software Testing, Verification and Reliability, vol.15, no.2, pp. 97-133, 2005.
-
(2005)
Software Testing, Verification and Reliability
, vol.15
, Issue.2
, pp. 97-133
-
-
Ma, Y.-S.1
Offutt, J.2
Kwon, Y.-R.3
-
25
-
-
73449137630
-
Scalable and effective test generation for role based access control systems
-
Center for Education and Research in Information Assurance and Security (CERIAS), Purdue Univ.
-
A. Masood, R. Bhatti, A. Ghafoor, and A. Mathur, "Scalable and Effective Test Generation for Role Based Access Control Systems," Technical Report TR 2006-24, Center for Education and Research in Information Assurance and Security (CERIAS), Purdue Univ., 2006.
-
(2006)
Technical Report TR 2006-24
-
-
Masood, A.1
Bhatti, R.2
Ghafoor, A.3
Mathur, A.4
-
27
-
-
0028513932
-
Access control: Principles and practice
-
Sept.
-
R. Sandhu and P. Samarati, "Access Control: Principles and Practice," IEEE Comm., vol.32, no.9, pp. 40-48, Sept. 1994.
-
(1994)
IEEE Comm
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.1
Samarati, P.2
-
28
-
-
0030086382
-
Role-based access control models
-
Feb.
-
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, "Role- Based Access Control Models," Computer, vol.29, no.2, pp. 38-47, Feb. 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
29
-
-
0024650136
-
Formal methods for protocol testing: A detailed study
-
Apr.
-
D.P. Sidhu and T.K. Leung, "Formal Methods for Protocol Testing: A Detailed Study," IEEE Trans. Software Eng., vol.15, no.4, pp. 413-426, Apr. 1989.
-
(1989)
IEEE Trans. Software Eng.
, vol.15
, Issue.4
, pp. 413-426
-
-
Sidhu, D.P.1
Leung, T.K.2
-
30
-
-
0031354777
-
Software unit test coverage and adequacy
-
Dec.
-
H. Zhu, P.A.V. Hall, and J.H.R. May, "Software Unit Test Coverage and Adequacy," ACM Computing Surveys, vol.29, no.4, pp. 366-427, Dec. 1997.
-
(1997)
ACM Computing Surveys
, vol.29
, Issue.4
, pp. 366-427
-
-
Zhu, H.1
Hall, P.A.V.2
May, J.H.R.3
|