-
1
-
-
84956993736
-
Role-based authorization constraints specification
-
AHN, G.-J. AND SANDHU, R. S. 2000. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Sec. 3, 4, 207-226.
-
(2000)
ACM Trans. Inf. Syst. Sec.
, vol.3
, Issue.4
, pp. 207-226
-
-
Ahn, G.-J.1
Sandhu, R.S.2
-
4
-
-
0010916383
-
Satisfiability problem: Theory and applications
-
DU, D., GU, J., AND PARDALOS, P. M., Eds., AMS Press
-
DU, D., GU, J., AND PARDALOS, P. M., Eds. 1997. Satisfiability problem: Theory and applications. In DIMACS Series in Discrete Mathematics and Theoretical Computer Science, 35. AMS Press.
-
(1997)
DIMACS Series in Discrete Mathematics and Theoretical Computer Science
, vol.35
-
-
-
8
-
-
0016984825
-
Protection in operating systems
-
HARRISON, M. A., RUZZO, W. L., AND ULLMAN, J. D. 1976. Protection in operating systems. Comm. ACM 19, 8, 461-471.
-
(1976)
Comm. ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
9
-
-
85006937063
-
Practical safety in flexible access control models
-
JAEGER, T. AND TIDSWELL, J. E. 2001. Practical safety in flexible access control models. ACM Trans. Inf. Syst. Sec. 4, 2, 158-190.
-
(2001)
ACM Trans. Inf. Syst. Sec.
, vol.4
, Issue.2
, pp. 158-190
-
-
Jaeger, T.1
Tidswell, J.E.2
-
10
-
-
84957011508
-
Decidability of safety in graphbased models for access control
-
Springer
-
KOCH, M., MANCINI, L. V., AND PARISI-PRESICCE, F. 2002a. Decidability of safety in graphbased models for access control. In Proceedings of the 7th European Symposium on Research in Computer Security (ESORICS'02). Springer, 229-243.
-
(2002)
Proceedings of the 7th European Symposium on Research in Computer Security (ESORICS'02)
, pp. 229-243
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
11
-
-
85008430937
-
A graph-based formalism for RBAC
-
Aug.
-
KOCH, M.,MANCINI, L. V., AND PARISI-PRESICCE, F. 2002b. A graph-based formalism for RBAC. ACM Trans. Inf. Syst. Sec. 5, 3 (Aug.), 332-365.
-
(2002)
ACM Trans. Inf. Syst. Sec.
, vol.5
, Issue.3
, pp. 332-365
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
14
-
-
14844297758
-
On mutually-exclusive roles and separation of duty
-
ACM Press
-
LI, N., BIZRI, Z., AND TRIPUNITARA, M. V. 2004. On mutually-exclusive roles and separation of duty. In Proceedings of the ACM Conference on Computer and Communications Security (CCS'04). ACM Press, 42-51.
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security (CCS'04)
, pp. 42-51
-
-
Li, N.1
Bizri, Z.2
Tripunitara, M.V.3
-
15
-
-
30544438141
-
Beyond proof-of-compliance: Security analysis in trust management
-
LI, N., MITCHELL, J. C., AND WINSBOROUGH, W. H. 2005. Beyond proof-of-compliance: Security analysis in trust management. J. ACM 52, 3, 474-514.
-
(2005)
J. ACM
, vol.52
, Issue.3
, pp. 474-514
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
17
-
-
0017512599
-
A linear time algorithm for deciding subject security
-
LIPTON, R. J. AND SNYDER, L. 1977. A linear time algorithm for deciding subject security. J. ACM 24, 3, 455-464.
-
(1977)
J. ACM
, vol.24
, Issue.3
, pp. 455-464
-
-
Lipton, R.J.1
Snyder, L.2
-
20
-
-
0016555241
-
The protection of information in computer systems
-
SALTZER, J. H. AND SCHROEDER,M. D. 1975. The protection of information in computer systems. Proc. IEEE 63, 9, 1278-1308.
-
(1975)
Proc. IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
22
-
-
0023999796
-
The schematic protection model: Its definition and analysis for acyclic attenuating systems
-
SANDHU, R. S. 1988a. The schematic protection model: Its definition and analysis for acyclic attenuating systems. J. ACM 35, 2, 404-432.
-
(1988)
J. ACM
, vol.35
, Issue.2
, pp. 404-432
-
-
Sandhu, R.S.1
-
25
-
-
0030086382
-
Role-based access control models
-
SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Comput. 29, 2, 38-47.
-
(1996)
IEEE Comput.
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
|