-
2
-
-
34548715313
-
Gradual release: Unifying declassification, encryption and key release policies
-
[AS07] May
-
[AS07] A. Askarov and A. Sabelfeld. Gradual release: Unifying declassification, encryption and key release policies. In Proc. IEEE Symp. on Security and Privacy, pages 207-221, May 2007.
-
(2007)
Proc. IEEE Symp. on Security and Privacy
, pp. 207-221
-
-
Askarov, A.1
Sabelfeld, A.2
-
3
-
-
11244343640
-
Policy contexts: Controlling information flow in parameterised RBAC
-
[BEM03] Proceedings. POLICY 2003
-
[BEM03] A. Belokosztolszki, DMEyers, and K.Moody. Policy contexts: Controlling information flow in parameterised RBAC. In IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003. Proceedings. POLICY 2003, pages 99-110, 2003.
-
(2003)
IEEE 4th International Workshop on Policies for Distributed Systems and Networks, 2003
, pp. 99-110
-
-
Belokosztolszki, A.1
Eyers, M.D.2
Moody, K.3
-
5
-
-
50249109550
-
Expressive declassification policies and modular static enforcement
-
[BNR08] IEEE Computer Society
-
[BNR08] A. Banerjee, D. Naumann, and S. Rosenberg. Expressive declassification policies and modular static enforcement. In Proc. IEEE Symp. on Security and Privacy, pages 339-353. IEEE Computer Society, 2008.
-
(2008)
Proc. IEEE Symp. on Security and Privacy
, pp. 339-353
-
-
Banerjee, A.1
Naumann, D.2
Rosenberg, S.3
-
9
-
-
0024631953
-
What you always wanted to know about Datalog(and never dared to ask)
-
[CGT89]
-
[CGT89] S. Ceri, G. Gottlob, and L. Tanca. What you always wanted to know about Datalog(and never dared to ask). IEEE Transactions on Knowledge and Data Engineering, 1(1):146-166, 1989.
-
(1989)
IEEE Transactions on Knowledge and Data Engineering
, vol.1
, Issue.1
, pp. 146-166
-
-
Ceri, S.1
Gottlob, G.2
Tanca, L.3
-
10
-
-
0035791053
-
Securing context-aware applications using environment roles
-
[CLS+01] ACM
-
[CLS+01] Michael J. Covington, Wende Long, Srividhya Srinivasan, Anind K. Dev, Mustaque Ahamad, and Gregory D. Abowd. Securing context-aware applications using environment roles. In SACMAT '01: Proceedings of the sixth ACM symposium on Access control models and technologies, pages 10-20. ACM, 2001.
-
(2001)
SACMAT '01: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
, pp. 10-20
-
-
Covington, M.J.1
Long, W.2
Srividhya Srinivasan, A.K.3
Ahamad, D.M.4
Abowd, G.D.5
-
11
-
-
84958776545
-
Optimal implementation of conjunctive queries in relational databases
-
[CM77]
-
[CM77] A. K. Chandra and P. M. Merlin. Optimal implementation of conjunctive queries in relational databases. In STOC, pages 77-90, 1977.
-
(1977)
STOC
, pp. 77-90
-
-
Chandra, A.K.1
Merlin, P.M.2
-
12
-
-
0031075172
-
On the equivalence of recursive and nonrecursive datalog programs
-
[CV97]
-
[CV97] Surajit Chaudhuri and Moshe Y. Vardi. On the equivalence of recursive and nonrecursive datalog programs. Journal of Computer and System Sciences, 54(1):61-78, 1997.
-
(1997)
Journal of Computer and System Sciences
, vol.54
, Issue.1
, pp. 61-78
-
-
Chaudhuri, S.1
Vardi, M.Y.2
-
13
-
-
0016949746
-
A lattice model of secure information flow
-
[Den76] May
-
[Den76] D. E. Denning. A lattice model of secure information flow. Comm. of the ACM, 19(5):236-243, May 1976.
-
(1976)
Comm. of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
15
-
-
33749558954
-
Specifying and reasoning about dynamic access-control policies
-
[DFK06] Springer
-
[DFK06] Daniel J. Dougherty, Kathi Fisler, and Shriram Krishnamurthi. Specifying and reasoning about dynamic access-control policies. In Automated Reasoning, Third International Joint Conference, IJCAR 2006, volume 4130 of Lecture Notes in Computer Science, pages 632-646. Springer, 2006.
-
(2006)
Automated Reasoning, Third International Joint Conference, IJCAR 2006, Volume 4130 of Lecture Notes in Computer Science
, pp. 632-646
-
-
Daniel, J.1
Dougherty2
Fisler, K.3
Krishnamurthi, S.4
-
16
-
-
84992227458
-
Proposed nist standard for role-based access control
-
+01]
-
+01] David F. Ferraiolo, Ravi Sandhu, Serban Gavrila, D. Richard Kuhn, and Ramaswamy Chandramouli. Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur., 4(3):224-274, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
18
-
-
2442507870
-
Abstract non-interference: Parameterizing non-interference by abstract interpretation
-
[GM04] January
-
[GM04] R. Giacobazzi and I. Mastroeni. Abstract non-interference: Parameterizing non-interference by abstract interpretation. In Proc. ACM Symp. on Principles of Programming Languages, pages 186-197, January 2004.
-
(2004)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 186-197
-
-
Giacobazzi, R.1
Mastroeni, I.2
-
19
-
-
33747447895
-
Dynamic updating of information-flow policies
-
[HTHZ05] June
-
[HTHZ05] M. Hicks, S. Tse, B. Hicks, and S. Zdancewic. Dynamic updating of information-flow policies. In Workshop on Foundations of Computer Security, pages 7-18, June 2005.
-
(2005)
Workshop on Foundations of Computer Security
, pp. 7-18
-
-
Hicks, M.1
Tse, S.2
Hicks, B.3
Zdancewic, S.4
-
20
-
-
0034829512
-
SD3: A trust management system with certified evaluation
-
[Jim01]
-
[Jim01] T. Jim. SD3: A trust management system with certified evaluation. In IEEE Symposium on Security and Privacy, pages 106-115, 2001.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 106-115
-
-
Jim, T.1
-
21
-
-
0039015629
-
Authentication in distributed systems: Theory and practice
-
[LABW91] ACM
-
[LABW91] Butler Lampson, Martín Abadi, Michael Burrows, and Edward Wobber. Authentication in distributed systems: theory and practice. In SOSP '91: Proceedings of the thirteenth ACM symposium on Operating systems principles, pages 165-182. ACM, 1991.
-
(1991)
SOSP '91: Proceedings of the Thirteenth ACM Symposium on Operating Systems Principles
, pp. 165-182
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
24
-
-
0031682833
-
Complete, safe information flow with decentralized labels
-
[ML98] May
-
[ML98] A. C. Myers and B. Liskov. Complete, safe information flow with decentralized labels. In Proc. IEEE Symp. on Security and Privacy, pages 186-197, May 1998.
-
(1998)
Proc. IEEE Symp. on Security and Privacy
, pp. 186-197
-
-
Myers, A.C.1
Liskov, B.2
-
25
-
-
0032646625
-
JFlow: Practical mostly-static information flow control
-
[Mye99] January
-
[Mye99] A. C. Myers. JFlow: Practical mostly-static information flow control. In Proc. ACM Symp. on Principles of Programming Languages, pages 228-241, January 1999.
-
(1999)
Proc. ACM Symp. on Principles of Programming Languages
, pp. 228-241
-
-
Myers, A.C.1
-
26
-
-
12844283698
-
Jif: Java information flow
-
+ Located at July
-
+06] A. C. Myers, L. Zheng, S. Zdancewic, S. Chong, and N. Nystrom. Jif: Java information flow. Software release. Located at http://www.cs.cornell.edu/jif, July 2001-2006.
-
(2001)
Software Release
, vol.6
-
-
Myers, A.C.1
Zheng, L.2
Zdancewic, S.3
Chong, S.4
Nystrom, N.5
-
27
-
-
0030086382
-
Role-based access control models
-
[SCFY96] Feb
-
[SCFY96] R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman. Role-based access control models. Computer, 29(2):38-47, Feb 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
30
-
-
0035276729
-
A per model of secure information flow in sequential programs
-
[SS01] March
-
[SS01] A. Sabelfeld and D. Sands. A per model of secure information flow in sequential programs. Higher Order and Symbolic Computation, 14(1):59-91, March 2001.
-
(2001)
Higher Order and Symbolic Computation
, vol.14
, Issue.1
, pp. 59-91
-
-
Sabelfeld, A.1
Sands, D.2
-
32
-
-
84976685263
-
Equivalences among relational expressions with the union and difference operators
-
[SY80]
-
[SY80] Y. Sagiv and M. Yannakakis. Equivalences among relational expressions with the union and difference operators. Journal of the ACM, 27, 1980.
-
(1980)
Journal of the ACM
, vol.27
-
-
Sagiv, Y.1
Yannakakis, M.2
|