-
1
-
-
77952396623
-
-
American National Standards Institute ANSI, International Committee for Information Technology Standards INCITS. Role-based access control. ANSI INCITS Standard 359-2004, Feb
-
American National Standards Institute (ANSI), International Committee for Information Technology Standards (INCITS). Role-based access control. ANSI INCITS Standard 359-2004, Feb. 2004.
-
(2004)
-
-
-
6
-
-
0000134883
-
Fixed-parameter tractability and completeness I: Basic results
-
R. G. Downey and M. R. Fellows. Fixed-parameter tractability and completeness I: Basic results. SIAM Journal on Computing, 24 (4):873-921, 1995.
-
(1995)
SIAM Journal on Computing
, vol.24
, Issue.4
, pp. 873-921
-
-
Downey, R.G.1
Fellows, M.R.2
-
8
-
-
33244470893
-
Verification and change-impact analysis of access-control policies
-
K. Fisler, S. Krishnamurthi, L. A. Meyerovich, and M. C. Tschantz. Verification and change-impact analysis of access-control policies. In International Conference on Software Engineering (ICSE), pages 196-205, 2005.
-
(2005)
International Conference on Software Engineering (ICSE)
, pp. 196-205
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.A.3
Tschantz, M.C.4
-
10
-
-
11944266314
-
Verifying information flow goals in Security-Enhanced Linux
-
J. D. Guttman, A. L. Herzog, J. D. Ramsdell, and C. W. Skorupka. Verifying information flow goals in Security-Enhanced Linux. Journal of Computer Security, 13 (1):115-134, 2005.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.1
, pp. 115-134
-
-
Guttman, J.D.1
Herzog, A.L.2
Ramsdell, J.D.3
Skorupka, C.W.4
-
12
-
-
0016984825
-
Protection in operating systems
-
M. A. Harrison, W. L. Ruzzo, and J. D. Ullman. Protection in operating systems. Communications of the ACM, 19 (8):461-471, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
19
-
-
30544438141
-
Beyond proof-of-compliance: Security analysis in trust management
-
N. Li, J. C. Mitchell, and W. H. Winsborough. Beyond proof-of-compliance: Security analysis in trust management. Journal of the ACM, 52 (3):474-514, 2005.
-
(2005)
Journal of the ACM
, vol.52
, Issue.3
, pp. 474-514
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
21
-
-
0016592810
-
Reduction: A method of proving properties of parallel programs
-
R. J. Lipton. Reduction: A method of proving properties of parallel programs. Communications of the ACM, 18 (12):717-721, 1975.
-
(1975)
Communications of the ACM
, vol.18
, Issue.12
, pp. 717-721
-
-
Lipton, R.J.1
-
22
-
-
0017512599
-
A linear time algorithm for deciding subject security
-
July
-
R. J. Lipton and L. Snyder. A linear time algorithm for deciding subject security. J. ACM, 24 (3):455-464, July 1977.
-
(1977)
J. ACM
, vol.24
, Issue.3
, pp. 455-464
-
-
Lipton, R.J.1
Snyder, L.2
-
25
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
Feb
-
R. Sandhu, V. Bhamidipati, and Q. Munawer. The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and Systems Security (TISSEC), 2 (1):105-135, Feb. 1999.
-
(1999)
ACM Transactions on Information and Systems Security (TISSEC)
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
26
-
-
0030086382
-
Role-based access control models
-
Feb
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. IEEE Computer, 29 (2):38-47, Feb. 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
31
-
-
77952398111
-
-
www.cs.stonybrook.edu/~stoller/ccs2007/.
-
-
-
|