-
1
-
-
33748067444
-
A model-checking approach to analysing organisational controls in a loan origination process
-
SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
-
Schaad, A., Lotz, V., Sohr, K.: A model-checking approach to analysing organisational controls in a loan origination process. In: SACMAT, pp. 139-149. ACM, New York (2006) (Pubitemid 44300751)
-
(2006)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, vol.2006
, pp. 139-149
-
-
Schaad, A.1
Lotz, V.2
Sohr, K.3
-
2
-
-
33750027244
-
-
TR 336
-
Cerone, A., Xiangpeng, Z., Krishnan, P.: Modelling and resource allocation planning of BPEL workflows under security constraints. TR 336, UNU-IIST (2006), http://www.iist.unu.edu/
-
(2006)
Modelling and Resource Allocation Planning of BPEL Workflows under Security Constraints
-
-
Cerone, A.1
Xiangpeng, Z.2
Krishnan, P.3
-
3
-
-
47949104986
-
Formal verification of business workflows and role based access control systems
-
Dury, A., Boroday, S., Petrenko, A., Lotz, V.: Formal verification of business workflows and role based access control systems. In: SECURWARE 2007, pp. 201-210 (2007)
-
(2007)
SECURWARE 2007
, pp. 201-210
-
-
Dury, A.1
Boroday, S.2
Petrenko, A.3
Lotz, V.4
-
5
-
-
22944445210
-
SATMC: A SAT-based model checker for security protocols
-
Alferes, J.J., Leite, J. (eds.) JELIA 2004. Springer, Heidelberg
-
Armando, A., Compagna, L.: SATMC: a SAT-based model checker for security protocols. In: Alferes, J.J., Leite, J. (eds.) JELIA 2004. LNCS (LNAI), vol. 3229, pp. 730-733. Springer, Heidelberg (2004)
-
(2004)
LNCS (LNAI)
, vol.3229
, pp. 730-733
-
-
Armando, A.1
Compagna, L.2
-
6
-
-
77953249981
-
Sat-based model-checking for security protocols analysis
-
Springer Heidelberg
-
Armando, A., Compagna, L.: Sat-based model-checking for security protocols analysis. In: IJIS. Springer, Heidelberg (2007)
-
(2007)
IJIS
-
-
Armando, A.1
Compagna, L.2
-
8
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38-47 (1996)
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
9
-
-
30644477677
-
Supporting conditional delegation in secure workflow management systems
-
ACM Press, New York
-
Atluri, V., Warner, J.: Supporting conditional delegation in secure workflow management systems. In: SACMAT, pp. 49-58. ACM Press, New York (2005)
-
(2005)
SACMAT
, pp. 49-58
-
-
Atluri, V.1
Warner, J.2
-
10
-
-
0031642569
-
An action language based on causal explanation: Preliminary report
-
AAAI Press, Menlo Park
-
Giunchiglia, E., Lifschitz, V.: An action language based on causal explanation: Preliminary report. In: AAAI 1998, pp. 623-630. AAAI Press, Menlo Park (1998)
-
(1998)
AAAI 1998
, pp. 623-630
-
-
Giunchiglia, E.1
Lifschitz, V.2
-
11
-
-
84929881457
-
Planning as satisfiability in nondeterministic domains
-
AAAI Press / The MIT Press
-
Ferraris, P., Giunchiglia, E.: Planning as satisfiability in nondeterministic domains. In: AAAI 2000 and IAAI 2000, pp. 748-753. AAAI Press / The MIT Press (2000)
-
(2000)
AAAI 2000 and IAAI 2000
, pp. 748-753
-
-
Ferraris, P.1
Giunchiglia, E.2
-
13
-
-
26444497860
-
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications
-
Etessami, K., Rajamani, S.K. (eds.) CAV 2005. Springer, Heidelberg
-
Armando, A., Basin, D., Boichut, Y., Chevalier, Y., Compagna, L., Cuellar, J., Drielsma, H.P., Heám, P.C., Kouchnarenko, O., Mantovani, J., Mödersheim, S., von Oheimb, D., Rusinowitch, M., Santiago, J., Turuani, M., Viganò, L., Vigneron, L.: The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 281-285. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3576
, pp. 281-285
-
-
Armando, A.1
Basin, D.2
Boichut, Y.3
Chevalier, Y.4
Compagna, L.5
Cuellar, J.6
Drielsma, H.P.7
Heám, P.C.8
Kouchnarenko, O.9
Mantovani, J.10
Mödersheim, S.11
Von Oheimb, D.12
Rusinowitch, M.13
Santiago, J.14
Turuani, M.15
Viganò, L.16
Vigneron, L.17
-
14
-
-
35048868416
-
LTL model checking for security protocols
-
IEEE Computer Society, Los Alamitos
-
Armando, A., Carbone, R., Compagna, L.: LTL model checking for security protocols. In: CSF-20, pp. 385-396. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
CSF-20
, pp. 385-396
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
-
15
-
-
70349233792
-
Formal analysis of SAML 2.0 web browser single sign-on: Breaking the SAML-based single sign-on for google apps
-
ACM, New York
-
Armando, A., Carbone, R., Compagna, L., Cuéllar, J., Tobarra, M.L.: Formal analysis of SAML 2.0 web browser single sign-on: breaking the SAML-based single sign-on for google apps. In: FMSE, pp. 1-10. ACM, New York (2008)
-
(2008)
FMSE
, pp. 1-10
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
Cuéllar, J.4
Tobarra, M.L.5
-
16
-
-
0001793083
-
Encoding Plans in Propositional Logic
-
Kautz, H., McAllester, H., Selman, B.: Encoding Plans in Propositional Logic. In: KR, pp. 374-384 (1996)
-
(1996)
KR
, pp. 374-384
-
-
Kautz, H.1
McAllester, H.2
Selman, B.3
-
17
-
-
70350635706
-
Verification of business process entailment constraints using SPIN
-
Massacci, F., Redwine Jr., S.T., Zannone, N. (eds.) ESSoS 2009. Springer, Heidelberg
-
Wolter, C., Miseldine, P., Meinel, C.: Verification of business process entailment constraints using SPIN. In: Massacci, F., Redwine Jr., S.T., Zannone, N. (eds.) ESSoS 2009. LNCS, vol. 5429. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5429
-
-
Wolter, C.1
Miseldine, P.2
Meinel, C.3
-
18
-
-
35048849152
-
Model-checking access control policies
-
Zhang, K., Zheng, Y. (eds.) ISC 2004. Springer, Heidelberg
-
Guelev, D.P., Ryan, M., Schobbens, P.Y.: Model-checking access control policies. In: Zhang, K., Zheng, Y. (eds.) ISC 2004. LNCS, vol. 3225, pp. 219-230. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3225
, pp. 219-230
-
-
Guelev, D.P.1
Ryan, M.2
Schobbens, P.Y.3
|