-
1
-
-
34249881318
-
Risk management for distributed authorization
-
C. Skalka, X. S. Wang, and P. Chapin, "Risk management for distributed authorization," J. Comp. Sec., vol. 15, no. 4, pp. 447-489, 2007.
-
(2007)
J. Comp. Sec.
, vol.15
, Issue.4
, pp. 447-489
-
-
Skalka, C.1
Wang, X.S.2
Chapin, P.3
-
2
-
-
33747817026
-
Reconfiguring role based access control policies using risk, semantics
-
B. Aziz, S. N. Foley, J. Herbert, and G. Swart, "Reconfiguring role based access control policies using risk, semantics," J. High Speed Networks, vol. 15, no. 3, pp. 261-273, 2006.
-
(2006)
J. High Speed Networks
, vol.15
, Issue.3
, pp. 261-273
-
-
Aziz, B.1
Foley, S.N.2
Herbert, J.3
Swart, G.4
-
3
-
-
34547371707
-
Enforcing access control using risk assessment
-
N. N. Diep, L. X. Hung, Y. Zhung, S. Lee, Y-K. Lee, and H. Lee, "Enforcing access control using risk assessment," in Proc. of ECUMN-07, 2007, pp. 419-424.
-
(2007)
Proc. of ECUMN-07
, pp. 419-424
-
-
Diep, N.N.1
Hung, L.X.2
Zhung, Y.3
Lee, S.4
Lee, Y.-K.5
Lee, H.6
-
4
-
-
35248873795
-
Usage control: A vision for next generation access control
-
R. S. Sandhu and J. Park, "Usage control: A vision for next generation access control," in. Proc. of MMM-ACNS-03, 2003, pp. 17-31.
-
(2003)
Proc. of MMM-ACNS-03
, pp. 17-31
-
-
Sandhu, R.S.1
Park, J.2
-
5
-
-
70350630603
-
Remote attestation of attribute updates and information flows in a ucon system
-
ser. LNCS, Springer-Verlag
-
M. Nauman, M. Alam, X. Zhang, and T. Ali, "Remote attestation of attribute updates and information flows in a ucon system," in Proc. of Trust-09, ser. LNCS, Springer-Verlag, 2009, vol. 5471, pp 63-80.
-
(2009)
Proc. of Trust-09
, vol.5471
, pp. 63-80
-
-
Nauman, M.1
Alam, M.2
Zhang, X.3
Ali, T.4
-
6
-
-
67649670564
-
Safety analysis of usage control authorization models
-
X. Zhang, R. Sandhu, and F. Parisi-Presicce, "Safety analysis of usage control authorization models," in Proc. of ASIACCS, 2006, pp. 243-254.
-
(2006)
Proc. of ASIACCS
, pp. 243-254
-
-
Zhang, X.1
Sandhu, R.2
Parisi-Presicce, F.3
-
7
-
-
77954482156
-
A survey of usage control in computer security
-
December
-
A. Lazouski, F. Martinelli, and P. Mori, "A survey of usage control in computer security," IIT-CNR, Tech. Rep. HT TR12/2008, December 2008.
-
(2008)
IIT-CNR, Tech. Rep. HT TR12/2008
-
-
Lazouski, A.1
Martinelli, F.2
Mori, P.3
-
8
-
-
3142523603
-
ABC usage control model
-
ABC usage control model," TISSEC, vol. 7, no. 1, pp. 128-174, 2004.
-
(2004)
TISSEC
, vol.7
, Issue.1
, pp. 128-174
-
-
Park, J.1
Sandhu, R.2
-
10
-
-
77952604450
-
Risk-based usage control for service oriented architecture
-
L. Krautsevich, A. .Lazouski, F. Martinelli, and A. Yautsiukhin, "Risk-based usage control for service oriented architecture," in Proc. of PDP-I0, IEEE, 2010.
-
(2010)
Proc. of PDP-I0, IEEE
-
-
Krautsevich, L.1
Lazouski, A.2
Martinelli, F.3
Yautsiukhin, A.4
-
11
-
-
33748543201
-
Distributed usage control
-
A. Pretschner, M. Hilty, and D. Basin, "Distributed usage control," ACM Comm., vol. 49, no. 9, pp. 39-44, 2006.
-
(2006)
ACM Comm.
, vol.49
, Issue.9
, pp. 39-44
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.3
-
12
-
-
77954023526
-
A framework for analysis of data freshness
-
M. Bouzeghoub and V. Peralta, "A framework for analysis of data freshness," in Proc. of IQIS-04, 2004, pp. 59-67.
-
(2004)
Proc. of IQIS-04
, pp. 59-67
-
-
Bouzeghoub, M.1
Peralta, V.2
-
13
-
-
17644399080
-
Risk management guide for information technology systems
-
G. Stoneburner, A. Goguen, and A. Feringa, "Risk management guide for information technology systems," NIST, Tech. Rep. 800-30, 2001.
-
(2001)
NIST, Tech. Rep.
, vol.800
, Issue.30
-
-
Stoneburner, G.1
Goguen, A.2
Feringa, A.3
-
16
-
-
51349136634
-
Security policy preevaluation towards risk analysis
-
Y. Han, Y. Hori, and K. Sakurai, "Security policy preevaluation towards risk analysis," in Proc. of ISA-08, IEEE, 2008, pp. 415-420.
-
(2008)
Proc. of ISA-08, IEEE
, pp. 415-420
-
-
Han, Y.1
Hori, Y.2
Sakurai, K.3
-
17
-
-
33845414618
-
Toward information sharing: Benefit and risk access control (BARAC)
-
L. Zhang, A. Brodsky, and S. Jajodia, "Toward information sharing: Benefit and risk access control (BARAC)," in Proc. of POLICY-06, IEEE, 2006, pp. 45-53.
-
(2006)
Proc. of POLICY-06, IEEE
, pp. 45-53
-
-
Zhang, L.1
Brodsky, A.2
Jajodia, S.3
-
18
-
-
60349122060
-
Using trust and risk in access control for grid environment
-
Y. Li, H. Sun, Z. Chen, J. Ren, and H. Luo, "Using trust and risk in access control for grid environment," Proc. of SecTech08, 2008, pp. 13-16.
-
(2008)
Proc. of SecTech08
, pp. 13-16
-
-
Li, Y.1
Sun, H.2
Chen, Z.3
Ren, J.4
Luo, H.5
|