-
1
-
-
0031637195
-
On SDSI's linked local name spaces
-
M. Abadi, On SDSI's linked local name spaces, Journal of Computer Security 6(1,2) (1998), 3-22.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 3-22
-
-
Abadi, M.1
-
2
-
-
0027667638
-
A calculus for access control in distributed systems
-
M. Abadi, M. Burrows, B. Lampson and G. Plotkin, A calculus for access control in distributed systems, ACM Transactions on Programming Languages and Systems 15(4) (1993), 706-734.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
3
-
-
0003928313
-
-
Addison-Wesley, Reading, MA
-
S. Abiteboul, R. Hull and V. Vianu, Foundations of Databases, Addison-Wesley, Reading, MA, 1995.
-
(1995)
Foundations of Databases
-
-
Abiteboul, S.1
Hull, R.2
Vianu, V.3
-
5
-
-
3042584122
-
Flexible access control policy specification with constraint logic programming
-
S. Barker and P.J. Stuckey, Flexible access control policy specification with constraint logic programming, ACM Transactions on Information and System Security 6(4) (2003), 501-546.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.4
, pp. 501-546
-
-
Barker, S.1
Stuckey, P.J.2
-
6
-
-
33947674219
-
Cassandra: Flexible trust management and its application to electronic health records
-
(Ph.D. thesis), Computer Laboratory, University of Cambridge available at:
-
M.Y. Becker, Cassandra: Flexible trust management and its application to electronic health records (Ph.D. thesis), Technical Report UCAM-CL-TR-648, Computer Laboratory, University of Cambridge, 2005; available at: www.cl.cam.ac.uk/TechReports/UCAM-CL-TR-648.html.
-
(2005)
Technical Report UCAM-CL-TR-648
-
-
Becker, M.Y.1
-
7
-
-
33947705701
-
Information governance in NHS's NPfIT: A case for policy specification
-
M.Y. Becker, Information governance in NHS's NPfIT: A case for policy specification, International Journal of Medical Informatics 76(5,6) (2007), 432-437.
-
(2007)
International Journal of Medical Informatics
, vol.76
, Issue.5-6
, pp. 432-437
-
-
Becker, M.Y.1
-
8
-
-
34548051301
-
SecPAL: Design and semantics of a decentralized authorization language
-
available at: research.microsoft.
-
M.Y. Becker, C. Fournet and A.D. Gordon, SecPAL: Design and semantics of a decentralized authorization language, Technical report, Microsoft Research, 2006; available at: research.microsoft. com/research/pubs/view.aspx?tr-id=1166.
-
(2006)
Technical Report
-
-
Becker, M.Y.1
Fournet, C.2
Gordon, A.D.3
-
13
-
-
4944223328
-
Cassandra: Flexible trust management, applied to electronic health records
-
M.Y. Becker and P. Sewell, Cassandra: Flexible trust management, applied to electronic health records, in: IEEE Computer Security Foundations Workshop, 2004, pp. 139-154.
-
(2004)
IEEE Computer Security Foundations Workshop
, pp. 139-154
-
-
Becker, M.Y.1
Sewell, P.2
-
14
-
-
0003400251
-
Secure computer systems: Unified exposition and Multics interpretation
-
The MITRE Corporation, July
-
D.E. Bell and L.J. LaPadula, Secure computer systems: Unified exposition and Multics interpretation, Technical report, The MITRE Corporation, July 1975.
-
(1975)
Technical Report
-
-
Bell, D.E.1
Lapadula, L.J.2
-
15
-
-
0032153903
-
An access control model supporting periodicity constraints and temporal reasoning
-
E. Bertino, C. Bettini, E. Ferrari and P. Samarati, An access control model supporting periodicity constraints and temporal reasoning, ACM Trans. Database Syst. 23(3) (1998), 231-285.
-
(1998)
ACM Trans. Database Syst.
, vol.23
, Issue.3
, pp. 231-285
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
16
-
-
78449251691
-
A temporal authorization model
-
New York, NY, USA 1994, ACM Press
-
E. Bertino, C. Bettini and P. Samarati, A temporal authorization model, in: CCS '94: Proceedings of the 2nd ACM Conference on Computer and Communications Security, New York, NY, USA, 1994, ACM Press, 1994, pp. 126-135.
-
(1994)
CCS '94: Proceedings of the 2nd ACM Conference on Computer and Communications Security
, pp. 126-135
-
-
Bertino, E.1
Bettini, C.2
Samarati, P.3
-
17
-
-
0035790640
-
A logical framework for reasoning about access controlmodels
-
New York, NY, USA 2001, ACM Press
-
E. Bertino, B. Catania, E. Ferrari and P. Perlasca, A logical framework for reasoning about access controlmodels, in: SACMAT '01: Proceedings of the 6th ACMSymposium on Access ControlModels and Technologies, New York, NY, USA, 2001, ACM Press, 2001, pp. 41-52.
-
(2001)
SACMAT '01: Proceedings of the 6th ACMSymposium on Access ControlModels and Technologies
, pp. 41-52
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
20
-
-
0024631953
-
What you always wanted to know about Datalog (and never dared to ask
-
S. Ceri, G. Gottlob and L. Tanca, What you always wanted to know about Datalog (and never dared to ask), IEEE Transactions on Knowledge and Data Engineering 1(1) (1989), 146-166.
-
(1989)
IEEE Transactions on Knowledge and Data Engineering
, vol.1
, Issue.1
, pp. 146-166
-
-
Ceri, S.1
Gottlob, G.2
Tanca, L.3
-
22
-
-
0037303408
-
The PERMIS X.509 role based privilege management infrastructure
-
D.W. Chadwick and A. Otenko, The PERMIS X.509 role based privilege management infrastructure, Future Generation Computer Systems 19(2) (2003), 277-289.
-
(2003)
Future Generation Computer Systems
, vol.19
, Issue.2
, pp. 277-289
-
-
Chadwick, D.W.1
Otenko, A.2
-
23
-
-
0029695436
-
Tabled evaluation with delaying for general logic programs
-
W. Chen and D. S. Warren, Tabled evaluation with delaying for general logic programs, Journal of the ACM 43(1) (1996), 20-74.
-
(1996)
Journal of the ACM
, vol.43
, Issue.1
, pp. 20-74
-
-
Chen, W.1
Warren, D.S.2
-
25
-
-
85008027756
-
Complexity and expressive power of logic programming
-
Washington, DC, USA 1997, IEEE Computer Society
-
E. Dantsin, T. Eiter, G. Gottlob and A. Voronkov, Complexity and expressive power of logic programming, in: CCC '97: Proceedings of the 12th Annual IEEE Conference on Computational Complexity, Washington, DC, USA, 1997, IEEE Computer Society, 1997. p. 82.
-
(1997)
CCC '97: Proceedings of the 12th Annual IEEE Conference on Computational Complexity
, pp. 82
-
-
Dantsin, E.1
Eiter, T.2
Gottlob, G.3
Voronkov, A.4
-
27
-
-
24644431553
-
Policies, models and languages for access control
-
Databases in Networked Information Systems
-
S.D.C. di Vimercati, P. Samarati and S. Jajodia, Policies, models and languages for access control, in: Databases in Networked Information Systems, Lecture Notes in Computer Science, Vol.3433, 2005, pp. 225-237.
-
(2005)
Lecture Notes in Computer Science
, vol.3433
, pp. 225-237
-
-
Di Vimercati, S.D.C.1
Samarati, P.2
Jajodia, S.3
-
28
-
-
0023561596
-
Extension tables: Memo relations in logic programming
-
S.W. Dietrich, Extension tables: Memo relations in logic programming, in: Symposium on Logic Programming, 1987, pp. 264-272.
-
(1987)
Symposium on Logic Programming
, pp. 264-272
-
-
Dietrich, S.W.1
-
29
-
-
35048838926
-
A unified approach to trust delegation and authorization in large-scale grids
-
Microsoft Corporation September available at:
-
B. Dillaway, A unified approach to trust, delegation and authorization in large-scale grids, Whitepaper, Microsoft Corporation, September 2006; available at: research.microsoft.com/projects/ SecPAL/.
-
(2006)
Whitepaper
-
-
Dillaway, B.1
-
31
-
-
0003358457
-
SPKI certificate theory
-
September,available at:
-
C.M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas and T. Ylonen, SPKI certificate theory, RFC 2693, September 1999; available at: www.ietf.org/rfc/rfc2693.txt.
-
(1999)
RFC
, vol.2693
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
33
-
-
0032218229
-
A security architecture for computational grids
-
I.T. Foster, C. Kesselman, G. Tsudik and S. Tuecke, A security architecture for computational grids, in: ACM Conference on Computer and Communications Security, 1998, pp. 83-92.
-
(1998)
ACM Conference on Computer and Communications Security
, pp. 83-92
-
-
Foster, I.T.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
38
-
-
4944228287
-
A formal foundation for XrML
-
Washington, DC, USA 2004, IEEE Computer Society
-
J.Y. Halpern and V. Weissman, A formal foundation for XrML, in: CSFW '04: Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW'04), Washington, DC, USA, 2004, IEEE Computer Society, 2004, p. 251.
-
(2004)
CSFW '04: Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW'04)
, pp. 251
-
-
Halpern, J.Y.1
Weissman, V.2
-
39
-
-
35048832698
-
-
Syracuse University, available at:
-
P. Humenn, The formal semantics of XACML (draft), Syracuse University, 2003; available at: lists.oasis-open.org/archives/xacml/200310/ pdf00000.pdf.
-
(2003)
The Formal Semantics of XACML (Draft)
-
-
Humenn, P.1
-
40
-
-
47249126757
-
Fine-grained access control for GridFTP using SecPAL
-
M. Humphrey, S.-M. Park, J. Feng, N. Beekwilder, G. Wasson, J. Hogg, B. LaMacchia and B. Dillaway, Fine-grained access control for GridFTP using SecPAL, in: 8th IEEE/ACM International Conference on Grid Computing, 2007.
-
(2007)
8th IEEE/ACM International Conference on Grid Computing
-
-
Humphrey, M.1
Park, S.-M.2
Feng, J.3
Beekwilder, N.4
Wasson, G.5
Hogg, J.6
Lamacchia, B.7
Dillaway, B.8
-
41
-
-
4243532938
-
Constraint logic programming: A survey
-
J. Jaffar and M.J. Maher, Constraint logic programming: A survey, Journal of Logic Programming 19(20) (1994), 503-581.
-
(1994)
Journal of Logic Programming
, vol.19
, Issue.20
, pp. 503-581
-
-
Jaffar, J.1
Maher, M.J.2
-
42
-
-
0001619596
-
Flexible support for multiple access control policies
-
S. Jajodia, P. Samarati, M.L. Sapino and V.S. Subrahmanian, Flexible support for multiple access control policies, ACM Trans. Database Syst. 26(2) (2001), 214-260.
-
(2001)
ACM Trans. Database Syst.
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
44
-
-
0024626557
-
Unification: A multidisciplinary survey
-
K. Knight, Unification: a multidisciplinary survey, ACM Computing Surveys (CSUR) 21(1) (1989), 93-124.
-
(1989)
ACM Computing Surveys (CSUR)
, vol.21
, Issue.1
, pp. 93-124
-
-
Knight, K.1
-
45
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
B. Lampson, M. Abadi, M. Burrows and E. Wobber, Authentication in distributed systems: theory and practice, ACM Trans. Computer Syst. 10(4) (1992), 265-310.
-
(1992)
ACM Trans. Computer Syst.
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
48
-
-
0037974359
-
Datalog with constraints: A foundation for trust management languages
-
N. Li and J.C. Mitchell, Datalog with constraints: A foundation for trust management languages, in: Proc. PADL, 2003, pp. 58-73.
-
(2003)
Proc. PADL
, pp. 58-73
-
-
Li, N.1
Mitchell, J.C.2
-
50
-
-
0031382488
-
Reconciling role-based management and role-based access control
-
E.C. Lupu and M. Sloman, Reconciling role-based management and role-based access control, in: ACM Workshop on Role-based Access Control, 1997, pp. 135-141.
-
(1997)
ACM Workshop on Role-based Access Control
, pp. 135-141
-
-
Lupu, E.C.1
Sloman, M.2
-
52
-
-
77954707049
-
-
Microsoft Corporation, available at: research.
-
Microsoft Corporation, SecPAL Research Release for Microsoft .NET, 2007; available at: research. microsoft.com/projects/SecPAL/.
-
(2007)
SecPAL Research Release for Microsoft .NET
-
-
-
54
-
-
33745883651
-
-
Version 2.0 core specification, available at:
-
OASIS, eXtensible Access Control Markup Language (XACML) Version 2.0 core specification, 2005; available at: www.oasis-open.org/committees/xacml/.
-
(2005)
EXtensible Access Control Markup Language (XACML)
-
-
-
55
-
-
85015282781
-
Linear unification
-
New York, NY, USA 1976, ACM Press
-
M.S. Paterson and M.N. Wegman, Linear unification, in: STOC '76: Proceedings of the 8th Annual ACM Symposium on Theory of Computing, New York, NY, USA, 1976, ACM Press, 1976, pp. 181- 186.
-
(1976)
STOC '76: Proceedings of the 8th Annual ACM Symposium on Theory of Computing
, pp. 181-186
-
-
Paterson, M.S.1
Wegman, M.N.2
-
57
-
-
0001821002
-
Constraint databases: A survey
-
Semantics in Databases, Springer
-
P. Z. Revesz, Constraint databases: A survey, in: Semantics in Databases, Lecture Notes in Computer Science, Vol.1358, Springer, 1995, pp. 209-246.
-
(1995)
Lecture Notes in Computer Science
, vol.1358
, pp. 209-246
-
-
Revesz, P.Z.1
-
58
-
-
84958042111
-
Can we eliminate certificate revocations lists?
-
R.L. Rivest, Can we eliminate certificate revocations lists?, in: Financial Cryptography, 1998, pp. 178-183.
-
(1998)
Financial Cryptography
, pp. 178-183
-
-
Rivest, R.L.1
-
61
-
-
2942654406
-
Certificate-based authorization policy in a PKI environment
-
M. Thompson, A. Essiari and S. Mudumbai, Certificate-based authorization policy in a PKI environment, ACM Transactions on Information and System Security 6(4) (2003), 566-588.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.4
, pp. 566-588
-
-
Thompson, M.1
Essiari, A.2
Mudumbai, S.3
-
62
-
-
0242453160
-
Memoing evaluation for constraint extensions of Datalog
-
D. Toman, Memoing evaluation for constraint extensions of Datalog, Constraints 2(3,4) (1997), 337-359.
-
(1997)
Constraints
, vol.2
, Issue.3-4
, pp. 337-359
-
-
Toman, D.1
-
63
-
-
0038842147
-
Assigning an appropriate meaning to database logic with negation
-
H. Yamada, Y. Kambayashi and S. Ohta, eds, World Scientific
-
J.D. Ullman, Assigning an appropriate meaning to database logic with negation, in: Computers as Our Better Partners, H. Yamada, Y. Kambayashi and S. Ohta, eds, World Scientific, 1994, pp. 216- 225.
-
(1994)
Computers As Our Better Partners
, pp. 216-225
-
-
Ullman, J.D.1
-
66
-
-
84942318236
-
Security for grid services
-
V. Welch, F. Siebenlist, I. Foster, J. Bresnahan, K. Czajkowski, J. Gawor, C. Kesselman, S. Meder, L. Pearlman and S. Tuecke, Security for grid services, in: HPDC '03: Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing (HPDC'03), 2003, p. 48.
-
(2003)
HPDC '03: Proceedings of the 12th IEEE International Symposium on High Performance Distributed Computing (HPDC'03)
, pp. 48
-
-
Welch, V.1
Siebenlist, F.2
Foster, I.3
Bresnahan, J.4
Czajkowski, K.5
Gawor, J.6
Kesselman, C.7
Meder, S.8
Pearlman, L.9
Tuecke, S.10
|