-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
M. Abadi, M. Burrows, B. W. Lampson, and G. D. Plotkin. A calculus for access control in distributed systems. ACM Trans. Program. Lang. Syst., 15(4):706-734, 1993.
-
(1993)
ACM Trans. Program. Lang. Syst.
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.W.3
Plotkin, G.D.4
-
2
-
-
77954321643
-
A comparison of two privacy policy languages: EPAL and XACMl
-
A. H. Anderson. A comparison of two privacy policy languages: EPAL and XACMl. In SWS, pages 53-60, 2006.
-
(2006)
SWS
, pp. 53-60
-
-
Anderson, A.H.1
-
3
-
-
77954890832
-
-
ANSI. RBAC, 2004. INCITS 359-2004
-
ANSI. RBAC, 2004. INCITS 359-2004.
-
-
-
-
4
-
-
0025389823
-
Arithmetic classification of perfect models of stratified programs
-
K. R. Apt and H. Blair. Arithmetic classification of perfect models of stratified programs. Fundamenta Informaticae, XIII:1-17, 1990.
-
(1990)
Fundamenta Informaticae
, vol.13
, pp. 1-17
-
-
Apt, K.R.1
Blair, H.2
-
5
-
-
11244302711
-
Unification in privacy policy evaluation - Translating EPAL into Prolog
-
M. Backes, M. Dürmuth, and G. Karjoth. Unification in privacy policy evaluation - translating EPAL into Prolog. In POLICY, pages 185-188, 2004.
-
(2004)
POLICY
, pp. 185-188
-
-
Backes, M.1
Dürmuth, M.2
Karjoth, G.3
-
6
-
-
70450250101
-
The next 700 access control models or a unifying meta-model?
-
S. Barker. The next 700 access control models or a unifying meta-model? In SACMAT, pages 187-196, 2009.
-
(2009)
SACMAT
, pp. 187-196
-
-
Barker, S.1
-
7
-
-
44649085096
-
Efficient and flexible access control via jones-optimal logic program specialisation
-
S. Barker, M. Leuschel, and M. Varea. Efficient and flexible access control via jones-optimal logic program specialisation. Higher-Order and Symbolic Computation, 21(1):5-35, 2008.
-
(2008)
Higher-order and Symbolic Computation
, vol.21
, Issue.1
, pp. 5-35
-
-
Barker, S.1
Leuschel, M.2
Varea, M.3
-
10
-
-
3042584122
-
Flexible access control policy specification with constraint logic programming
-
S. Barker and P. Stuckey. Flexible access control policy specification with constraint logic programming. ACM Trans. on Information and System Security, 6(4):501-546, 2003.
-
(2003)
ACM Trans. on Information and System Security
, vol.6
, Issue.4
, pp. 501-546
-
-
Barker, S.1
Stuckey, P.2
-
11
-
-
56349097648
-
Secure computer system: Unified exposition and multics interpretation
-
D. E. Bell and L. J. LaPadula. Secure computer system: Unified exposition and multics interpretation. MITRE-2997, 1976.
-
(1976)
MITRE-2997
-
-
Bell, D.E.1
Lapadula, L.J.2
-
12
-
-
21844524540
-
The expressiveness of locally stratified programs
-
H. A. Blair, V. W. Marek, and J. S. Schlipf. The expressiveness of locally stratified programs. Ann. Math. Artif. Intell., 15(2):209-229, 1995.
-
(1995)
Ann. Math. Artif. Intell.
, vol.15
, Issue.2
, pp. 209-229
-
-
Blair, H.A.1
Marek, V.W.2
Schlipf, J.S.3
-
13
-
-
13244267910
-
Design rationale of ruleml: A markup language for semantic web rules
-
H. Boley, S. Tabet, and G. Wagner. Design rationale of ruleml: A markup language for semantic web rules. In SWWS 2001, pages 381-401, 2001.
-
(2001)
SWWS 2001
, pp. 381-401
-
-
Boley, H.1
Tabet, S.2
Wagner, G.3
-
15
-
-
0027702164
-
A goal-oriented approach to computing the well-founded semantics
-
3
-
W. Chen and D. S. Warren. A goal-oriented approach to computing the well-founded semantics. J. Log. Program., 17(2/3&4):279-300, 1993.
-
(1993)
J. Log. Program
, vol.17
, Issue.2-4
, pp. 279-300
-
-
Chen, W.1
Warren, D.S.2
-
17
-
-
0014797273
-
A relational model of data for large shared data banks
-
E. F. Codd. A relational model of data for large shared data banks. Commun. ACM, 13(6):377-387, 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.6
, pp. 377-387
-
-
Codd, E.F.1
-
18
-
-
3042822164
-
P3P : Making privacy policies more useful
-
L. F. Cranor. P3P : Making privacy policies more useful. IEEE Security & Privacy, 1(6):50-55, 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.6
, pp. 50-55
-
-
Cranor, L.F.1
-
21
-
-
85102591607
-
Limiting disclosure in hippocratic databases
-
K. LeFevre, R. Agrawal, V. Ercegovac, R. Ramakrishnan, Y. Xu, and D. J. DeWitt. Limiting disclosure in hippocratic databases. In VLDB, pages 108-119, 2004.
-
(2004)
VLDB
, pp. 108-119
-
-
Lefevre, K.1
Agrawal, R.2
Ercegovac, V.3
Ramakrishnan, R.4
Xu, Y.5
DeWitt, D.J.6
-
22
-
-
70349333899
-
Privacy-aware role-based access control
-
Q. Ni, E. Bertino, J. Lobo, and S. B. Calo. Privacy-aware role-based access control. IEEE Security & Privacy, 7(4):35-43, 2009.
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.4
, pp. 35-43
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
Calo, S.B.4
-
23
-
-
34548016110
-
Privacy-aware role based access control
-
Q. Ni, A. Trombetta, E. Bertino, and J. Lobo. Privacy-aware role based access control. In SACMAT, pages 41-50, 2007.
-
(2007)
SACMAT
, pp. 41-50
-
-
Ni, Q.1
Trombetta, A.2
Bertino, E.3
Lobo, J.4
-
24
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
S. L. Osborn, R. S. Sandhu, and Q. Munawer. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Secur., 3(2):85-106, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.L.1
Sandhu, R.S.2
Munawer, Q.3
-
25
-
-
0016555241
-
The protection of information in computer systems
-
M. D. Schroeder and J. H. Saltzer. The protection of information in computer systems. Procs. IEEE 63, 9:1278-1308, 1975.
-
(1975)
Procs. IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Schroeder, M.D.1
Saltzer, J.H.2
-
26
-
-
11144322222
-
The PING personally controlled electronic medical record system: Technical architecture
-
W. Simons, K. Mandl, and I. Kohane. The PING personally controlled electronic medical record system: Technical architecture. Journal of the American Medical Informatics Association, 12(1):45-54, 2005.
-
(2005)
Journal of the American Medical Informatics Association
, vol.12
, Issue.1
, pp. 45-54
-
-
Simons, W.1
Mandl, K.2
Kohane, I.3
-
27
-
-
0348066009
-
The alternating fixpoint of logic programs with negation
-
A. van Gelder. The alternating fixpoint of logic programs with negation. J. Comput. Syst. Sci., 47(1):185-221, 1993.
-
(1993)
J. Comput. Syst. Sci.
, vol.47
, Issue.1
, pp. 185-221
-
-
Van Gelder, A.1
-
28
-
-
84899266027
-
Creating the policy-aware web: Discretionary, rules-based access for the world wide web
-
in Elena Ferrari and Bhavani Thuraisingham, editors, IOS. Idea Group Inc
-
D. J. Weitzner, J. Hendler, T. Berners-lee, and D. Connolly. Creating the policy-aware web: Discretionary, rules-based access for the world wide web. In in Elena Ferrari and Bhavani Thuraisingham, editors, Web and Information Security. IOS. Idea Group Inc., 2005.
-
(2005)
Web and Information Security
-
-
Weitzner, D.J.1
Hendler, J.2
Berners-Lee, T.3
Connolly, D.4
|