-
1
-
-
26444620059
-
Incremental algorithms for interprocedural analysis of safety properties
-
Etessami, K., Rajamani, S. K. eds., Springer, Heidelberg
-
Conway, C., Namjoshi, K., Dams, D., Edwards, S.: Incremental algorithms for interprocedural analysis of safety properties. In: Etessami, K., Rajamani, S. K. (eds.) CAV 2005. LNCS, vol. 3576, pp. 449-461. Springer, Heidelberg (2005)
-
(2005)
CAV 2005. LNCS
, vol.3576
, pp. 449-461
-
-
Conway, C.1
Namjoshi, K.2
Dams, D.3
Edwards, S.4
-
3
-
-
85088054290
-
Verification and changeimpact analysis of access-control policies
-
Fisler, K., Krishnamurthi, S., Meyerovich, L. A., Tschantz, M. C.: Verification and changeimpact analysis of access-control policies. In: International Conference on Software Engineering (ICSE), pp. 196-205 (2005)
-
(2005)
International Conference on Software Engineering (ICSE)
, pp. 196-205
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.A.3
Tschantz, M.C.4
-
4
-
-
33745214222
-
Counting solutions to the view maintenance problem
-
Gupta, A., Katiyar, D., Mumick, I. S.: Counting solutions to the view maintenance problem. In: Workshop on Deductive Databases, pp. 185-194 (1992)
-
(1992)
Workshop on Deductive Databases
, pp. 185-194
-
-
Gupta, A.1
Katiyar, D.2
Mumick, I.S.3
-
5
-
-
0027621766
-
Maintaining views incrementally
-
Gupta, A., Mumick, I. S., Subrahmanian, V. S.: Maintaining views incrementally. In: International Conference on Management of Data, pp. 157-166 (1993)
-
(1993)
International Conference on Management of Data
, pp. 157-166
-
-
Gupta, A.1
Mumick, I.S.2
Subrahmanian, V.S.3
-
6
-
-
0016984825
-
Protection in operating systems
-
Harrison, M. A., Ruzzo, W. L., Ullman, J. D.: Protection in operating systems. Communications of the ACM 19(8), 461-471 (1976)
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
7
-
-
0033698475
-
-
June
-
Jackson, D., Schechter, I., Shlyakhter, I.: Alcoa: the alloy constraint analyzer, pp. 730-733 (June 2000)
-
(2000)
Alcoa: The Alloy Constraint Analyzer
, pp. 730-733
-
-
Jackson, D.1
Schechter, I.2
Shlyakhter, I.3
-
8
-
-
55949085989
-
Towards formal verification of role-based access control policies
-
Jha, S., Li, N., Tripunitara, M., Wang, Q., Winsborough, W.: Towards formal verification of role-based access control policies. IEEE Transactions on Dependable and Secure Computing 5 (2) (2008)
-
(2008)
IEEE Transactions on Dependable and Secure Computing
, vol.5
, Issue.2
-
-
Jha, S.1
Li, N.2
Tripunitara, M.3
Wang, Q.4
Winsborough, W.5
-
11
-
-
0345742974
-
-
Lu, J., Moerkotte, G., Schu, J., Subrahmanian, V. S.: Efficient maintenance of materialized mediated views (1995)
-
(1995)
Efficient Maintenance of Materialized Mediated Views
-
-
Lu, J.1
Moerkotte, G.2
Schu, J.3
Subrahmanian, V.S.4
-
12
-
-
0033652039
-
The NIST model for role based access control: Towards a unified standard
-
Sandhu, D. F. F. R., Kuhn, D. R.: The NIST model for role based access control: Towards a unified standard. In: ACM SACMAT, pp. 47-63 (2000)
-
(2000)
ACM SACMAT
, pp. 47-63
-
-
Sandhu, D.F.F.R.1
Kuhn, D.R.2
-
15
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
Sandhu, R., Bhamidipati, V., Munawer, Q.: The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and Systems Security 2(1), 105-135 (1999)
-
(1999)
ACM Transactions on Information and Systems Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
16
-
-
33947695249
-
Policy analysis for administrative role based access control
-
Sasturkar, A., Yang, P., Stoller, S. D., Ramakrishnan, C.: Policy analysis for administrative role based access control. In: 19th IEEE Computer Security Foundations Workshop (2006)
-
(2006)
19th IEEE Computer Security Foundations Workshop
-
-
Sasturkar, A.1
Yang, P.2
Stoller, S.D.3
Ramakrishnan, C.4
-
17
-
-
0242625217
-
A lightweight approach to specification and analysis of role-based access control extensions
-
Schaad, A., Moffett, J. D.: A lightweight approach to specification and analysis of role-based access control extensions. In: Proc.of SACMAT, pp. 13-22 (2002)
-
(2002)
Proc.of SACMAT
, pp. 13-22
-
-
Schaad, A.1
Moffett, J.D.2
-
18
-
-
77952403780
-
Efficient policy analysis for administrative role based access control
-
Stoller, S., Yang, P., Ramakrishnan, C. R., Gofman, M.: Efficient policy analysis for administrative role based access control. In: ACM CCS, pp. 445-455 (2007)
-
(2007)
ACM CCS
, pp. 445-455
-
-
Stoller, S.1
Yang, P.2
Ramakrishnan, C.R.3
Gofman, M.4
|