-
2
-
-
84956993736
-
Role-Based authorization constraints specification
-
AHN, G.-J. AND SANDHU, R. S. 2000. Role-Based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3, 4, 207-226.
-
(2000)
ACM Trans. Inf. Syst. Secur. 3
, vol.4
, pp. 207-226
-
-
Ahn, G.-J.1
Sandhu, R.S.2
-
4
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
BERTINO, E., FERRARI, E., AND ATLURI, V. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2, 1, 65-104.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
7
-
-
0023266943
-
A comparision of commercial and military computer security policies
-
IEEE Computer Society Press
-
CLARK, D. D. AND WILSON, D. R. 1987. A comparision of commercial and military computer security policies. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 184-194.
-
(1987)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
11
-
-
0010916383
-
-
DIMACS Series in Discrete Mathematics and Theoretical Computer Science, AMS Press
-
DU, D., GU, J., AND PARDALOS, P. M. Eds. 1997. Satisfiability Problem: Theory and Applications. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 35, AMS Press.
-
(1997)
Satisfiability Problem: Theory and Applications
, vol.35
-
-
Du, D.1
Gu, J.2
Pardalos, P.3
-
14
-
-
85006937063
-
Practical safety in flexible access control models
-
JAEGER, T. AND TIDSWELL, J. E. 2001. Practical safety in flexible access control models. ACM Trans. Inf. Syst. Secur. 4, 2, 158-190.
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.2
, pp. 158-190
-
-
Jaeger, T.1
Tidswell, J.E.2
-
15
-
-
78651393570
-
-
LE BERRE D. (PROJECT LEADER). 2006. SAT4J: A satisfiability library for Java. http://www.sat4j.org/.
-
(2006)
-
-
Le Berre, D.1
-
18
-
-
76849085284
-
Resiliency policies in access control
-
LI, N.,WANG, Q., AND TRIPUNITARA, M. 2009. Resiliency policies in access control. ACM Trans. Inf. Syst. Secur. 12, 4, 1-34.
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.12
, Issue.4
, pp. 1-34
-
-
Li, N.1
Wang, Q.2
Tripunitara, M.3
-
19
-
-
0030086382
-
Role-Based access control models
-
SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-Based access control models. IEEE Comput. 29, 2, 38-47.
-
(1996)
IEEE Comput.
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
21
-
-
77952403780
-
Efficient policy analysis for administrative role based access control
-
ACM, New York
-
STOLLER, S. D., YANG, P., RAMAKRISHNAN, C. R., AND GOFMAN, M. I. 2007. Efficient policy analysis for administrative role based access control. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07). ACM, New York, 445-455.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS'07)
, pp. 445-455
-
-
Stoller, S.D.1
Yang, P.2
Ramakrishnan, C.R.3
Gofman, M.I.4
|