-
3
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38-47 (1996)
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
4
-
-
27644537252
-
Modeling security requirements through ownership, permission and delegation
-
IEEE Press, Los Alamitos
-
Giorgini, P., Massacci, F., Mylopoulos, J.: Modeling security requirements through ownership, permission and delegation. In: RE, pp. 167-176. IEEE Press, Los Alamitos (2005)
-
(2005)
RE
, pp. 167-176
-
-
Giorgini, P.1
Massacci, F.2
Mylopoulos, J.3
-
6
-
-
84887471494
-
LTL Model Checking for Security Protocols
-
Armando, A., Carbone, R., Compagna, L.: LTL Model Checking for Security Protocols. In: JANCL, Special Issue on Logic and Information Security (2009)
-
(2009)
JANCL, Special Issue on Logic and Information Security
-
-
Armando, A.1
Carbone, R.2
Compagna, L.3
-
7
-
-
33748067444
-
A model-checking approach to analysing organisational controls in a loan origination process
-
ACM, New York
-
Schaad, A., Lotz, V., Sohr, K.: A model-checking approach to analysing organisational controls in a loan origination process. In: SACMAT, pp. 139-149. ACM, New York (2006)
-
(2006)
SACMAT
, pp. 139-149
-
-
Schaad, A.1
Lotz, V.2
Sohr, K.3
-
8
-
-
70350635706
-
Verification of business process entailment constraints using SPIN
-
Massacci, F., Redwine Jr., S.T., Zannone, N. (eds.) ESSoS 2009. Springer, Heidelberg
-
Wolter, C., Miseldine, P., Meinel, C.: Verification of business process entailment constraints using SPIN. In: Massacci, F., Redwine Jr., S.T., Zannone, N. (eds.) ESSoS 2009. LNCS, vol. 5429, pp. 1-15. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5429
, pp. 1-15
-
-
Wolter, C.1
Miseldine, P.2
Meinel, C.3
-
10
-
-
33645964601
-
Evaluating access control policies through model checking
-
Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. Springer, Heidelberg
-
Zhang, N., Ryan, M., Guelev, D.P.: Evaluating access control policies through model checking. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 446-460. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3650
, pp. 446-460
-
-
Zhang, N.1
Ryan, M.2
Guelev, D.P.3
-
11
-
-
0038613723
-
Workflow analyzed for security and privacy in using databases
-
Teepe, W., van de Riet, R., Olivier, M.: Workflow analyzed for security and privacy in using databases. J. Comput. Secur. 11(3), 353-363 (2003)
-
(2003)
J. Comput. Secur.
, vol.11
, Issue.3
, pp. 353-363
-
-
Teepe, W.1
Van De Riet, R.2
Olivier, M.3
-
12
-
-
79551542513
-
Specification, verification and explanation of violation for data aware compliance rules
-
Awad, A., Weidlich, M., Weske, M.: Specification, verification and explanation of violation for data aware compliance rules. In: ICSOC-Service Wave (2009)
-
(2009)
ICSOC-Service Wave
-
-
Awad, A.1
Weidlich, M.2
Weske, M.3
-
14
-
-
57349158625
-
Rubacon: Automated support for model-based compliance engineering
-
Höhn, S., Jürjens, J.: Rubacon: automated support for model-based compliance engineering. In: ICSE, pp. 875-878 (2008)
-
(2008)
ICSE
, pp. 875-878
-
-
Höhn, S.1
Jürjens, J.2
|