-
4
-
-
84940102288
-
Firmato: A novel firewall management toolkit
-
BARTAL, Y., MAYER, A. J., NISSIM, K., AND WOOL, A. 1999. Firmato: A novel firewall management toolkit. In Proceedings of the IEEE Symposium on Security and Privacy.
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Bartal, Y.1
Mayer, A.J.2
Nissim, K.3
Wool, A.4
-
5
-
-
77953099715
-
Lessons learned from the deployment of a smartphone-based access-control system
-
BAUER, L., CRANOR, L. F., REITER, M. K., AND VANIEA, K. 2007a. Lessons learned from the deployment of a smartphone-based access-control system. In Proceedings of the 3rd Symposium on Usable Privacy and Security.
-
(2007)
Proceedings of the 3rd Symposium on Usable Privacy and Security
-
-
Bauer, L.1
Cranor, L.F.2
Reiter, M.K.3
Vaniea, K.4
-
6
-
-
33645995393
-
Device-enabled authorization in the grey system
-
Lecture Notes in Computer Science, Springer, Berlin, Germany
-
BAUER, L., GARRISS, S.,MCCUNE, J. M., REITER, M. K., ROUSE, J., AND RUTENBAR, P. 2005. Device-enabled authorization in the Grey system. In Information Security: Proceedings of the 8th International Conference,Lecture Notes in Computer Science, vol. 3650. Springer, Berlin, Germany, 63-81.
-
(2005)
Information Security: Proceedings of the 8th International Conference
, vol.3650
, pp. 63-81
-
-
Bauer, L.1
Garriss, S.2
Mccune, J.M.3
Reiter, M.K.4
Rouse, J.5
Rutenbar, P.6
-
12
-
-
33646048955
-
Greenpass: Decentralized, PKI-based authorization for wireless LANs
-
GOFFEE, N. C., KIM, S. H., SMITH, S., TAYLOR, P., ZHAO, M., AND MARCHESINI, J. 2004. Greenpass: Decentralized, PKI-based authorization for wireless LANs. In Proceedings of the 3rd Annual PKI Research and Development Workshop.
-
(2004)
Proceedings of the 3rd Annual PKI Research and Development Workshop
-
-
Goffee, N.C.1
Kim, S.H.2
Smith, S.3
Taylor, P.4
Zhao, M.5
Marchesini, J.6
-
14
-
-
84968352943
-
Policy management using access control spaces
-
JAEGER, T., EDWARDS, A., AND ZHANG, X. 2003. Policy management using access control spaces. ACM Trans. Inform. Syst. Sec. 6, 3, 327-364.
-
(2003)
ACM Trans. Inform. Syst. Sec
, vol.6
, Issue.3
, pp. 327-364
-
-
Jaeger, T.1
Edwards, A.2
Zhang, X.3
-
16
-
-
84942257511
-
The STRONGMAN architecture
-
KEROMYTIS, A. D., IOANNIDIS, S., GREENWALD, M. B., AND SMITH, J. M. 2003. The STRONGMAN architecture. In Proceedings of the 3rd DARPA Information Survivability Conference and Exposition.
-
(2003)
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition
-
-
Keromytis, A.D.1
Ioannidis, S.2
Greenwald, M.B.3
Smith, J.M.4
-
18
-
-
34248368977
-
Minerals: Using data mining to detect router misconfigurations
-
DOI 10.1145/1162678.1162681, Proceedings of the 2006 SIGCOMM Workshop on Mining Network Data, MineNet'06
-
LE, F., LEE, S., WONG, T., KIM, H. S., AND NEWCOMB, D. 2006. Minerals: Using data mining to detect router misconfigurations. In Proceedings of the SIGCOMM Workshop on Mining Network Data (Mine Net). 293-298. (Pubitemid 46740692)
-
(2006)
Proceedings of the 2006 SIGCOMM Workshop on Mining Network Data, MineNet'06
, vol.2006
, pp. 293-298
-
-
Le, F.1
Lee, S.2
Wong, T.3
Kim, H.S.4
Newcomb, D.5
-
19
-
-
62349090353
-
Rt: A role-based trust-management framework. In Proceedings of the 3rd DARPA Information Survivability Conference and Exposition. MAYER, A., WOOL, A., AND ZISKIND, E. 2000. Fang: A firewall analysis engine
-
LI, N. AND MITCHELL, J. C. 2003. Rt: A role-based trust-management framework. In Proceedings of the 3rd DARPA Information Survivability Conference and Exposition. MAYER, A., WOOL, A., AND ZISKIND, E. 2000. Fang: A firewall analysis engine. In Proceedings of the IEEE Symposium on Security and Privacy.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Li, N.1
Mitchell, J.C.2
-
20
-
-
57349105655
-
Mining roleswith semantic meanings
-
MOLLOY, I.,CHEN, H.,LI, T.,WANG, Q.,LI, N.,BERTINO, E.,CALO, S., AND LOBO, J. 2008. Mining roleswith semantic meanings. In Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (SACMAT). 21-30.
-
(2008)
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 21-30
-
-
Molloy, I.1
Chen, H.2
Li, T.3
Wang, Q.4
Li, N.5
Bertino, E.6
Calo, S.7
Lobo, J.8
-
21
-
-
70450248454
-
Evaluating role mining algorithms
-
MOLLOY, I., LI, N., LI, T., MAO, Z., WANG, Q., AND LOBO, J. 2009. Evaluating role mining algorithms. In Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT). 95-104.
-
(2009)
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 95-104
-
-
Molloy, I.1
Li, N.2
Li, T.3
Mao, Z.4
Wang, Q.5
Lobo, J.6
-
22
-
-
0003614529
-
SDSI-A simple distributed security infrastructure
-
Presented at the, Rump session
-
RIVEST, R. L. AND LAMPSON, B. 1996. SDSI-A simple distributed security infrastructure. Presented at the International Cryptology Conference. Rump session.
-
(1996)
International Cryptology Conference
-
-
Rivest, R.L.1
Lampson, B.2
-
23
-
-
0030086382
-
Role-based access controlmodels
-
SANDHU, R.,COYNE, E.,FEINSTEIN,H., AND YOUMAN, C. 1996. Role-based access controlmodels. IEEE Comp. 29, 2.
-
(1996)
IEEE Comp
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
28
-
-
33751028760
-
FIREMAN: A toolkit for FIRE wall modeling and analysis
-
YUAN, L.,MAI, J., SU, Z., CHEN, H., CHUAH, C.-N., AND MOHAPATRA, P. 2006. FIREMAN: A toolkit for FIREwall modeling and ANalysis. In Proceedings of the IEEE Symposium on Security and Privacy.
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Yuan L.Mai, J.1
Su, Z.2
Chen, H.3
Chuah, C.-N.4
Mohapatra, P.5
-
29
-
-
27144444729
-
A matrix algorithm for mining association rules
-
Lecture Notes in Computer Science,Springer, Berlin, Germany
-
YUAN, Y. AND HUANG, T. 2005. A matrix algorithm for mining association rules. In Proceedings of the International Conference on Intelligent Computing (ICIC). Lecture Notes in Computer Science, vol. 3644, Springer, Berlin, Germany.
-
(2005)
Proceedings of the International Conference on Intelligent Computing (ICIC)
, vol.3644
-
-
Yuan, Y.1
Huang, T.2
|