-
3
-
-
79960045399
-
The policy machine for security policy management, in Proc
-
May
-
V. Hu, D. Frincke and D. Ferraiolo, The policy machine for security policy management, in Proc. ICCS Conference, San Francisco, May 2001.
-
(2001)
ICCS Conference, San Francisco
-
-
Hu, V.1
Frincke, D.2
Ferraiolo, D.3
-
4
-
-
0034446895
-
A modular approach to composing access control policies
-
November
-
P. Bonatti, S. Vimercati and P. Samarati, A modular approach to composing access control policies, in Proc. ACM Conference on Computer and Communication Security, Athens, Greece, November 2000.
-
(2000)
Proc. ACM Conference on Computer and Communication Security, Athens, Greece
-
-
Bonatti, P.1
Vimercati, S.2
Samarati, P.3
-
7
-
-
0033333334
-
Conflicts in policy-based distributed systems management
-
DOI 10.1109/32.824414
-
E. C. Lupu and M. Sloman, Conflict in policy-based distributed systems management, IEEE Trans Software Engineering 25(6) (1999) 852-869. (Pubitemid 30583219)
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.6
, pp. 852-869
-
-
Lupu, E.C.1
Sloman, M.2
-
10
-
-
79951881970
-
Property verification for generic access control models
-
Shanghai, China, December 17-20
-
V. C. Hu, R. D. Kuhn and T. Xie, Property Verification for Generic Access Control Models, in Proc. 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Application (TSP2008), Shanghai, China, December 17-20, 2008.
-
(2008)
Proc. 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Application (TSP2008)
-
-
Hu, V.C.1
Kuhn, R.D.2
Xie, T.3
-
13
-
-
0005314068
-
-
National Computer Security Center Technical Report 79-91, Library, No. S237 September
-
National Computer Security Center, Integrity in Automated information System, Technical Report 79-91, Library No. S237,254, September 1991.
-
(1991)
Integrity in Automated Information System
, vol.254
-
-
-
15
-
-
0003479190
-
-
Workflow Management Coalition documentation number WFMC-TC-1011, February
-
Workflow Management Coalition, Workflow Management Coalition Terminology & Glossary, documentation number WFMC-TC-1011, February 1999. http://www. wfmc.org/.
-
(1999)
Workflow Management Coalition Terminology & Glossary
-
-
-
18
-
-
0002670049
-
A temporal logic for concurrent programs
-
A. Pnueli, A temporal logic for concurrent programs, T heoretical Computer Science 13 (1980).
-
(1980)
T Heoretical Computer Science
, vol.13
-
-
Pnueli, A.1
-
19
-
-
35948971447
-
Policy verification and validation framework based on model checking approach, in Proc
-
S. Kikuchi, S. Tsuchiya, M. Adachi and T. Katsuyama, Policy verification and validation framework based on model checking approach, in Proc. International Conference on Autonomic Computing (2007), pp. 1-9.
-
(2007)
International Conference on Autonomic Computing
, pp. 1-9
-
-
Kikuchi, S.1
Tsuchiya, S.2
Adachi, M.3
Katsuyama, T.4
-
21
-
-
35348900179
-
A fault model and mutation testing of access control policies
-
DOI 10.1145/1242572.1242663, 16th International World Wide Web Conference, WWW2007
-
E. Martin and T. Xie, A fault model and mutation testing of access control policies, in Proc. 16th International Conference on World Wide Web, Banff, Alberta, Canada (2007), pp. 667-676. (Pubitemid 47582296)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 667-676
-
-
Martin, E.1
Xie, T.2
-
23
-
-
79960071586
-
-
Wiley InterScience, October
-
Y. Lei et al., Efficient test generation for multi-way combinatorial testing, Software Testing, Verification, and Reliability, Wiley InterScience, October 2007.
-
(2007)
Efficient Test Generation for Multi-way Combinatorial Testing, Software Testing, Verification, and Reliability
-
-
Lei, Y.1
-
24
-
-
79960036338
-
-
http://csrc/nist/gov/acts.
-
-
-
-
27
-
-
33645964601
-
Evaluating access control policies through model checking, in Proc
-
N. Zhang, M. D. Ryan and D. Guelev, Evaluating access control policies through model checking, in Proc. Information Security Conference (2005), pp. 446-460.
-
(2005)
Information Security Conference
, pp. 446-460
-
-
Zhang, N.1
Ryan, M.D.2
Guelev, D.3
-
28
-
-
33748067444
-
A model-checking approach to analysing organisational controls in a loan origination process
-
SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
-
A. Schaad, V. Lotz and K. Sohr, A model-checking approach to analysing organisational controls in a loan origination process, in Proc. ACM Symposium on Access Control Models and Technologies (2006), pp. 139-149. (Pubitemid 44300751)
-
(2006)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, vol.2006
, pp. 139-149
-
-
Schaad, A.1
Lotz, V.2
Sohr, K.3
-
29
-
-
37349091904
-
Conformance checking of access control policies specified in XACML
-
Beijing, China (July 2007)
-
V. C. Hu, E. Martin, J. Hwang and T. Xie, Conformance checking of access control policies specified in XACML, in Proc. 1st IEEE International Workshop on Security in Software Engineering (IWSSE 2007), Beijing, China (July 2007) 275-280.
-
Proc. 1st IEEE International Workshop on Security in Software Engineering (IWSSE 2007)
, pp. 275-280
-
-
Hu, V.C.1
Martin, E.2
Hwang, J.3
Xie, T.4
-
30
-
-
35348900179
-
A fault model and mutation testing of access control policies
-
DOI 10.1145/1242572.1242663, 16th International World Wide Web Conference, WWW2007
-
E. Martin and T. Xie, A fault model and mutation testing of access control policies, in Proc. 11th International Conference on World Wide Web (WWW 2007), Security, Privacy, Reliability, and Ethics Track, Banff, Alberta, Canada (May 2007), pp. 667-676. (Pubitemid 47582296)
-
(2007)
16th International World Wide Web Conference, WWW2007
, pp. 667-676
-
-
Martin, E.1
Xie, T.2
-
32
-
-
85009095825
-
Defining and measuring policy coverage in testing access control policies
-
Raleigh, NC (December
-
E. Martin, T. Xie and T. Yu, Defining and measuring policy coverage in testing access control policies, in Proc. 8th International Conference on Information and Communications Security (ICICS 2006), Raleigh, NC (December 2006) pp. 139-158.
-
(2006)
Proc. 8th International Conference on Information and Communications Security (ICICS 2006)
, pp. 139-158
-
-
Martin, E.1
Xie, T.2
Yu, T.3
-
34
-
-
33845443343
-
Inferring access-control policy properties via machine learning
-
DOI 10.1109/POLICY.2006.19, 1631178, Proceedings - Thirteenth International Symposium on Temporal Representation and Reasoning, TIME 2006
-
E. Martin and T. Xie, Inferring access-control policy properties via machine learning, in Proc. 7th IEEE Workshop on Policies for Distributed Systems and Networks (POLICY 2006), London, Ontario Canada (June 2006), pp. 235-238. (Pubitemid 44888908)
-
(2006)
Proceedings - Seventh IEEE International Workshop on Policies for Distributed Systems and Networks, Policy 2006
, vol.2006
, pp. 235-238
-
-
Martin, E.1
Tao, X.2
-
36
-
-
79960034697
-
-
IBM Policy Manager V7.0: http://www.redbooks.ibm.com/redpapers/pdfs/ redp4512. pdf.
-
IBM Policy Manager V7.0
-
-
-
37
-
-
79960064148
-
-
Cisco Policy Manager
-
Cisco Policy Manager: http://www.cisco.com/en/US/products/ps9530/index. html.
-
-
-
|