-
1
-
-
79960162405
-
Network-centric access control: Models and techniques
-
Network-centric access control: models and techniques. Georgia Tech Technical Report, GIT-CERCS-10-08, http://www.cercs.gatech.edu/tech-reports/.
-
Georgia Tech Technical Report, GIT-CERCS-10-08
-
-
-
4
-
-
70449625216
-
Automatic discovery and quantification of information leaks
-
M. Backes, B. Kopf, and A. Rybalchenko. Automatic discovery and quantification of information leaks. In SP, 2009.
-
(2009)
SP
-
-
Backes, M.1
Kopf, B.2
Rybalchenko, A.3
-
5
-
-
56349097648
-
Secure computer system: Unified exposition and multics interpretation
-
D. E. Bell and L. J. LaPadula. Secure computer system: unified exposition and multics interpretation. In MITRE Corporation, 1976.
-
(1976)
MITRE Corporation
-
-
Bell, D.E.1
Lapadula, L.J.2
-
6
-
-
84944792110
-
Trbac: A temporal role-based access control model
-
E. Bertino, P. A. Bonatti, and E. Ferrari. Trbac: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur., 4(3):191-233, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
7
-
-
36648999518
-
The chinese wall security policy
-
D. D. F. Brewer and D. M. J. Nash. The chinese wall security policy. SP, 1989.
-
(1989)
SP
-
-
Brewer, D.D.F.1
Nash, D.M.J.2
-
8
-
-
79952798687
-
A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks
-
B. Carminati, E. Ferrari, S. Morasca, and D. Taibi. A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks. In CODASPY, 2011.
-
(2011)
CODASPY
-
-
Carminati, B.1
Ferrari, E.2
Morasca, S.3
Taibi, D.4
-
9
-
-
2442462242
-
Efficiently serving dynamic data at highly accessed web sites
-
J. R. Challenger, P. Dantzig, A. Iyengar, M. S. Squillante, and L. Zhang. Efficiently serving dynamic data at highly accessed web sites. IEEE/ACM Trans. Netw., 12(2):233-246, 2004.
-
(2004)
IEEE/ACM Trans. Netw.
, vol.12
, Issue.2
, pp. 233-246
-
-
Challenger, J.R.1
Dantzig, P.2
Iyengar, A.3
Squillante, M.S.4
Zhang, L.5
-
10
-
-
34548769351
-
Fuzzy multi-level security: An experiment on quantified risk-adaptive access control
-
P.-C. Cheng, P. Rohatgi, C. Keser, P. A. Karger, G. M. Wagner, and A. S. Reninger. Fuzzy multi-level security: An experiment on quantified risk-adaptive access control. In IEEE Security and Privacy Symposium, 2007.
-
(2007)
IEEE Security and Privacy Symposium
-
-
Cheng, P.-C.1
Rohatgi, P.2
Keser, C.3
Karger, P.A.4
Wagner, G.M.5
Reninger, A.S.6
-
11
-
-
33745801960
-
Understanding and developing role-based administrative models
-
J. Crampton. Understanding and developing role-based administrative models. In CCS, 2005.
-
(2005)
CCS
-
-
Crampton, J.1
-
13
-
-
0015330635
-
Theoretical improvements in algorithmic efficiency for network flow problems
-
J. Edmonds and R. M. Karp. Theoretical improvements in algorithmic efficiency for network flow problems. J. ACM, 19(2):248-264, 1972.
-
(1972)
J. ACM
, vol.19
, Issue.2
, pp. 248-264
-
-
Edmonds, J.1
Karp, R.M.2
-
15
-
-
84924122981
-
Towards scaling fully personalized pagerank: Algorithms, lower bounds, and experiments
-
D. Fogaras, B. Rácz, K. Csalogány, and T. Sarlós. Towards scaling fully personalized pagerank: Algorithms, lower bounds, and experiments. Internet Mathematics, 2(3), 2005.
-
(2005)
Internet Mathematics
, vol.2
, Issue.3
-
-
Fogaras, D.1
Ŕacz, B.2
Csaloǵany, K.3
Sarĺos, T.4
-
16
-
-
79960191740
-
Characterizing dynamics of information leakage in security-sensitive software process
-
Y. Kanzaki, H. Igaki, M. Nakamura, A. Monden, and K.-i. Matsumoto. Characterizing dynamics of information leakage in security-sensitive software process. In ACSW Frontiers, 2005.
-
(2005)
ACSW Frontiers
-
-
Kanzaki, Y.1
Igaki, H.2
Nakamura, M.3
Monden, A.4
Matsumoto, K.-I.5
-
18
-
-
67649643417
-
Smallblue: Social network analysis for expertise search and collective intelligence
-
C.-Y. Lin, N. Cao, S. X. Liu, S. Papadimitriou, J. Sun, and X. Yan. Smallblue: Social network analysis for expertise search and collective intelligence. In ICDE, 2009.
-
(2009)
ICDE
-
-
Lin, C.-Y.1
Cao, N.2
Liu, S.X.3
Papadimitriou, S.4
Sun, J.5
Yan, X.6
-
19
-
-
57349180506
-
Quantitative information flow as network flow capacity
-
S. McCamant and M. D. Ernst. Quantitative information flow as network flow capacity. In PLDI, 2008.
-
(2008)
PLDI
-
-
McCamant, S.1
Ernst, M.D.2
-
20
-
-
80052077852
-
Trading in risk: Using markets to improve access control
-
I. Molloy, P.-C. Cheng, and P. Rohatgi. Trading in risk: using markets to improve access control. In NSPW, 2008.
-
(2008)
NSPW
-
-
Molloy, I.1
Cheng, P.-C.2
Rohatgi, P.3
-
21
-
-
79951738724
-
Scalable proximity estimation and link prediction in online social networks
-
H. H. Song, T. W. Cho, V. Dave, Y. Zhang, and L. Qiu. Scalable proximity estimation and link prediction in online social networks. In IMC, 2009.
-
(2009)
IMC
-
-
Song, H.H.1
Cho, T.W.2
Dave, V.3
Zhang, Y.4
Qiu, L.5
-
22
-
-
74049162371
-
A metadata calculus for secure information sharing
-
M. Srivatsa, D. Agrawal, and S. Reidt. A metadata calculus for secure information sharing. In CCS, 2009.
-
(2009)
CCS
-
-
Srivatsa, M.1
Agrawal, D.2
Reidt, S.3
-
24
-
-
34748827346
-
Fast random walk with restart and its applications
-
H. Tong, C. Faloutsos, and J.-Y. Pan. Fast random walk with restart and its applications. In ICDM, 2006.
-
(2006)
ICDM
-
-
Tong, H.1
Faloutsos, C.2
Pan, J.-Y.3
-
25
-
-
85094632142
-
Securing distributed systems with information flow control
-
N. Zeldovich, S. Boyd-Wickizer, and D. Mazìeres. Securing distributed systems with information flow control. In NSDI, 2008.
-
(2008)
NSDI
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Mazières, D.3
|