-
2
-
-
84943605189
-
-
Belgian National Statistical Institute, http://www.statbel.fgov.be
-
-
-
-
3
-
-
84943602141
-
-
Réseau Santé Wallon, http://www.reseausantewallon.be
-
-
-
-
4
-
-
77952407814
-
Organization Based Access Control
-
Como, Italia
-
Abou El Kalam, A., El Baida, R., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miège, A., Saurel, C., Trouessin, G.: Organization Based Access Control. In: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy 2003), Como, Italia (June 2003)
-
(2003)
Proceedings of the 4Th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy 2003)
-
-
Abou El Kalam, A.1
El Baida, R.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miège, A.7
Saurel, C.8
Trouessin, G.9
-
5
-
-
84943592993
-
1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, CELEX number 31995L0046
-
Directive 95/46/EC of the European Parliament and of the Council of October 24, 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, CELEX number 31995L0046, Official Journal L 281, November 23, pp. 0031 - 0050 (1995)
-
(1995)
Official Journal L 281, November 23
-
-
-
7
-
-
84943627459
-
Trusted Computer System Evaluation Criteria (TCSEC)
-
United States Department of Defense, Trusted Computer System Evaluation Criteria (TCSEC), Deaprtment of Defense Standard CSC-STD-00l-83 (august 1983)
-
(1983)
Deaprtment of Defense Standard Csc-Std-00L-83
-
-
-
8
-
-
33947625881
-
Assessment of Access Control Systems
-
Ferraiolo, D., Kuhn, D.R., Hu, V.C.: Assessment of Access Control Systems, Technical Report NISTIR 7316, National Institute of Standards and Technology, US Department of Commerce (2006)
-
(2006)
Technical Report NISTIR 7316, National Institute of Standards and Technology, US Department of Commerce
-
-
Ferraiolo, D.1
Kuhn, D.R.2
Hu, V.C.3
-
11
-
-
0030086382
-
Role-Based Access Control Models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer 29(2), 38–47 (1996)
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
13
-
-
78650893864
-
Formal definition and comparison of access control models. Journal of Information Assurance and Security (JIAS)
-
Habib, L., Jaume, M., Morisset, C.: Formal definition and comparison of access control models. Journal of Information Assurance and Security (JIAS), Special Issue on Access Control and Protocols 4(4), 372–381 (2009)
-
(2009)
Special Issue on Access Control and Protocols
, vol.4
, Issue.4
, pp. 372-381
-
-
Habib, L.1
Jaume, M.2
Morisset, C.3
-
16
-
-
84943642703
-
Definition d’un environnement formel d’expression de politiques de securite. Modele Or-BAC et extensions’ PhD Dissertation in IT Security
-
Miege, A.: Definition d’un environnement formel d’expression de politiques de securite. Modele Or-BAC et extensions’ PhD Dissertation in IT Security, Networks and Computer Science Department of ENST Paris (2005)
-
(2005)
Networks and Computer Science Department of ENST Paris
-
-
Miege, A.1
-
19
-
-
0032203918
-
Managing Conflicts in Goal-Driven Requirements Engineering. IEEE Transactions on Software Engineering
-
van Lamsweerde, A., Darimont, R., Letier, E.: Managing Conflicts in Goal-Driven Requirements Engineering. IEEE Transactions on Software Engineering, Special Issue on Managing Inconsistency in Software Development, 908–926 (November 1998)
-
(1998)
Special Issue on Managing Inconsistency in Software Development
, pp. 908-926
-
-
Van Lamsweerde, A.1
Darimont, R.2
Letier, E.3
|