-
1
-
-
2442516401
-
Efficient comparison of enterprise privacy policies
-
H. Haddad, A. Omicini, R. L. Wainwright, and L. M. Liebrock, editors, New York, NY USA, ACM Press. doi: 10.1145/967900.967983
-
M. Backes, G. Karjoth, W. Bagga, and M. Schunter. Efficient comparison of enterprise privacy policies. In H. Haddad, A. Omicini, R. L. Wainwright, and L. M. Liebrock, editors, SAC, pages 375-382, New York, NY USA, 2004. ACM Press. doi: 10.1145/967900.967983.
-
(2004)
SAC
, pp. 375-382
-
-
Backes, M.1
Karjoth, G.2
Bagga, W.3
Schunter, M.4
-
2
-
-
23944491974
-
-
Basel Committee on Banking Supervision. Technical report, Bank for International Settlements, Basel, Switzerland
-
Basel Committee on Banking Supervision. Basel II: International convergence of capital measurement and capital standards. Technical report, Bank for International Settlements, Basel, Switzerland, 2004. URL http://www.bis.org/publ/bcbsca.htm.
-
(2004)
Basel II: International Convergence of Capital Measurement and Capital Standards
-
-
-
3
-
-
60849104397
-
Automated analysis of security-design models
-
ISSN 0950- 5849. doi: 10.1016/j.infsof.2008.05.011. Special Issue on Model-Driven Development for Secure Information Systems
-
D. Basin, M. Clavel, J. Doser, and M. Egea. Automated analysis of security-design models. Information and Software Technology, 51(5):815-831, 2009. ISSN 0950- 5849. doi: 10.1016/j.infsof.2008.05.011. Special Issue on Model-Driven Development for Secure Information Systems.
-
(2009)
Information and Software Technology
, vol.51
, Issue.5
, pp. 815-831
-
-
Basin, D.1
Clavel, M.2
Doser, J.3
Egea, M.4
-
4
-
-
70450235104
-
Extending access control models with break-glass. In B. Carminati and J. Joshi, editors
-
ACM Press, doi: 10.1145/1542207.1542239
-
A. D. Brucker and H. Petritsch. Extending access control models with break-glass. In B. Carminati and J. Joshi, editors, ACM symposium on access control models and technologies (SACMAT), pages 197-206. ACM Press, 2009. doi: 10.1145/1542207.1542239.
-
(2009)
ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 197-206
-
-
Brucker, A.D.1
Petritsch, H.2
-
5
-
-
24144442859
-
Symbolic test case generation for primitive recursive functions
-
J. Grabowski and B. Nielsen, editors, Formal Approaches to Testing of Software, Springer-Verlag, doi: 10.1007/b106767
-
A. D. Brucker and B. Wolff. Symbolic test case generation for primitive recursive functions. In J. Grabowski and B. Nielsen, editors, Formal Approaches to Testing of Software, number 3395 in Lecture Notes in Computer Science, pages 16-32. Springer-Verlag, 2004. doi: 10.1007/b106767.
-
(2004)
Lecture Notes in Computer Science
, vol.3395
, pp. 16-32
-
-
Brucker, A.D.1
Wolff, B.2
-
6
-
-
67650139577
-
HOL-TESTGEN: An interactive test-case generation framework
-
M. Chechik and M. Wirsing, editors, Fundamental Approaches to Software Engineering (FASE09), Springer- Verlag, doi: 10.1007/978-3-642-00593-0 28
-
A. D. Brucker and B. Wolff. HOL-TESTGEN: An interactive test-case generation framework. In M. Chechik and M. Wirsing, editors, Fundamental Approaches to Software Engineering (FASE09), number 5503 in Lecture Notes in Computer Science, pages 417-420. Springer- Verlag, 2009. doi: 10.1007/978-3-642-00593-0 28.
-
(2009)
Lecture Notes in Computer Science
, vol.5503
, pp. 417-420
-
-
Brucker, A.D.1
Wolff, B.2
-
7
-
-
77954486920
-
Verified firewall policy transformations for test-case generation
-
doi: 10.1109/ICST.2010.50
-
A. D. Brucker, L. Brügger, P. Kearney, and B. Wolff. Verified firewall policy transformations for test-case generation. In Third International Conference on Software Testing, Verification, and Validation (ICST), pages 345- 354. 2010. doi: 10.1109/ICST.2010.50.
-
(2010)
Third International Conference on Software Testing, Verification, and Validation (ICST)
, pp. 345-354
-
-
Brucker, A.D.1
Brügger, L.2
Kearney, P.3
Wolff, B.4
-
8
-
-
79960159444
-
-
Technical Report 670, ETH Zurich, Apr.
-
A. D. Brucker, L. Brügger, M. P. Krieger, and B. Wolff. HOL-TESTGEN 1.5.0 user guide. Technical Report 670, ETH Zurich, Apr. 2010.
-
(2010)
HOL-TESTGEN 1.5.0 User Guide
-
-
Brucker, A.D.1
Brügger, L.2
Krieger, M.P.3
Wolff, B.4
-
10
-
-
85015362530
-
Automating the generation and sequencing of test cases from model-based specifications
-
J. Woodcock and P. Larsen, editors, Formal Methods Europe 93: Industrial-Strength Formal Methods, Heidelberg, Apr. Springer-Verlag
-
J. Dick and A. Faivre. Automating the generation and sequencing of test cases from model-based specifications. In J. Woodcock and P. Larsen, editors, Formal Methods Europe 93: Industrial-Strength Formal Methods, volume 670 of Lecture Notes in Computer Science, pages 268- 284, Heidelberg, Apr. 1993. Springer-Verlag.
-
(1993)
Lecture Notes in Computer Science
, vol.670
, pp. 268-284
-
-
Dick, J.1
Faivre, A.2
-
11
-
-
33845638417
-
How to break access control in a controlled manner
-
doi: 10.1109/CBMS.2006.95
-
A. Ferreira, R. Cruz-Correia, L. Antunes, P. Farinha, E. Oliveira-Palhares, D. Chadwick, and A. Costa-Pereira. How to break access control in a controlled manner. In Proceedings of the IEEE International Symposium on Computer-Based Medical Systems (CBMS), pages 847- 854, 2006. doi: 10.1109/CBMS.2006.95.
-
(2006)
Proceedings of the IEEE International Symposium on Computer-Based Medical Systems (CBMS)
, pp. 847-854
-
-
Ferreira, A.1
Cruz-Correia, R.2
Antunes, L.3
Farinha, P.4
Oliveira-Palhares, E.5
Chadwick, D.6
Costa-Pereira, A.7
-
12
-
-
33244470893
-
Verification and change-impact analysis of access-control policies
-
G.-C. Roman, W. G. Griswold, and B. Nuseibeh, editors, New York, NY USA, ACM Press. doi: 10.1145/1062455.1062502
-
K. Fisler, S. Krishnamurthi, L. A. Meyerovich, and M. C. Tschantz. Verification and change-impact analysis of access-control policies. In G.-C. Roman, W. G. Griswold, and B. Nuseibeh, editors, ICSE, pages 196- 205, New York, NY USA, 2005. ACM Press. doi: 10.1145/1062455.1062502.
-
(2005)
ICSE
, pp. 196-205
-
-
Fisler, K.1
Krishnamurthi, S.2
Meyerovich, L.A.3
Tschantz, M.C.4
-
13
-
-
53249102207
-
-
IT Governance Institute, Rolling Meadows, IL, USA, 2nd edition, Sept.
-
C. Fox and P. Zonneveld. IT Control Objectives for Sarbanes-Oxley: The Role of IT in the Design and Implementation of Internal Control Over Financial Reporting. IT Governance Institute, Rolling Meadows, IL, USA, 2nd edition, Sept. 2006.
-
(2006)
IT Control Objectives for Sarbanes-Oxley: The Role of IT in the Design and Implementation of Internal Control over Financial Reporting
-
-
Fox, C.1
Zonneveld, P.2
-
14
-
-
78650080373
-
Cue: A framework for generating meaningful feedback in XACML
-
New York, NY USA, ACM Press. doi: 10.1145/1866898.1866901
-
S. K. Ghai, P. Nigam, and P. Kumaraguru. Cue: a framework for generating meaningful feedback in XACML. In Proceedings of the 3rd ACM workshop on Assurable and usable security configuration, SafeConfig '10, pages 9-16, New York, NY USA, 2010. ACM Press. doi: 10.1145/1866898.1866901.
-
(2010)
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig '10
, pp. 9-16
-
-
Ghai, S.K.1
Nigam, P.2
Kumaraguru, P.3
-
17
-
-
57349119890
-
Enabling verification and conformance testing for access control model
-
New York, NY USA, ACM Press. doi: 10.1145/1377836.1377867.
-
H. Hu and G.-J. Ahn. Enabling verification and conformance testing for access control model. In ACM symposium on Access control models and technologies (SACMAT), pages 195-204, New York, NY USA, 2008. ACM Press. doi: 10.1145/1377836.1377867.
-
(2008)
ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 195-204
-
-
Hu, H.1
Ahn, G.-J.2
-
18
-
-
55549143296
-
Automated verification of access control policies using a sat solver
-
October ISSN 1433-2779. doi: 10.1007/ s10009-008-0087-9
-
G. Hughes and T. Bultan. Automated verification of access control policies using a sat solver. International Journal on Software Tools for Technology, 10:503- 520, October 2008. ISSN 1433-2779. doi: 10.1007/ s10009-008-0087-9.
-
(2008)
International Journal on Software Tools for Technology
, vol.10
, pp. 503520
-
-
Hughes, G.1
Bultan, T.2
-
19
-
-
0038507387
-
Alloy: A lightweight object modelling notation
-
ISSN 1049-331X. doi: 10.1145/505145.505149
-
D. Jackson. Alloy: a lightweight object modelling notation. ACM Transactions on Software Engineering and Methodology, 11(2):256-290, 2002. ISSN 1049-331X. doi: 10.1145/505145.505149.
-
(2002)
ACM Transactions on Software Engineering and Methodology
, vol.11
, Issue.2
, pp. 256-290
-
-
Jackson, D.1
-
20
-
-
35348924314
-
Analyzing web access control policies
-
New York, NY USA, ACM Press. doi: 10.1145/1242572.1242664
-
V. Kolovski, J. Hendler, and B. Parsia. Analyzing web access control policies. In Proceedings of the 16th international conference on World Wide Web, WWW '07, pages 677-686, New York, NY USA, 2007. ACM Press. doi: 10.1145/1242572.1242664.
-
(2007)
Proceedings of the 16th International Conference on World Wide Web, WWW '07
, pp. 677-686
-
-
Kolovski, V.1
Hendler, J.2
Parsia, B.3
-
21
-
-
34548023083
-
An approach to evaluate policy similarity
-
V. Lotz and B. M. Thuraisingham, editors, New York, NY USA, ACM Press. doi: 10.1145/1266840.1266842
-
D. Lin, P. Rao, E. Bertino, and J. Lobo. An approach to evaluate policy similarity. In V. Lotz and B. M. Thuraisingham, editors, SACMAT, pages 1-10, New York, NY USA, 2007. ACM Press. doi: 10.1145/1266840.1266842.
-
(2007)
SACMAT
, pp. 1-10
-
-
Lin, D.1
Rao, P.2
Bertino, E.3
Lobo, J.4
-
22
-
-
57349199277
-
XEngine: A fast and scalable XACML policy evaluation engine
-
A. X. Liu, F. Chen, J. Hwang, and T. Xie. XEngine: A fast and scalable XACML policy evaluation engine. In Proceedings of the International Conference on Measurement and Modeling of Computer Systems (Sigmetrics), Annapolis, Maryland, June 2008.
-
Proceedings of the International Conference on Measurement and Modeling of Computer Systems (Sigmetrics), Annapolis, Maryland, June 2008
-
-
Liu, A.X.1
Chen, F.2
Hwang, J.3
Xie, T.4
-
25
-
-
0033489645
-
Optimistic security: A new access control paradigm
-
New York, NY USA, ACM Press. doi: 10.1145/335169.335188
-
D. Povey. Optimistic security: A new access control paradigm. In Proceedings of the 1999 workshop on new security paradigms, pages 40-45, New York, NY USA, 1999. ACM Press. doi: 10.1145/335169.335188.
-
(1999)
Proceedings of the 1999 Workshop on New Security Paradigms
, pp. 40-45
-
-
Povey, D.1
-
26
-
-
39049126192
-
A study of access control requirements for healthcare systems based on audit trails from access logs
-
Los Alamitos, CA, USA, IEEE Computer Society. doi: 10.1109/ACSAC.2006.8
-
L. Rostad and O. Edsberg. A study of access control requirements for healthcare systems based on audit trails from access logs. In Annual Computer Security Applications Conference (ACSAC), pages 175-186, Los Alamitos, CA, USA, 2006. IEEE Computer Society. doi: 10.1109/ACSAC.2006.8.
-
(2006)
Annual Computer Security Applications Conference (ACSAC)
, pp. 175-186
-
-
Rostad, L.1
Edsberg, O.2
-
28
-
-
33947244417
-
Sarbanes Oxley Section 404 Costs of Compliance: A case study
-
L. Sneller and H. Langendijk. Sarbanes Oxley Section 404 Costs of Compliance: a case study. Corporate Governance: An International Review, 15(2):101- 111, 2007. URL http://econpapers.repec.org/RePEc:bla: corgov:v:15:y:2007:i:2:p:101-111.
-
(2007)
Corporate Governance: An International Review
, vol.15
, Issue.2
, pp. 101-111
-
-
Sneller, L.1
Langendijk, H.2
|