-
2
-
-
85025424440
-
An algebra for composing access control policies
-
P.A. Bonatti, S.D.C. di Vimercati, and P. Samarati, "An Algebra for Composing Access Control Policies," ACM Trans. Information and System Security, vol. 5, no. 1, pp. 1-35, 2002.
-
(2002)
ACM Trans. Information and System Security
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.A.1
Di Vimercati, S.D.C.2
Samarati, P.3
-
3
-
-
3142523600
-
A propositional policy algebra for access control
-
D. Wijesekera and S. Jajodia, "A Propositional Policy Algebra for Access Control," ACM Trans. Information and System Security, vol. 6, no. 2, pp. 286-325, 2003.
-
(2003)
ACM Trans. Information and System Security
, vol.6
, Issue.2
, pp. 286-325
-
-
Wijesekera, D.1
Jajodia, S.2
-
4
-
-
31844457357
-
Composing security policies with polymer
-
L. Bauer, J. Ligatti, and D. Walker, "Composing Security Policies with Polymer," Proc. ACM SIGPLAN Conf. Programming Language Design and Implementation (PLDI), pp. 305-314, 2005.
-
(2005)
Proc. ACM SIGPLAN Conf. Programming Language Design and Implementation (PLDI)
, pp. 305-314
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
5
-
-
34547271784
-
Defeasible security policy composition for web services
-
DOI 10.1145/1180337.1180342, Proceedings of the Fourth ACM Workshop on Formal Methods in Security Engineering, FMSE'06. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
-
A.J. Lee, J.P. Boyer, L.E. Olson, and C.A. Gunter, "Defeasible Security Policy Composition for Web Services," Proc. ACM Workshop Formal Methods in Security Eng. (FMSE '06), M. Winslett, A.D. Gordon, D. Sands, eds., pp. 45-54, 2006. (Pubitemid 47154950)
-
(2006)
Proceedings of the Fourth ACM Workshop on Formal Methods in Security Engineering, FMSE'06. A workshop held in conjuction with the 13th ACM Conference on Computer and Communications Security, CCS'06
, pp. 45-54
-
-
Lee, A.J.1
Boyer, J.P.2
Olson, L.E.3
Gunter, C.A.4
-
6
-
-
70450229409
-
A simple and expressive semantic framework for policy composition in access control
-
G. Bruns, D.S. Dantas, and M. Huth, "A Simple and Expressive Semantic Framework for Policy Composition in Access Control," Proc. ACM Workshop Formal Methods in Security Eng. (FMSE '07), pp. 12-21, 2007.
-
(2007)
Proc. ACM Workshop Formal Methods in Security Eng. (FMSE '07)
, pp. 12-21
-
-
Bruns, G.1
Dantas, D.S.2
Huth, M.3
-
7
-
-
62849105556
-
Modular access control via strategic rewriting
-
Sept.
-
D.J. Dougherty, C. Kirchner, H. Kirchner, and A. Santana de Oliveira, "Modular Access Control via Strategic Rewriting," Proc. 12th European Symp. Research in Computer Security (ESORICS '07), Sept. 2007.
-
(2007)
Proc. 12th European Symp. Research in Computer Security (ESORICS '07)
-
-
Dougherty, D.J.1
Kirchner, C.2
Kirchner, H.3
Santana De Oliveira, A.4
-
8
-
-
34250823438
-
Rewriting-Based access control policies
-
A. Santana de Oliveira, "Rewriting-Based Access Control Policies," Electronic Notes in Theoretical Computer Science, vol. 171, no. 4, pp. 59-72, 2007.
-
(2007)
Electronic Notes in Theoretical Computer Science
, vol.171
, Issue.4
, pp. 59-72
-
-
Santana De Oliveira, A.1
-
11
-
-
27544484252
-
A Role-Based access control policy verification framework for real-time systems
-
B. Shafiq, A. Masood, J. Joshi, and A. Ghafoor, "A Role-Based Access Control Policy Verification Framework for Real-Time Systems," Proc. 10th IEEE Int'l Workshop Object-Oriented Real-Time Dependable Systems, 2005.
-
(2005)
Proc. 10th IEEE Int'l Workshop Object-Oriented Real-Time Dependable Systems
-
-
Shafiq, B.1
Masood, A.2
Joshi, J.3
Ghafoor, A.4
-
12
-
-
84947263112
-
Automatic code generation method based on coloured petri net models applied on an access control system
-
Springer-Verlag
-
K.H. Mortensen, "Automatic Code Generation Method Based on Coloured Petri Net Models Applied on an Access Control System," Application and Theory of Petri Nets, pp. 367-386, Springer-Verlag, 2000.
-
(2000)
Application and Theory of Petri Nets
, pp. 367-386
-
-
Mortensen, K.H.1
-
17
-
-
13544255494
-
A formal approach for the evaluation of network security mechanisms based on RBAC policies
-
DOI 10.1016/j.entcs.2004.10.011, PII S1571066105000289
-
R. Laborde, B. Nasser, F. Grasset, F. Barrère, and A. Benzekri, "A Formal Approach for the Evaluation of Network Security Mechanisms Based on RBAC Policies," Electronic Notes in Theoretical Computer Science, vol. 121, pp. 117-142, 2005. (Pubitemid 40219706)
-
(2005)
Electronic Notes in Theoretical Computer Science
, vol.121
, Issue.SPEC. ISS.
, pp. 117-142
-
-
Laborde, R.1
Nasser, B.2
Grasset, F.3
Barrere, F.4
Benzekri, A.5
-
18
-
-
80052914440
-
-
technical report, Center for Education and Research in Information Assurance and Security
-
B. Shafiq, J.B.D. Joshi, and A. Ghafoor, "Petri-Net Based Modeling for Verification of RBAC Policies," technical report, Center for Education and Research in Information Assurance and Security, 2002.
-
(2002)
Petri-Net Based Modeling for Verification of RBAC Policies
-
-
Shafiq, B.1
Joshi, J.B.D.2
Ghafoor, A.3
-
19
-
-
0141502155
-
An approach for modeling and analysis of security system architectures
-
Sept.
-
Y. Deng, J.C. Wang, J. Tsai, and K. Beznosov, "An Approach for Modeling and Analysis of Security System Architectures," IEEE Trans. Knowledge and Data Eng., vol. 15, no. 5, pp. 1099-1119, Sept. 2003.
-
(2003)
IEEE Trans. Knowledge and Data Eng.
, vol.15
, Issue.5
, pp. 1099-1119
-
-
Deng, Y.1
Wang, J.C.2
Tsai, J.3
Beznosov, K.4
-
20
-
-
27644562412
-
A model-based approach to integrating security policies for embedded devices
-
EMSOFT 2004 - Fourth ACM International Conference on Embedded Software
-
M. McDougall, R. Alur, and C.A. Gunter, "A Model-Based Approach to Integrating Security Policies for Embedded Devices," Proc. Fourth ACM Int'l Conf. Embedded Software, pp. 211-219, 2004. (Pubitemid 41563709)
-
(2004)
EMSOFT 2004 - Fourth ACM International Conference on Embedded Software
, pp. 211-219
-
-
McDougall, M.1
Alur, R.2
Gunter, C.A.3
-
22
-
-
0024645936
-
Petri nets: Properties, analysis, and applications
-
Apr.
-
T. Murata, "Petri Nets: Properties, Analysis, and Applications," Proc. IEEE, vol. 77, no. 4, pp. 541-580, Apr. 1985.
-
(1985)
Proc. IEEE
, vol.77
, Issue.4
, pp. 541-580
-
-
Murata, T.1
-
24
-
-
0001604985
-
Coloured petri nets: A high level language for system design and analysis
-
G. Rozenberg, ed., Springer-Verlag
-
K. Jensen, "Coloured Petri Nets: A High Level Language for System Design and Analysis," Advances in Petri Nets 1990, G. Rozenberg, ed., Springer-Verlag, 1991.
-
(1991)
Advances in Petri Nets 1990
-
-
Jensen, K.1
-
25
-
-
33748055425
-
Towards reasonability properties for access-control policy languages
-
SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
-
M.C. Tschantz and S. Krishnamurthi, "Towards Reasonability Properties for Access-Control Policy Languages," Proc. 11th ACM Symp. Access Control Models and Technologies (SACMAT), D.F. Ferraiolo and I. Ray, eds., pp. 160-169, 2006. (Pubitemid 44300753)
-
(2006)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, vol.2006
, pp. 160-169
-
-
Tschantz, M.C.1
Krishnamurthi, S.2
-
26
-
-
33746684330
-
Term rewriting for access control
-
DOI 10.1007/11805588-13, Data and Applications Security XX - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Proceedings
-
S. Barker and M. Fernández, "Term Rewriting for Access Control," Data and Applications Security, pp. 179-193, Springer, 2006. (Pubitemid 44165887)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4127 LNCS
, pp. 179-193
-
-
Barker, S.1
Fernandez, M.2
-
27
-
-
84995538123
-
Term rewriting systems and petri nets
-
F. Tiplea, T. Jucan, and C. Masalagiu, "Term Rewriting Systems and Petri Nets," Analele Stiintifice ale Univ. Al. I. Cuza, vol. 34, no. 4, pp. 305-317, 1988.
-
(1988)
Analele Stiintifice Ale Univ. Al. I. Cuza
, vol.34
, Issue.4
, pp. 305-317
-
-
Tiplea, F.1
Jucan, T.2
Masalagiu, C.3
-
28
-
-
0035328989
-
Algorithms and reductions for rewriting problems
-
R. Verma, M. Rusinowitch, and D. Lugiez, "Algorithms and Reductions for Rewriting Problems," Fundamental Informatics, vol. 46, no. 3, pp. 257-276, 2001. (Pubitemid 32658450)
-
(2001)
Fundamenta Informaticae
, vol.46
, Issue.3
, pp. 257-276
-
-
Verma, R.M.1
Rusinowitch, M.2
Lugiez, D.3
-
30
-
-
0036033497
-
The home marking problem and some related concepts
-
R. Melinte, O. Oanea, I. Olga, and F. Tiplea, "The Home Marking Problem and Some Related Concepts," Acta Cybernetica, vol. 15, no. 3, pp. 467-478, 2002. (Pubitemid 35240082)
-
(2002)
Acta Cybernetica
, vol.15
, Issue.3
, pp. 467-478
-
-
Melinte, R.1
Oanea, O.2
Olga, I.3
Tplea, F.L.4
-
31
-
-
0001619596
-
Flexible Support for Multiple Access Control Policies
-
DOI 10.1145/383891.383894
-
S. Jajodia, P. Samarati, M.L. Sapino, and V.S. Subrahmanian, "Flexible Support for Multiple Access Control Policies," ACM Trans. Database Syst., vol. 26, no. 2, pp. 214-260, 2001. (Pubitemid 33661632)
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
32
-
-
77952407814
-
Organization based access control
-
A.A. El Kalam, S. Benferhat, A. Miege, R. El Baida, F. Cuppens, C. Saurel, P. Balbiani, Y. Deswarte, and G. Trouessin, "Organization Based Access Control," Proc. Fourth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '03), pp. 120-131, 2003.
-
(2003)
Proc. Fourth IEEE Int'l Workshop Policies for Distributed Systems and Networks (POLICY '03)
, pp. 120-131
-
-
El Kalam, A.A.1
Benferhat, S.2
Miege, A.3
El Baida, R.4
Cuppens, F.5
Saurel, C.6
Balbiani, P.7
Deswarte, Y.8
Trouessin, G.9
-
33
-
-
2442512413
-
-
technical report, Organization for the Advancement of Structured Information Standards, Feb.
-
T. Moses, "eXtensible Access Control Markup Language (XACML) Version 2.0," technical report, Organization for the Advancement of Structured Information Standards, Feb. 2005.
-
(2005)
EXtensible Access Control Markup Language (XACML) Version 2.0
-
-
Moses, T.1
|