-
1
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-Based Access Control Models. IEEE Computer 29(2) (1996) 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
4
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2(1) (1999) 65-104.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
5
-
-
33748067444
-
A model-checking approach to analysing organisational controls in a loan origination process
-
New York, ACM Press
-
Schaad, A., Lotz, V., Sohr, K.: A model-checking approach to analysing organisational controls in a loan origination process. In: Proc. of the 11th ACM Symposium on Access Control Models and Technologies, New York, ACM Press (2006).
-
(2006)
Proc. of the 11th ACM Symposium on Access Control Models and Technologies
-
-
Schaad, A.1
Lotz, V.2
Sohr, K.3
-
6
-
-
56649088001
-
Scenario-based static analysis of UML class models
-
Volume 5301 of LNCS. Springer, Berlin
-
Yu, L., France, R.B., Ray, I.: Scenario-Based Static Analysis of UML Class Models. In: Model Driven Engineering Languages and Systems, 11th International Conference, MoDELS 2008. Volume 5301 of LNCS., Springer, Berlin (2008) 234-248.
-
(2008)
Model Driven Engineering Languages and Systems, 11th International Conference, MoDELS 2008
, pp. 234-248
-
-
Yu, L.1
France, R.B.2
Ray, I.3
-
7
-
-
44649149548
-
Analyzing and managing role-based access control policies
-
Sohr, K., Drouineaud, M., Ahn, G.J., Gogolla, M.: Analyzing and Managing Role-Based Access Control Policies. IEEE Trans. Knowl. Data Eng 20(7) (2008) 924-939.
-
(2008)
IEEE Trans. Knowl. Data Eng
, vol.20
, Issue.7
, pp. 924-939
-
-
Sohr, K.1
Drouineaud, M.2
Ahn, G.J.3
Gogolla, M.4
-
8
-
-
77954329159
-
An extended RBAC profile of XACML
-
SWS'06, New York, NY, USA, ACM
-
Abi Haidar, D., Cuppens-Boulahia, N., Cuppens, F., Debar, H.: An extended RBAC profile of XACML. In: Proceedings of the 3rd ACM workshop on Secure web services. SWS'06, New York, NY, USA, ACM (2006) 13-22.
-
(2006)
Proceedings of the 3rd ACM Workshop on Secure Web Services
, pp. 13-22
-
-
Abi Haidar, D.1
Cuppens-Boulahia, N.2
Cuppens, F.3
Debar, H.4
-
9
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
Barth, A., Datta, A., Mitchell, J.C., Nissenbaum, H.: Privacy and Contextual Integrity: Framework and Applications. In: IEEE Symposium on Security and Privacy, IEEE Computer Society (2006) 184-198.
-
(2006)
IEEE Symposium on Security and Privacy, IEEE Computer Society
, pp. 184-198
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Nissenbaum, H.4
-
10
-
-
33749558954
-
Specifying and reasoning about dynamic access-control policies
-
Furbach, U. Shankar, N. eds.:, Volume 4130 of Lecture Notes in Computer Science. Springer
-
Dougherty, D.J., Fisler, K., Krishnamurthi, S.: Specifying and Reasoning About Dynamic Access-Control Policies. In Furbach, U., Shankar, N., eds.: IJCAR. Volume 4130 of Lecture Notes in Computer Science., Springer (2006) 632-646.
-
(2006)
IJCAR
, pp. 632-646
-
-
Dougherty, D.J.1
Fisler, K.2
Krishnamurthi, S.3
-
11
-
-
38049040380
-
A policy language for distributed usage control
-
Biskup, J. Lopez, J. eds.:, Volume 4734 of Lecture Notes in Computer Science. Springer
-
Hilty, M., Pretschner, A., Basin, D.A., Schaefer, C., Walter, T.: A Policy Language for Distributed Usage Control. In Biskup, J., Lopez, J., eds.: ESORICS. Volume 4734 of Lecture Notes in Computer Science., Springer (2007) 531-546.
-
(2007)
ESORICS
, pp. 531-546
-
-
Hilty, M.1
Pretschner, A.2
Basin, D.A.3
Schaefer, C.4
Walter, T.5
-
12
-
-
33745450500
-
Formal model and policy specification of usage control
-
November
-
Zhang, X., Parisi-Presicce, F., Sandhu, R., Park, J.: Formal model and policy specification of usage control. ACM Transactions on Information and System Security 8(4) (November 2005) 351-387.
-
(2005)
ACM Transactions on Information and System Security
, vol.8
, Issue.4
, pp. 351-387
-
-
Zhang, X.1
Parisi-Presicce, F.2
Sandhu, R.3
Park, J.4
-
15
-
-
36048931368
-
USE: A UML-based specification environment for validating UML and OCL
-
Gogolla, M., Büttner, F., Richters, M.: USE: A UML-Based Specification Environment for Validating UML and OCL. Science of Computer Programming 69 (2007) 27-34.
-
(2007)
Science of Computer Programming
, vol.69
, pp. 27-34
-
-
Gogolla, M.1
Büttner, F.2
Richters, M.3
-
16
-
-
37149013755
-
Kodkod: A relational model finder
-
Volume 4424 of LNCS. Springer, Berlin
-
Torlak, E., Jackson, D.: Kodkod: A Relational Model Finder. In: Tools and Algorithms for the Construction and Analysis of Systems - 13th International Conference, TACAS 2007. Volume 4424 of LNCS., Springer, Berlin (2007) 632-647.
-
(2007)
Tools and Algorithms for the Construction and Analysis of Systems - 13th International Conference, TACAS 2007
, pp. 632-647
-
-
Torlak, E.1
Jackson, D.2
-
18
-
-
0031682433
-
On the formal definition of separation-of-duty policies and their composition
-
IEEE
-
Gligor, V.D., Gavrila, S.I., Ferraiolo, D.: On the formal definition of separation-of-duty policies and their composition. In: 1998 IEEE Symposium on Security and Privacy (SSP'98), IEEE (1998) 172-185.
-
(1998)
1998 IEEE Symposium on Security and Privacy (SSP'98)
, pp. 172-185
-
-
Gligor, V.D.1
Gavrila, S.I.2
Ferraiolo, D.3
-
19
-
-
37549046448
-
Modeling and validating mondex scenarios described in UML and OCL with USE
-
Kuhlmann, M., Gogolla, M.: Modeling and Validating Mondex Scenarios Described in UML and OCL with USE. Formal Aspects of Computing 20(1) (2008) 79-100.
-
(2008)
Formal Aspects of Computing
, vol.20
, Issue.1
, pp. 79-100
-
-
Kuhlmann, M.1
Gogolla, M.2
-
21
-
-
38049005345
-
UML2Alloy: A challenging model transformation
-
Volume 4735 of LNCS. Springer, Berlin
-
Anastasakis, K., Bordbar, B., Georg, G., Ray, I.: UML2Alloy: A Challenging Model Transformation. In: Model Driven Engineering Languages and Systems, 10th International Conference, MoDELS 2007. Volume 4735 of LNCS., Springer, Berlin (2007) 436-450.
-
(2007)
Model Driven Engineering Languages and Systems, 10th International Conference, MoDELS 2007
, pp. 436-450
-
-
Anastasakis, K.1
Bordbar, B.2
Georg, G.3
Ray, I.4
-
22
-
-
70350378886
-
Consistency, independence and consequences in UML and OCL Models
-
Springer, Berlin, LNCS 5668
-
Gogolla, M., Kuhlmann, M., Hamann, L.: Consistency, Independence and Consequences in UML and OCL Models. In: Proc. 3rd Int. Conf. Test and Proof (TAP'2009), Springer, Berlin, LNCS 5668 (2009) 90-104.
-
(2009)
Proc. 3rd Int. Conf. Test and Proof (TAP'2009)
, pp. 90-104
-
-
Gogolla, M.1
Kuhlmann, M.2
Hamann, L.3
-
23
-
-
79955163100
-
UMLsec: Extending UML for secure systems development
-
Jürjens, J.: UMLsec: Extending UML for secure systems development. Lecture Notes in Computer Science 2460 (2002) 412-425.
-
(2002)
Lecture Notes in Computer Science
, vol.2460
, pp. 412-425
-
-
Jürjens, J.1
-
24
-
-
4143147399
-
Using UML to visualize rolebased access control constraints
-
ACM Press New York, USA
-
Ray, I., Li, N., France, R.B., Kim, D.K.: Using UML to visualize rolebased access control constraints. In: Proc. of the 9th ACM symposium on Access control models and technologies, ACM Press New York, USA (2004) 115-124.
-
(2004)
Proc. of the 9th ACM Symposium on Access Control Models and Technologies
, pp. 115-124
-
-
Ray, I.1
Li, N.2
France, R.B.3
Kim, D.K.4
-
27
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
Basin, D.A., Doser, J., Lodderstedt, T.: Model driven security: From UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol 15(1) (2006) 39-91.
-
(2006)
ACM Trans. Softw. Eng. Methodol
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.A.1
Doser, J.2
Lodderstedt, T.3
-
28
-
-
60849104397
-
Automated analysis of security-design models
-
Basin, D.A., Clavel, M., Doser, J., Egea, M.: Automated analysis of security-design models. Information & Software Technology 51(5) (2009) 815-831.
-
(2009)
Information & Software Technology
, vol.51
, Issue.5
, pp. 815-831
-
-
Basin, D.A.1
Clavel, M.2
Doser, J.3
Egea, M.4
-
29
-
-
35348999342
-
Automated checking of SAP security permissions
-
Lausanne, Switzerland, Kluwer
-
Höhn, S., Jürjens, J.: Automated checking of SAP security permissions. In: 6th Working Conference on Integrity and Internal Control in Information Systems (IICIS), Lausanne, Switzerland, Kluwer (2003).
-
(2003)
6th Working Conference on Integrity and Internal Control in Information Systems (IICIS)
-
-
Höhn, S.1
Jürjens, J.2
|