-
2
-
-
38049040380
-
A policy language for distributed usage control
-
ser. Lecture Notes in Computer Science
-
M. Hilty, A. Pretschner, D. Basin, C. Schaefer, and T. Walter, "A policy language for distributed usage control," in Computer Security ESORICS 2007, ser. Lecture Notes in Computer Science, 2007, vol. 4734.
-
(2007)
Computer Security ESORICS 2007
, vol.4734
-
-
Hilty, M.1
Pretschner, A.2
Basin, D.3
Schaefer, C.4
Walter, T.5
-
3
-
-
57849100172
-
Mechanisms for usage control
-
A. Pretschner, M. Hilty, D. Basin, C. Schaefer, and T. Walter, "Mechanisms for usage control," in Proceedings of the 2008 ACM symposium on Information, computer and communications security (ASIACCS), 2008.
-
(2008)
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS)
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.3
Schaefer, C.4
Walter, T.5
-
4
-
-
0020977639
-
Real-time programming and asynchronous message passing
-
New York, NY, USA: ACM
-
R. Koymans, J. Vytopil, and W. P. de Roever, "Real-time programming and asynchronous message passing," in Proceedings of the second annual ACM symposium on Principles of distributed computing (PODC). New York, NY, USA: ACM, 1983.
-
(1983)
Proceedings of the Second Annual ACM Symposium on Principles of Distributed Computing (PODC)
-
-
Koymans, R.1
Vytopil, J.2
De Roever, W.P.3
-
5
-
-
0036044742
-
Temporal logic with forgettable past
-
Washington, DC, USA: IEEE Computer Society
-
F. Laroussinie, N. Markey, and P. Schnoebelen, "Temporal logic with forgettable past," in Proceedings of the 17th Annual IEEE Symposium on Logic in Computer Science (LICS). Washington, DC, USA: IEEE Computer Society, 2002.
-
(2002)
Proceedings of the 17th Annual IEEE Symposium on Logic in Computer Science (LICS)
-
-
Laroussinie, F.1
Markey, N.2
Schnoebelen, P.3
-
6
-
-
70449086305
-
On regular temporal logics with past
-
Berlin, Heidelberg: Springer-Verlag
-
C. Dax, F. Klaedtke, and M. Lange, "On regular temporal logics with past," in Proceedings of the 36th Internatilonal Collogquium on Automata, Languages and Programming: Part II (ICALP). Berlin, Heidelberg: Springer-Verlag, 2009.
-
(2009)
Proceedings of the 36th Internatilonal Collogquium on Automata, Languages and Programming: Part II (ICALP)
-
-
Dax, C.1
Klaedtke, F.2
Lange, M.3
-
7
-
-
84861235700
-
An overview of the mop runtime verification framework
-
P. O. Meredith, D. Jin, D. Griffith, F. Chen, and G. Rosu, "An overview of the mop runtime verification framework," Int. J. Softw. Tools for Technol. Transf., 2011, available at: http://fsl.cs.uiuc.edu.
-
(2011)
Int. J. Softw. Tools for Technol. Transf.
-
-
Meredith, P.O.1
Jin, D.2
Griffith, D.3
Chen, F.4
Rosu, G.5
-
10
-
-
70349671755
-
Formal analyses of usage control policies
-
A. Pretschner, J. Ruesch, C. Schaefer, and T. Walter, "Formal analyses of usage control policies," in International Conference on Availability, Reliability and Security (ARES), 2009.
-
(2009)
International Conference on Availability, Reliability and Security (ARES)
-
-
Pretschner, A.1
Ruesch, J.2
Schaefer, C.3
Walter, T.4
-
11
-
-
79961133763
-
Implementing trust in cloud infrastructures
-
to appear
-
R. Neisse, D. Holling, and A. Pretschner, "Implementing trust in cloud infrastructures," in 11th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, CCGrid 2011 (to appear), 2011, available at: http://zvi.ipd.kit.edu.
-
(2011)
11th IEEE/ACM International Conference on Cluster, Cloud and Grid Computing, CCGrid 2011
-
-
Neisse, R.1
Holling, D.2
Pretschner, A.3
-
12
-
-
79952779062
-
Distributed data usage control for web applications: A social network implementation
-
P. Kumari, A. Pretschner, J. Peschla, and J. Kuhn, "Distributed data usage control for web applications: A social network implementation," Proceedings 1st ACM Conference on Data and Application Security and Privacy (CODASPY), 2011, available at: http://zvi.ipd.kit.edu.
-
(2011)
Proceedings 1st ACM Conference on Data and Application Security and Privacy (CODASPY)
-
-
Kumari, P.1
Pretschner, A.2
Peschla, J.3
Kuhn, J.4
-
13
-
-
79952798543
-
Usage control enforcement with data flow tracking for x11
-
A. Pretschner, M. Buechler, M. Harvan, C. Schaefer, and T. Walter, "Usage control enforcement with data flow tracking for x11," in Proc. 5th Intl. Workshop on Security and Trust Management, 2009, pp. 124-137.
-
(2009)
Proc. 5th Intl. Workshop on Security and Trust Management
, pp. 124-137
-
-
Pretschner, A.1
Buechler, M.2
Harvan, M.3
Schaefer, C.4
Walter, T.5
-
14
-
-
80455151286
-
-
"Apache servicemix," Available at: http://servicemix.apache. org, 2011.
-
(2011)
Apache Servicemix
-
-
-
16
-
-
51849136554
-
Ponder2- a policy environment for autonomous pervasive systems
-
June
-
K. Twidle, E. Lupu, N. Dulay, and M. Sloman, "Ponder2- a policy environment for autonomous pervasive systems," in IEEE Workshop on Policies for Distributed Systems and Network (POLICY), June 2008, pp. 245-246.
-
(2008)
IEEE Workshop on Policies for Distributed Systems and Network (POLICY)
, pp. 245-246
-
-
Twidle, K.1
Lupu, E.2
Dulay, N.3
Sloman, M.4
-
18
-
-
84943596290
-
Xesb: An enterprise service bus for access and usage control policy enforcement
-
G. Gheorghe, S. Neuhaus, and B. Crispo, "xesb: an enterprise service bus for access and usage control policy enforcement," in In the proceedings of the IFIPTM10, 2010.
-
(2010)
The Proceedings of the IFIPTM10
-
-
Gheorghe, G.1
Neuhaus, S.2
Crispo, B.3
|