-
1
-
-
80755188489
-
-
Aveska. http://www.aveksa.com/solutions/access-control-automation.cfm.
-
-
-
-
2
-
-
80755135000
-
-
SailPoint. http://www.sailpoint.com/product/compliance-manager/policy- enforcement.php.
-
-
-
-
5
-
-
26844544427
-
Safety in grammatical protection systems
-
T. A. Budd. Safety in grammatical protection systems. Intl. Journal of Parallel Programming, 12(6):413-431, 1983.
-
(1983)
Intl. Journal of Parallel Programming
, vol.12
, Issue.6
, pp. 413-431
-
-
Budd, T.A.1
-
6
-
-
4243189286
-
Counterexample-guided abstraction refinement for symbolic model checking
-
E. Clarke, O. Grumberg, S. Jha, Y. Lu, and H. Veith. Counterexample- guided abstraction refinement for symbolic model checking. J. ACM, 50(5):752-794, 2003.
-
(2003)
J. ACM
, vol.50
, Issue.5
, pp. 752-794
-
-
Clarke, E.1
Grumberg, O.2
Jha, S.3
Lu, Y.4
Veith, H.5
-
9
-
-
3142510989
-
Administrative scope: A foundation for role-based administrative models
-
J. Crampton and G. Loizou. Administrative scope: A foundation for role-based administrative models. ACM Trans. Inf. Syst. Secur., 6(2):201-231, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.2
, pp. 201-231
-
-
Crampton, J.1
Loizou, G.2
-
10
-
-
0141911037
-
-
Artech House, Inc., Norwood, MA, USA
-
D. F. Ferraiolo, D. R. Kuhn, and R. Chandramouli. Role-Based Access Control. Artech House, Inc., Norwood, MA, USA, 2003.
-
(2003)
Role-based Access Control
-
-
Ferraiolo, D.F.1
Kuhn, D.R.2
Chandramouli, R.3
-
13
-
-
70350630726
-
Rbac-pat: A policy analysis tool for role based access control
-
Springer-Verlag
-
M. I. Gofman, R. Luo, A. C. Solomon, Y. Zhang, P. Yang, and S. D. Stoller. Rbac-pat: A policy analysis tool for role based access control. In Proc. of the 15th Intl. Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), volume 5505, Springer-Verlag, 2009.
-
(2009)
Proc. of the 15th Intl. Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS)
, vol.5505
-
-
Gofman, M.I.1
Luo, R.2
Solomon, A.C.3
Zhang, Y.4
Yang, P.5
Stoller, S.D.6
-
20
-
-
55549143296
-
Automated verification of access control policies using a sat solver
-
G. Hughes and T. Bultan. Automated verification of access control policies using a sat solver. Int. J. Softw. Tools Technol. Transf., 10(6):503-520, 2008.
-
(2008)
Int. J. Softw. Tools Technol. Transf.
, vol.10
, Issue.6
, pp. 503-520
-
-
Hughes, G.1
Bultan, T.2
-
21
-
-
55949085989
-
Towards formal verification of role-based access control policies
-
S. Jha, N. Li, M. Tripunitara, Q. Wang, and W. Winsborough. Towards formal verification of role-based access control policies. IEEE Trans. Dependable Secur. Comput., 5(4):242-255, 2008.
-
(2008)
IEEE Trans. Dependable Secur. Comput.
, vol.5
, Issue.4
, pp. 242-255
-
-
Jha, S.1
Li, N.2
Tripunitara, M.3
Wang, Q.4
Winsborough, W.5
-
23
-
-
84888820903
-
Weighted pushdown systems and trust-management systems
-
New York, NY, USA Springer-Verlag
-
S. Jha, S. Schwoon, H. Wang, and T. Reps. Weighted Pushdown Systems and Trust-Management Systems. In Proc. of TACAS, New York, NY, USA, 2006. Springer-Verlag.
-
(2006)
Proc. of TACAS
-
-
Jha, S.1
Schwoon, S.2
Wang, H.3
Reps, T.4
-
24
-
-
84882574666
-
A linear time algorithm for deciding security
-
Washington, DC, USA IEEE Computer Society
-
A. K. Jones, R. J. Lipton, and L. Snyder. A linear time algorithm for deciding security. In SFCS '76: Proc. of the 17th Annual Symposium on Foundations of Computer Science, Washington, DC, USA, 1976. IEEE Computer Society.
-
(1976)
SFCS '76: Proc. of the 17th Annual Symposium on Foundations of Computer Science
-
-
Jones, A.K.1
Lipton, R.J.2
Snyder, L.3
-
27
-
-
30344471054
-
Computing over-approximations with bounded model checking
-
DOI 10.1016/j.entcs.2005.07.021, PII S157106610505245X
-
D. Kroening. Computing over-approximations with bounded model checking. Electron. Notes Theor. Comput. Sci., 144:79-92, January 2006. (Pubitemid 43060062)
-
(2006)
Electronic Notes in Theoretical Computer Science
, vol.144
, Issue.SPEC. ISS 1
, pp. 79-92
-
-
Kroening, D.1
-
28
-
-
30544438141
-
Beyond proof-of-compliance: Security analysis in trust management
-
DOI 10.1145/1066100.1066103
-
N. Li, J. C. Mitchell, and W. H. Winsborough. Beyond proof-of-compliance: security analysis in trust management. J. ACM, 52(3):474-514, 2005. (Pubitemid 43078378)
-
(2005)
Journal of the ACM
, vol.52
, Issue.3
, pp. 474-514
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
32
-
-
0033720107
-
On the decidability of accessibility problems (extended abstract)
-
New York, NY, USA ACM
-
R. Motwani, R. Panigrahy, V. Saraswat, and S. Ventkatasubramanian. On the decidability of accessibility problems (extended abstract). In STOC '00: Proc. of the thirty-second annual ACM symposium on Theory of computing, New York, NY, USA, 2000. ACM.
-
(2000)
STOC '00: Proc. of the Thirty-second Annual ACM Symposium on Theory of Computing
-
-
Motwani, R.1
Panigrahy, R.2
Saraswat, V.3
Ventkatasubramanian, S.4
-
33
-
-
80755134997
-
-
NuSMV. http://nusmv.irst.itc.it/.
-
-
-
-
34
-
-
34748830275
-
XACML function annotations
-
Washington, DC, USA IEEE Computer Society
-
P. Rao, D. Lin, and E. Bertino. XACML function annotations. In POLICY '07: Proc. of the Eighth IEEE Intl. Workshop on Policies for Distributed Systems and Networks, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
POLICY '07: Proc. of the Eighth IEEE Intl. Workshop on Policies for Distributed Systems and Networks
-
-
Rao, P.1
Lin, D.2
Bertino, E.3
-
36
-
-
0001549660
-
The arbac97 model for role-based administration of roles
-
R. Sandhu, V. Bhamidipati, and Q. Munawer. The arbac97 model for role-based administration of roles. ACM Trans. Inf. Syst. Secur., 2(1):105-135, 1999.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
38
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
40
-
-
33947682238
-
Policy analysis for administrative role based access control
-
A. Sasturkar, P. Yang, S. D. Stoller, and C. Ramakrishnan. Policy analysis for administrative role based access control. Technical report, Stony Brook University, 2006.
-
(2006)
Technical Report, Stony Brook University
-
-
Sasturkar, A.1
Yang, P.2
Stoller, S.D.3
Ramakrishnan, C.4
-
41
-
-
0035790675
-
The role-based access control system of a European bank: A case study and discussion
-
New York, NY, USA ACM
-
A. Schaad, J. Moffett, and J. Jacob. The role-based access control system of a european bank: a case study and discussion. In SACMAT '01: Proc. of the sixth ACM symposium on Access control models and technologies, New York, NY, USA, 2001. ACM.
-
(2001)
SACMAT '01: Proc. of the Sixth ACM Symposium on Access Control Models and Technologies
-
-
Schaad, A.1
Moffett, J.2
Jacob, J.3
-
43
-
-
44649149548
-
Analyzing and managing role-based access control policies
-
K. Sohr, M. Drouineaud, G.-J. Ahn, and M. Gogolla. Analyzing and managing role-based access control policies. IEEE Transactions on Knowledge and Data Engineering, 20:924-939, 2008.
-
(2008)
IEEE Transactions on Knowledge and Data Engineering
, vol.20
, pp. 924-939
-
-
Sohr, K.1
Drouineaud, M.2
Ahn, G.-J.3
Gogolla, M.4
-
44
-
-
3543115068
-
A layered design of discretionary access controls with decidable safety properties
-
J. A. Solworth and R. H. Sloan. A layered design of discretionary access controls with decidable safety properties. IEEE Symposium on Security and Privacy, 2004.
-
(2004)
IEEE Symposium on Security and Privacy
-
-
Solworth, J.A.1
Sloan, R.H.2
-
45
-
-
85159711945
-
Safety analysis of the dynamic-typed access matrix model
-
LNCS, Springer Berlin / Heidelberg
-
M. Soshi. Safety analysis of the dynamic-typed access matrix model. In Computer Security - ESORICS 2000, LNCS, Springer Berlin / Heidelberg, 2000.
-
(2000)
Computer Security - ESORICS 2000
-
-
Soshi, M.1
-
47
-
-
37249072460
-
Synthesising verified access control systems through model checking
-
N. Zhang, M. Ryan, and D. P. Guelev. Synthesising verified access control systems through model checking. J. Comput. Secur., 16(1):1-61, 2008. (Pubitemid 350264869)
-
(2008)
Journal of Computer Security
, vol.16
, Issue.1
, pp. 1-61
-
-
Zhang, N.1
Ryan, M.2
Guelev, D.P.3
-
48
-
-
33646406549
-
Representation and reasoning on rbac: A description logic approach
-
LNCS, Springer
-
C. Zhao, N. Heilili, S. Liu, and Z. Lin. Representation and reasoning on rbac: A description logic approach. In ICTAC'05: Proc. of the 2nd Intl. Colloquium on Theoretical Aspects of Computing, LNCS, Springer, 2005.
-
(2005)
ICTAC'05: Proc. of the 2nd Intl. Colloquium on Theoretical Aspects of Computing
-
-
Zhao, C.1
Heilili, N.2
Liu, S.3
Lin, Z.4
|