-
1
-
-
84861199035
-
Openambient: A pervasive access control architecture
-
Schmidt, A., Kreutzer, M., Accorsi, R. (eds.) Nova Science Publisher, Bombay
-
Anisetti, M., Ardagna, C., Bellandi, V., Damiani, E.: Openambient: A Pervasive Access Control Architecture. In: Schmidt, A., Kreutzer, M., Accorsi, R. (eds.) Long-Term and Dynamical Aspects of Information Security: Emerging Trends in Information and Communication Security. Nova Science Publisher, Bombay (2007)
-
(2007)
Long-term and Dynamical Aspects of Information Security: Emerging Trends in Information and Communication Security
-
-
Anisetti, M.1
Ardagna, C.2
Bellandi, V.3
Damiani, E.4
-
2
-
-
34247380764
-
Supporting location-based conditions in access control policies
-
Ardagna, C., Cremonini, M., Damiani, E., di Vimercati, S., Samarati, P.: Supporting Location-based Conditions in Access Control Policies. In: Symposium on Information, Computer and Communications Security (2006)
-
(2006)
Symposium on Information, Computer and Communications Security
-
-
Ardagna, C.1
Cremonini, M.2
Damiani, E.3
Di Vimercati, S.4
Samarati, P.5
-
6
-
-
84885888783
-
Types and effects for non-interfering program monitors
-
Okada, M., Pierce, B., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) Springer, Heidelberg
-
Bauer, L., Ligatti, J., Walker, D.: Types and Effects for Non-interfering Program Monitors. In: Okada, M., Pierce, B., Scedrov, A., Tokuda, H., Yonezawa, A. (eds.) Software Security - Theories and Systems. Springer, Heidelberg (2003)
-
(2003)
Software Security - Theories and Systems
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
7
-
-
41649091646
-
Policy mapper: Administering location-based access-control policies
-
DOI 10.1109/MIC.2008.40
-
Bhatti, R., Damiani, M., Bettis, D., Bertino, E.: Policy Mapper: Administering Location-based Access-control Policies. IEEE Internet Computing 12(2), 38-45 (2008) (Pubitemid 351479407)
-
(2008)
IEEE Internet Computing
, vol.12
, Issue.2
, pp. 38-45
-
-
Bhatti, R.1
Damiani, M.L.2
Bettis, D.W.3
Bertino, E.4
-
9
-
-
84944048132
-
The ponder policy specification language
-
Sloman, M., Lobo, J., Lupu, E.C. (eds.) LNCS Springer, Heidelberg
-
Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, pp. 18-39. Springer, Heidelberg (2001)
-
(2001)
POLICY 2001
, vol.1995
, pp. 18-39
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
14
-
-
84885889250
-
-
GPSLib4J v0.1
-
GPSLib4J v0.1, http://gpslib4j.sourceforge.net/
-
-
-
-
16
-
-
0346462016
-
A lightweight architecture for program execution monitoring
-
Jeffery, C., Zhou, W., Templer, K., Brazell, M.: A Lightweight Architecture for Program Execution Monitoring. In: Program Analysis for Software Tools and Engineering (PASTE), pp. 67-74. ACM Press, New York (1998) (Pubitemid 128457893)
-
(1998)
SIGPLAN Notices (ACM Special Interest Group on Programming Languages)
, vol.33
, Issue.7
, pp. 67-74
-
-
Jeffery, C.1
Zhou, W.2
Templer, K.3
Brazell, M.4
-
17
-
-
82955230066
-
An overview of AspectJ
-
Knudsen, J.L. (ed.) LNCS Springer, Heidelberg
-
Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.: An Overview of AspectJ. In: Knudsen, J.L. (ed.) ECOOP 2001. LNCS, vol. 2072, p. 327. Springer, Heidelberg (2001)
-
(2001)
ECOOP 2001
, vol.2072
, pp. 327
-
-
Kiczales, G.1
Hilsdale, E.2
Hugunin, J.3
Kersten, M.4
Palm, J.5
Griswold, W.6
-
18
-
-
33646066871
-
Enforcing non-safety security policies with program monitors
-
di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) LNCS Springer, Heidelberg
-
Ligatti, J., Bauer, L., Walker, D.: Enforcing Non-safety Security Policies with Program Monitors. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ES-ORICS 2005. LNCS, vol. 3679, pp. 355-373. Springer, Heidelberg (2005)
-
(2005)
ES-ORICS 2005
, vol.3679
, pp. 355-373
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
19
-
-
60349103393
-
Run-time enforcement of nonsafety policies
-
Ligatti, J., Bauer, L., Walker, D.: Run-time Enforcement of Nonsafety Policies. ACM Transactions on Information and System Security 12(3), 1-41 (2009)
-
(2009)
ACM Transactions on Information and System Security
, vol.12
, Issue.3
, pp. 1-41
-
-
Ligatti, J.1
Bauer, L.2
Walker, D.3
-
20
-
-
84885888305
-
-
LoPSiL Implementation, http://www.cse.usf.edu/~ligatti/projects/runtime/ LoPSiL.zip
-
LoPSiL Implementation
-
-
-
22
-
-
51649125495
-
Trust for location-based authorisation
-
Schmidt, A., Kuntze, N., Abendroth, J.: Trust for Location-based Authorisation. In: Wireless Communications and Networking Conference, pp. 3163-3168 (2008)
-
(2008)
Wireless Communications and Networking Conference
, pp. 3163-3168
-
-
Schmidt, A.1
Kuntze, N.2
Abendroth, J.3
|