-
2
-
-
77954754889
-
SecPAL: Design and semantics of a decentralized authorization language
-
Becker, M.Y., Fournet, C., Gordon, A.D.: SecPAL: Design and semantics of a decentralized authorization language. J. of Computer Security 18(4), 619-665 (2010)
-
(2010)
J. of Computer Security
, vol.18
, Issue.4
, pp. 619-665
-
-
Becker, M.Y.1
Fournet, C.2
Gordon, A.D.3
-
3
-
-
85025424440
-
An algebra for composing access control policies
-
Bonatti, P.A., di Vimercati, S.D.C., Samarati, P.: An algebra for composing access control policies. ACM Trans. Inf. Syst. Secur. 5(1), 1-35 (2002)
-
(2002)
ACM Trans. Inf. Syst. Secur.
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.A.1
Di Vimercati, S.D.C.2
Samarati, P.3
-
4
-
-
51449098223
-
An operational framework for service oriented architecture network security
-
Bunge, R., Chung, S., Endicott-Popovsky, B., McLane, D.: An operational framework for service oriented architecture network security. In: Proc. HICCS, p. 312 (2008)
-
(2008)
Proc. HICCS
, pp. 312
-
-
Bunge, R.1
Chung, S.2
Endicott-Popovsky, B.3
McLane, D.4
-
5
-
-
84863448761
-
-
CISCO ACE XML Gateway (2010), http://www.cisco.com/en/US/products/ps7314/ index.html
-
(2010)
CISCO ACE XML Gateway
-
-
-
6
-
-
33750959395
-
Availability enforcement by obligations and aspects identification
-
Cuppens, F., Cuppens-Boulahia, N., Ramard, T.: Availability enforcement by obligations and aspects identification. In: Proc. ARES, pp. 229-239 (2006)
-
(2006)
Proc. ARES
, pp. 229-239
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Ramard, T.3
-
7
-
-
84944048132
-
The Ponder Policy Specification Language
-
Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. Springer, Heidelberg
-
Damianou, N., Dulay, N., Lupu, E.C., Sloman, M.: The Ponder Policy Specification Language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, pp. 18-38. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1995
, pp. 18-38
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.C.3
Sloman, M.4
-
8
-
-
33745847564
-
Harmless advice
-
Morrisett, J.G., Jones, S.L.P. (eds.) ACM
-
Dantas, D.S., Walker, D.: Harmless advice. In: Morrisett, J.G., Jones, S.L.P. (eds.) POPL, pp. 383-396. ACM (2006)
-
(2006)
POPL
, pp. 383-396
-
-
Dantas, D.S.1
Walker, D.2
-
9
-
-
84863451629
-
-
May
-
Dell'Amico, M., Idrees, M.S., Roudier, Y., de Oliveira, A.S., Serme, G., Harel, G.: Language definition for security specifications. Deliverable D2.2, The CESSA project (May 2011), http://cessa.gforge.inria.fr/lib/exe/fetch.php? media=publications:d2-2.pdf
-
(2011)
Language Definition for Security Specifications. Deliverable D2.2
-
-
Dell'Amico, M.1
Idrees, M.S.2
Roudier, Y.3
De Oliveira, A.S.4
Serme, G.5
Harel, G.6
-
10
-
-
84863448760
-
-
June
-
Douence, R., Grall, H., Mejía, I., Royer, J.C., Südhold, M., Idrees, M.S., Roudier, Y., Leroux, J., Rivard, F., Pazzaglia, J., Serme, G.: Survey and requirements analysis. Deliverable D1.1, The CESSA project (June 2010), http://cessa.gforge.inria.fr/lib/exe/fetch.php?media=publications:d1-1. pdf
-
(2010)
Survey and Requirements Analysis. Deliverable D1.1
-
-
Douence, R.1
Grall, H.2
Mejía, I.3
Royer, J.C.4
Südhold, M.5
Idrees, M.S.6
Roudier, Y.7
Leroux, J.8
Rivard, F.9
Pazzaglia, J.10
Serme, G.11
-
11
-
-
38049036409
-
Modular Access Control Via Strategic Rewriting
-
Biskup, J., López, J. (eds.) ESORICS 2007. Springer, Heidelberg
-
Dougherty, D.J., Kirchner, C., Kirchner, H., de Oliveira, A.S.: Modular Access Control Via Strategic Rewriting. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 578-593. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4734
, pp. 578-593
-
-
Dougherty, D.J.1
Kirchner, C.2
Kirchner, H.3
De Oliveira, A.S.4
-
13
-
-
84893975147
-
Evolving Security Requirements in Multi-layered Service-Oriented- Architectures
-
Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds.) DPM 2011 and SETOP 2011. Springer, Heidelberg
-
Sabir Idrees, M., Serme, G., Roudier, Y., de Oliveira, A.S., Grall, H., Südholt, M.: Evolving Security Requirements in Multi-layered Service-Oriented-Architectures. In: Garcia-Alfaro, J., Navarro-Arribas, G., Cuppens-Boulahia, N., de Capitani di Vimercati, S. (eds.) DPM 2011 and SETOP 2011. LNCS, vol. 7122, pp. 190-205. Springer, Heidelberg (2012)
-
(2012)
LNCS
, vol.7122
, pp. 190-205
-
-
Sabir Idrees, M.1
Serme, G.2
Roudier, Y.3
De Oliveira, A.S.4
Grall, H.5
Südholt, M.6
-
14
-
-
35148864124
-
A policy language for adaptive web services security framework
-
Li, J.X., Li, B., Li, L., Che, T.S.: A policy language for adaptive web services security framework. In: ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, vol. 1, pp. 261-266 (2007)
-
(2007)
ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing
, vol.1
, pp. 261-266
-
-
Li, J.X.1
Li, B.2
Li, L.3
Che, T.S.4
-
17
-
-
84863482007
-
-
CITRIX NetScaler (2010), http://www.citrix.com/english/ps2/products/ product.asp?contentid=21679
-
(2010)
CITRIX NetScaler
-
-
-
18
-
-
84255177327
-
ASLan++ - A Formal Security Specification Language for Distributed Systems
-
Aichernig, B.K., de Boer, F.S., Bonsangue, M.M. (eds.) FMCO 2011. Springer, Heidelberg
-
von Oheimb, D., Mödersheim, S.: ASLan++ - A Formal Security Specification Language for Distributed Systems. In: Aichernig, B.K., de Boer, F.S., Bonsangue, M.M. (eds.) FMCO 2011. LNCS, vol. 6957, pp. 1-22. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6957
, pp. 1-22
-
-
Von Oheimb, D.1
Mödersheim, S.2
-
19
-
-
62849128528
-
Weaving rewrite-based access control policies
-
Ning, P., Atluri, V., Gligor, V.D., Mantel, H. (eds.) ACM
-
de Oliveira, A.S., Wang, E.K., Kirchner, C., Kirchner, H.: Weaving rewrite-based access control policies. In: Ning, P., Atluri, V., Gligor, V.D., Mantel, H. (eds.) FMSE, pp. 71-80. ACM (2007)
-
(2007)
FMSE
, pp. 71-80
-
-
De Oliveira, A.S.1
Wang, E.K.2
Kirchner, C.3
Kirchner, H.4
-
20
-
-
79951871897
-
A policy-oriented language for expressing security specifications
-
Ribeiro, C., Ferreira, P.: A policy-oriented language for expressing security specifications. International Journal of Network Security 5(3), 299-316 (2007)
-
(2007)
International Journal of Network Security
, vol.5
, Issue.3
, pp. 299-316
-
-
Ribeiro, C.1
Ferreira, P.2
-
21
-
-
1542388757
-
SPL: An access control language for security policies with complex constraints
-
Ribeiro, C., Zuquete, A., Ferreira, P., Guedes, P.: SPL: An access control language for security policies with complex constraints. In: Proc. of NDSS (2001)
-
Proc. of NDSS (2001)
-
-
Ribeiro, C.1
Zuquete, A.2
Ferreira, P.3
Guedes, P.4
-
23
-
-
76349088525
-
A decentralized mechanism for application level monitoring of distributed systems
-
IEEE
-
Serban, C., Zhang, W., Minsky, N.: A decentralized mechanism for application level monitoring of distributed systems. In: 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2009, pp. 1-10. IEEE (2009)
-
(2009)
5th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2009
, pp. 1-10
-
-
Serban, C.1
Zhang, W.2
Minsky, N.3
-
25
-
-
30644467106
-
Verifiable composition of access control and application features
-
DOI 10.1145/1063979.1064001, SACMAT 2005: Proceedings of 10th ACM Symposium on Access Control Models and Technologies
-
Song, E., Reddy, R., France, R.B., Ray, I., Georg, G., Alexander, R.: Verifiable composition of access control and application features. In: Ferrari, E., Ahn, G.J. (eds.) SACMAT, pp. 120-129. ACM (2005) (Pubitemid 43087468)
-
(2005)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, pp. 120-129
-
-
Song, E.1
Reddy, R.2
France, R.3
Ray, I.4
Georg, G.5
Alexander, R.6
|