-
1
-
-
79951880667
-
SecPAL: Design and semantics of a decentralized authorization language
-
Becker, M.Y., Fournet, C.Y., Gordon, A.D.: SecPAL: Design and semantics of a decentralized authorization language. JCS (2009)
-
(2009)
JCS
-
-
Becker, M.Y.1
Fournet, C.Y.2
Gordon, A.D.3
-
2
-
-
0041524664
-
A logical framework for reasoning about access control models
-
Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A logical framework for reasoning about access control models. ACM TISSEC 6(1), 71-127 (2003)
-
(2003)
ACM TISSEC
, vol.6
, Issue.1
, pp. 71-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
3
-
-
84863917765
-
A logical framework for reasoning on data access control policies
-
Bertino, E., Ferrari, E., Buccafurri, F., Rullo, P.: A logical framework for reasoning on data access control policies. In: IEEE CSFW(1999)
-
(1999)
IEEE CSFW
-
-
Bertino, E.1
Ferrari, E.2
Buccafurri, F.3
Rullo, P.4
-
4
-
-
0040884892
-
A flexible authorization mechanism for relational data management systems
-
Bertino, E., Jajodia, S., Samarati, P.: A flexible authorization mechanism for relational data management systems. ACM TISSEC 17(2), 101-140 (1999)
-
(1999)
ACM TISSEC
, vol.17
, Issue.2
, pp. 101-140
-
-
Bertino, E.1
Jajodia, S.2
Samarati, P.3
-
5
-
-
0029700344
-
Decentralized trust management
-
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 164-173 (1996)
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
6
-
-
0034446895
-
A modular approach to composing access control policies
-
Bonatti, P.A., di Vimercati, S.D., Samarati, P.: A modular approach to composing access control policies. In: ACM CCS, pp. 164-173 (2000)
-
(2000)
ACM CCS
, pp. 164-173
-
-
Bonatti, P.A.1
Di Vimercati, S.D.2
Samarati, P.3
-
7
-
-
80052494019
-
Consumable credentials in logic-based access-control systems
-
Bowers, K.D., Bauer, L., Garg, D., Pfenning, F., Reiter, M.K.: Consumable credentials in logic-based access-control systems. In: NDSS, pp. 143-157 (2007)
-
(2007)
NDSS
, pp. 143-157
-
-
Bowers, K.D.1
Bauer, L.2
Garg, D.3
Pfenning, F.4
Reiter, M.K.5
-
8
-
-
84863917764
-
Access-control policies via belnap logic: Effective and efficient composition and analysis
-
Bruns, G., Huth, M.: Access-control policies via belnap logic: Effective and efficient composition and analysis. In: IEEE CSF (2008)
-
(2008)
IEEE CSF
-
-
Bruns, G.1
Huth, M.2
-
9
-
-
84863960986
-
Analyzing consistency of security policies
-
Cholvy, L., Cuppens, F.: Analyzing consistency of security policies. In: IEEE S&P (1997)
-
(1997)
IEEE S&P
-
-
Cholvy, L.1
Cuppens, F.2
-
10
-
-
33745801960
-
Understanding and developing role-based administrative models
-
Crampton, J.: Understanding and developing role-based administrative models. In: ACM CCS, pp. 158-167 (2005)
-
(2005)
ACM CCS
, pp. 158-167
-
-
Crampton, J.1
-
11
-
-
84863962704
-
Merging security policies: Analysis of a practical example
-
Cuppens, F., Cholvy, L., Saurel, C., Carrere, J.: Merging security policies: analysis of a practical example. In: IEEE CSFW(1998)
-
(1998)
IEEE CSFW
-
-
Cuppens, F.1
Cholvy, L.2
Saurel, C.3
Carrere, J.4
-
12
-
-
84863960988
-
Using first-order logic to reason about policies
-
Halpern, J.Y.,Weissman, V.: Using first-order logic to reason about policies. In: IEEE CSFW (2003)
-
(2003)
IEEE CSFW
-
-
Halpern, J.Y.1
Weissman, V.2
-
13
-
-
84863917766
-
-
(Extended version). Technical Report TR-11-182, University of Pittsburgh October
-
Hinrichs, T., Garrison, W., Lee, A., Saunders, S., Mitchell, J.: TBA: A hybrid of logic and extensional access control systems (Extended version). Technical Report TR-11-182, University of Pittsburgh (October 2011)
-
(2011)
TBA: A Hybrid of Logic and Extensional Access Control Systems
-
-
Hinrichs, T.1
Garrison, W.2
Lee, A.3
Saunders, S.4
Mitchell, J.5
-
15
-
-
57049146342
-
Supporting selective information sharing with people-tagging
-
Razavi, M.N., Iverson, L.: Supporting selective information sharing with people-tagging. In: CHI Extended Abstracts, pp. 3423-3428 (2008)
-
(2008)
CHI Extended Abstracts
, pp. 3423-3428
-
-
Razavi, M.N.1
Iverson, L.2
-
16
-
-
84945150402
-
SPL: An access control language for security policies with complex constraints
-
Ribeiro, C., Zuquete, A., Ferreira, P., Guedes, P.: SPL: An access control language for security policies with complex constraints. In: NDSS (2001)
-
(2001)
NDSS
-
-
Ribeiro, C.1
Zuquete, A.2
Ferreira, P.3
Guedes, P.4
-
17
-
-
33847356528
-
A theory for comparing the expressive power of access control models
-
Tripunitara, M.V., Li, N.: A theory for comparing the expressive power of access control models. JCS 15(2), 231-272 (2007)
-
(2007)
JCS
, vol.15
, Issue.2
, pp. 231-272
-
-
Tripunitara, M.V.1
Li, N.2
-
18
-
-
84863962705
-
-
.S. Air Force Scientific Advisory Board Technical report, MITRE Corporation
-
U.S. Air Force Scientific Advisory Board. Networking to enable coalition operations. Technical report, MITRE Corporation (2004)
-
(2004)
Networking to Enable Coalition Operations
-
-
-
19
-
-
70350353222
-
Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging
-
Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
-
Wang, Q., Jin, H., Li, N.: Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 268-284. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5789
, pp. 268-284
-
-
Wang, Q.1
Jin, H.2
Li, N.3
-
20
-
-
0037673317
-
Policy algebras for access control - The predicate case
-
Wijesekera, D., Jajodia, S.: Policy algebras for access control - the predicate case. In: ACM CCS, pp. 171-180 (2001)
-
(2001)
ACM CCS
, pp. 171-180
-
-
Wijesekera, D.1
Jajodia, S.2
|