-
1
-
-
84936873422
-
Model-based risk assessment to improve enterprise security
-
J. O. Aagedal, F. d. Braber, T. Dimitrakos, B. A. Gran, D. Raptis, and K. Stølen. Model-based risk assessment to improve enterprise security. In Proc. of the 6th International Enterprise Distributed Object Computing Conference, 2002.
-
(2002)
Proc. of the 6th International Enterprise Distributed Object Computing Conference
-
-
Aagedal, J.O.1
Braber, F.D.2
Dimitrakos, T.3
Gran, B.A.4
Raptis, D.5
Stølen, K.6
-
2
-
-
84956993736
-
Role-based authorization constraints specification
-
November
-
G.-J. Ahn and R. Sandhu. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur., 3:207-226, November 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, pp. 207-226
-
-
Ahn, G.-J.1
Sandhu, R.2
-
3
-
-
0003619725
-
-
C. Alberts, S. Behrens, R. Pethia, and W. Wilson. Operationally critical threat, asset, and vulnerability evaluation (octave), 1999.
-
(1999)
Operationally Critical Threat, Asset, and Vulnerability Evaluation (octave)
-
-
Alberts, C.1
Behrens, S.2
Pethia, R.3
Wilson, W.4
-
4
-
-
33747817026
-
Reconfiguring role based access control policies using risk semantics
-
B. Aziz, S. N. Foley, J. Herbert, and G. Swart. Reconfiguring role based access control policies using risk semantics. In Journal of High Speed Networks: Special Issue on Managing Security Policies, Modelling Verification and Configuration, 2006.
-
(2006)
Journal of High Speed Networks: Special issue on Managing Security Policies, Modelling Verification and Configuration
-
-
Aziz, B.1
Foley, S.N.2
Herbert, J.3
Swart, G.4
-
5
-
-
33846299959
-
Intrusion detection in rbac-administered databases
-
21st Annual, dec.
-
E. Bertino, E. Terzi, A. Kamra, and A. Vakali. Intrusion detection in rbac-administered databases. In Computer Security Applications Conference, 21st Annual, dec. 2005.
-
(2005)
Computer Security Applications Conference
-
-
Bertino, E.1
Terzi, E.2
Kamra, A.3
Vakali, A.4
-
7
-
-
0034314077
-
Secure databases: Constraints, inference channels, and monitoring disclosures
-
IEEE Transactions on
-
A. Brodsky, C. Farkas, and S. Jajodia. Secure databases: constraints, inference channels, and monitoring disclosures. Knowledge and Data Engineering, IEEE Transactions on, 2000.
-
(2000)
Knowledge and Data Engineering
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
8
-
-
79151475857
-
A risk management approach to RBAC
-
November
-
E. Celikel, M. Kantarcioglu, X. Li, and E. Bertino. A Risk Management Approach to RBAC. Risk and Decision Analysis, 1(2), November 2009.
-
(2009)
Risk and Decision Analysis
, vol.1
, Issue.2
-
-
Celikel, E.1
Kantarcioglu, M.2
Li, X.3
Bertino, E.4
-
9
-
-
33748081445
-
TrustBAC - Integrating trust relationships into the RBAC model for access control in open systems
-
SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
-
S. Chakraborty and I. Ray. Trustbac: integrating trust relationships into the rbac model for access control in open systems. In Proc. of the 11th ACM symposium on Access control models and technologies, SACMAT '06, pp. 49-58, New York, NY, USA, 2006. ACM. (Pubitemid 44300741)
-
(2006)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, vol.2006
, pp. 49-58
-
-
Chakraborty, S.1
Ray, I.2
-
11
-
-
46649105922
-
Protection of database security via collaborative inference detection
-
IEEE Transactions on aug.
-
Y. Chen and W. Chu. Protection of database security via collaborative inference detection. Knowledge and Data Engineering, IEEE Transactions on, 20(8):1013-1027, aug. 2008.
-
(2008)
Knowledge and Data Engineering
, vol.20
, Issue.8
, pp. 1013-1027
-
-
Chen, Y.1
Chu, W.2
-
13
-
-
36949040331
-
Using conceptual graphs to represent database inference security analysis
-
H. S. Delugach and T. H. Hinke. Using conceptual graphs to represent database inference security analysis. Jour. Computing and Info. Tech., 4(4):291-307, 1994.
-
(1994)
Jour. Computing and Info. Tech.
, vol.4
, Issue.4
, pp. 291-307
-
-
Delugach, H.S.1
Hinke, T.H.2
-
14
-
-
4143058053
-
Using trust and risk in role-based access control policies
-
ACM Press
-
N. Dimmock, A. Belokosztolszki, D. Eyers, J. Bacon, and K. Moody. Using trust and risk in role-based access control policies. In In Proc. of the 9th ACM Symposium on Access Control Models and Technologies SACMAT'04. ACM Press, 2004.
-
(2004)
Proc. of the 9th ACM Symposium on Access Control Models and Technologies SACMAT'04
-
-
Dimmock, N.1
Belokosztolszki, A.2
Eyers, D.3
Bacon, J.4
Moody, K.5
-
15
-
-
56349127520
-
A trust and context based access control model for distributed systems
-
Washington, DC, USA IEEE Computer Society
-
F. Feng, C. Lin, D. Peng, and J. Li. A trust and context based access control model for distributed systems. In Proc. of the 2008 10th IEEE International Conference on High Performance Computing and Communications, HPCC '08, pp 629-634, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
Proc. of the 2008 10th IEEE International Conference on High Performance Computing and Communications, HPCC '08
, pp. 629-634
-
-
Feng, F.1
Lin, C.2
Peng, D.3
Li, J.4
-
16
-
-
84992227458
-
Proposed nist standard for role-based access control
-
August
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur., 4:224-274, August 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
17
-
-
84864046807
-
Surviving insider attacks: A call for system experiments
-
S. J. Stolfo, S. M. Bellovin, A. D. Keromytis, S. Hershkop, S. W. Smith, and S. Sinclair, editors Springer US
-
V. D. Gligor and C. S. Chandersekaran. Surviving insider attacks: A call for system experiments. In S. J. Stolfo, S. M. Bellovin, A. D. Keromytis, S. Hershkop, S. W. Smith, and S. Sinclair, editors, Insider Attack and Cyber Security, volume 39 of Advances in Information Security, pp. 153-164. Springer US, 2008.
-
(2008)
Insider Attack and Cyber Security, Volume 39 of Advances in Information Security
, pp. 153-164
-
-
Gligor, V.D.1
Chandersekaran, C.S.2
-
20
-
-
0343144868
-
Coloured Petri nets
-
W. Brauer, W. Reisig, and G. Rozenberg, editors Springer Berlin / Heidelberg
-
K. Jensen. Coloured petri nets. In W. Brauer, W. Reisig, and G. Rozenberg, editors, Petri Nets: Central Models and Their Properties, volume 254 of Lecture Notes in Computer Science, pp. 248-299. Springer Berlin / Heidelberg, 1987.
-
(1987)
Petri Nets: Central Models and their Properties, Volume 254 of Lecture Notes in Computer Science
, pp. 248-299
-
-
Jensen, K.1
-
21
-
-
78549269431
-
Risk analysis in access control systems
-
2010 Eighth Annual International Conference on aug.
-
J. Ma, K. Adi, M. Mejri, and L. Logrippo. Risk analysis in access control systems. In Privacy Security and Trust (PST), 2010 Eighth Annual International Conference on, pp. 160-166, aug. 2010.
-
(2010)
Privacy Security and Trust (PST)
, pp. 160-166
-
-
Ma, J.1
Adi, K.2
Mejri, M.3
Logrippo, L.4
-
25
-
-
84864069112
-
-
Oracle. Application access controls governor, 2012. http://www.oracle. com/us/solutions/corporate-governance/access-controls/index.html.
-
(2012)
Application Access Controls Governor
-
-
-
26
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
Q. M. S. Osborn, R. Sandhu. Configuring role-based access control to enforce mandatory and discretionary access control policies. In ACM Transaction on Information and System Security, 2000.
-
(2000)
ACM Transaction on Information and System Security
-
-
Osborn, Q.M.S.1
Sandhu, R.2
-
27
-
-
80455173614
-
An approach to access control under uncertainty
-
2011 6th International Conference on
-
F. Salim, J. Reid, E. Dawson, and U. Dulleck. An approach to access control under uncertainty. In Availability, Reliability and Security (ARES), 2011 6th International Conference on, pp. 1-8, 2011.
-
(2011)
Availability, Reliability and Security (ARES)
, pp. 1-8
-
-
Salim, F.1
Reid, J.2
Dawson, E.3
Dulleck, U.4
-
29
-
-
84864046808
-
-
SAP. Access risk management, 2012. www.sap.com/solutions/ sapbusinessobjects/large/governance-risk-compliance/accessandauthorization.
-
(2012)
Access Risk Management
-
-
-
31
-
-
84864029501
-
-
B. Systems. Identity and access governance, 2012. www.betasystems.com/en/ portfolio/identityaccessgovernance
-
(2012)
Identity and Access Governance
-
-
-
32
-
-
0031643164
-
Data level inference detection in database systems
-
Proc. 11th IEEE
-
R. Yip and E. Levitt. Data level inference detection in database systems. In Computer Security Foundations Workshop, 1998. Proc. 11th IEEE, pp. 179-189, 1998.
-
(1998)
Computer Security Foundations Workshop, 1998
, pp. 179-189
-
-
Yip, R.1
Levitt, E.2
|