-
1
-
-
77955712460
-
On usage control for grid systems
-
F. Martinelli and P. Mori, "On usage control for grid systems," Future Generation Computer Systems, vol. 26, no. 7, pp. 1032-1042, 2010.
-
(2010)
Future Generation Computer Systems
, vol.26
, Issue.7
, pp. 1032-1042
-
-
Martinelli, F.1
Mori, P.2
-
2
-
-
57049188320
-
Enhancing Java ME Security Support with Resource Usage Monitoring
-
A. Castrucci, F. Martinelli, P. Mori, and F. Roperti, "Enhancing Java ME Security Support with Resource Usage Monitoring," in Proc. of ICICS 08, vol. 5308, pp. 256-266.
-
Proc. of ICICS 08
, vol.5308
, pp. 256-266
-
-
Castrucci, A.1
Martinelli, F.2
Mori, P.3
Roperti, F.4
-
3
-
-
84864196446
-
Extending resource access in multiprovider networks using trust management
-
M. Colombo, F. Martinelli, P. Mori, B. Martini, M. Gharbaoui, and P. Castoldi, "Extending resource access in multiprovider networks using trust management," Journal of Comp. Net. and Comm. (IJCNC), vol. 3, no. 3, pp. 133-147, 2011.
-
(2011)
Journal of Comp. Net. and Comm. (IJCNC)
, vol.3
, Issue.3
, pp. 133-147
-
-
Colombo, M.1
Martinelli, F.2
Mori, P.3
Martini, B.4
Gharbaoui, M.5
Castoldi, P.6
-
4
-
-
80053606092
-
An Analysis and Survey of the Development of Mutation Testing
-
Y. Jia and M. Harman, "An Analysis and Survey of the Development of Mutation Testing," IEEE Transactions on Software Engineering, vol. 37, no. 5, pp. 649-678, 2011.
-
(2011)
IEEE Transactions on Software Engineering
, vol.37
, Issue.5
, pp. 649-678
-
-
Jia, Y.1
Harman, M.2
-
5
-
-
3142523603
-
The UCONABC usage control model
-
R. Sandhu and J. Park., "The UCONABC usage control model," ACM Transactions on Information and System Security, vol. 7, no. 1, pp. 128-174, 2004.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.1
, pp. 128-174
-
-
Sandhu, R.1
Park, J.2
-
6
-
-
33745450500
-
Formal model and policy specification of usage control
-
X. Zhang, F. Parisi-presicce, and R. Sandhu, "Formal model and policy specification of usage control," ACM Trans. on Inf. and Systems Security, vol. 8, no. 4, pp. 351-387, 2005.
-
(2005)
ACM Trans. on Inf. and Systems Security
, vol.8
, Issue.4
, pp. 351-387
-
-
Zhang, X.1
Parisi-presicce, F.2
Sandhu, R.3
-
8
-
-
68049104013
-
Generating structurally complex test cases by data mutation: A case study of testing an automated modelling tool
-
L. Shan and H. Zhu, "Generating structurally complex test cases by data mutation: A case study of testing an automated modelling tool," Comp. Jour., vol. 52, pp. 571-588, 2007.
-
(2007)
Comp. Jour.
, vol.52
, pp. 571-588
-
-
Shan, L.1
Zhu, H.2
-
9
-
-
35348900179
-
A fault model and mutation testing of access control policies
-
E. Martin and T. Xie, "A fault model and mutation testing of access control policies," in Proc. of WWW '07, pp. 667-676.
-
Proc. of WWW '07
, pp. 667-676
-
-
Martin, E.1
Xie, T.2
-
10
-
-
78449304326
-
Systematic XACML Request Generation for Testing Purposes
-
A. Bertolino, F. Lonetti, and E. Marchetti, "Systematic XACML Request Generation for Testing Purposes," in Proc. of 36th EUROMICRO Conference, 2010, pp. 3-11.
-
Proc. of 36th EUROMICRO Conference, 2010
, pp. 3-11
-
-
Bertolino, A.1
Lonetti, F.2
Marchetti, E.3
-
11
-
-
50649102597
-
Model-based tests for access control policies
-
A. Pretschner, T. Mouelhi, and Y. Le Traon, "Model-based tests for access control policies," in Proc. of ICST, 2008, pp. 338-347.
-
Proc. of ICST, 2008
, pp. 338-347
-
-
Pretschner, A.1
Mouelhi, T.2
Le Traon, Y.3
-
12
-
-
38549181721
-
Automated test generation for access control policies via change-impact analysis
-
E. Martin and T. Xie, "Automated test generation for access control policies via change-impact analysis," in Proc. of SESS, 2007, pp. 5-12.
-
Proc. of SESS, 2007
, pp. 5-12
-
-
Martin, E.1
Xie, T.2
-
13
-
-
79960222774
-
Security mutants for property-based testing
-
M. Büchler, J. Oudinet, and A. Pretschner, "Security mutants for property-based testing," in Proc. of TAP, 2011, pp. 69-77.
-
Proc. of TAP, 2011
, pp. 69-77
-
-
Büchler, M.1
Oudinet, J.2
Pretschner, A.3
|