-
2
-
-
84974776848
-
The Extended schematic protection model
-
P. Ammann and R.S. Sandhu, "The Extended Schematic Protection Model," J. Computer Security, vol. 1, nos. 3/4, pp. 335-383, 1992.
-
(1992)
J. Computer Security
, vol.1
, Issue.3-4
, pp. 335-383
-
-
Ammann, P.1
Sandhu, R.S.2
-
7
-
-
26844544427
-
Safety in Grammatical protection systems
-
T. Budd, "Safety in Grammatical Protection Systems," Int'l J. Computer and Information Sciences, vol. 12, no. 6, pp. 413-430, 1983.
-
(1983)
Int'l J. Computer and Information Sciences
, vol.12
, Issue.6
, pp. 413-430
-
-
Budd, T.1
-
9
-
-
0004238984
-
-
First Ed. Addison-Wesley Longman Publishing Co, Inc
-
D. Denning, Cryptography and Data Security, first ed. Addison-Wesley Longman Publishing Co., Inc., 1982.
-
(1982)
Cryptography Data Security
-
-
Denning, D.1
-
11
-
-
33746634173
-
-
Google Inc May
-
Google, Inc., "Google Scholar," http://scholar.google.com/, May 2005.
-
(2005)
Google Scholar
-
-
-
13
-
-
0009442659
-
Monotonic protection systems
-
R.A. DeMillo, D.P. Dobkin, A.K. Jones, and R.J. Lipton, ed Academic Press, Inc
-
M.A. Harrison and W.L. Ruzzo, "Monotonic Protection Systems," Foundations of Secure Computation, R.A. DeMillo, D.P. Dobkin, A.K. Jones, and R.J. Lipton, ed., pp. 461-471, Academic Press, Inc., 1978.
-
(1978)
Foundations of Secure Computation
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
-
14
-
-
0016984825
-
Protection in Operating Systems
-
Aug
-
M.A. Harrison, W.L. Ruzzo, and J.D. Ullman, "Protection in Operating Systems," Comm. ACM, vol. 19, no. 8, pp. 461-471, Aug. 1976.
-
(1976)
Comm. ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
15
-
-
0003620778
-
-
Int'l ed., second ed. Addison-Wesley
-
J.E. Hopcroft, R. Motwani, and J.D. Ullman, Introduction to Automata Theory, Languages, and Computation, Int'l ed., second ed. Addison-Wesley, 2003.
-
(2003)
Introduction to Automata Theory, Languages, and Computation
-
-
Hopcroft, J.E.1
Motwani, R.2
Ullman, J.D.3
-
16
-
-
84882574666
-
A Linear Time Algorithm for Deciding Security
-
Oct
-
A.K. Jones, R.J. Lipton, and L. Snyder, "A Linear Time Algorithm for Deciding Security," Proc. IEEE 17th Ann. Symp. Foundations of Computer Science (FOCS), pp. 33-41, Oct. 1976.
-
(1976)
Proc. IEEE 17th Ann. Symp. Foundations of Computer Science (FOCS)
, pp. 33-41
-
-
Jones, A.K.1
Lipton, R.J.2
Snyder, L.3
-
17
-
-
0003037529
-
Reducibility among combinatorial problems
-
R.E. Miller and J.W. Thatcher, ed Plenum Press
-
R.M. Karp, "Reducibility among Combinatorial Problems," Complexity of Computer Computations, R.E. Miller and J.W. Thatcher, ed., pp. 85-103, Plenum Press, 1972.
-
(1972)
Complexity of Computer Computations
, pp. 85-103
-
-
Karp, R.M.1
-
18
-
-
0000423879
-
A comparison of polynomial time reducibilities
-
R.E. Ladner, N.A. Lynch, and A.L. Selman, "A Comparison Of Polynomial Time Reducibilities," Theoretical Computer Science, vol. 1, pp. 103-123, 1975.
-
(1975)
Theoretical Computer Science
, vol.1
, pp. 103-123
-
-
Ladner, R.E.1
Lynch, N.A.2
Selman, A.L.3
-
19
-
-
0002179618
-
Protection
-
Jan
-
B.W. Lampson, "Protection," ACM Operating Systems Rev., vol. 8, no. 1, pp. 18-24, Jan. 1974.
-
(1974)
ACM Operating Systems Rev
, vol.8
, Issue.1
, pp. 18-24
-
-
Lampson, B.W.1
-
20
-
-
30544438141
-
Beyond proof-of-compliance: Security analysis in trust management
-
N. Li, J.C. Mitchell, and W.H. Winsborough, "Beyond Proof-of-Compliance: Security Analysis in Trust Management," J. ACM, vol. 52, pp. 474-514, 2004.
-
(2004)
J. ACM
, vol.52
, pp. 474-514
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
22
-
-
0038825043
-
Beyond proof-of-compliance: Safety and availability analysis in trust management
-
May
-
N. Li, W.H. Winsborough, and J.C. Mitchell, "Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management," Proc. IEEE Symp. Security and Privacy, pp. 123-139, May 2003.
-
(2003)
Proc. IEEE Symp. Security and Privacy
, pp. 123-139
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
23
-
-
0017512599
-
Linear time algorithm for deciding subject security
-
R.J. Lipton and L. Snyder, "A Linear Time Algorithm for Deciding Subject Security," J. ACM, vol. 24, no. 3, pp. 455-464, 1977. (Pubitemid 8549592)
-
(1977)
J Assoc Comput Mach
, vol.24
, Issue.3
, pp. 455-464
-
-
Lipton, R.J.1
Snyder, L.2
-
24
-
-
84976701444
-
Selective and locally controlled transport of privileges
-
Oct
-
N.H. Minsky, "Selective and Locally Controlled Transport Of Privileges," ACM Trans. Programming Languages and Systems, vol. 6, no. 4, pp. 573-602, Oct. 1984.
-
(1984)
ACM Trans. Programming Languages and Systems
, vol.6
, Issue.4
, pp. 573-602
-
-
Minsky, N.H.1
-
25
-
-
0033720107
-
On the decidability of accessibility problems (Extended Abstract)
-
May
-
R. Motwani, R. Panigrahy, V.A. Saraswat, and S. Ventkatasubramanian, "On the Decidability of Accessibility Problems (Extended Abstract)," Proc. 32nd Ann. ACM Symp. Theory of Computing, pp. 306-315, May 2000.
-
(2000)
Proc. 32nd Ann ACM Symp. Theory of Computing
, pp. 306-315
-
-
Motwani, R.1
Panigrahy, R.2
Saraswat, V.A.3
Ventkatasubramanian, S.4
-
28
-
-
0023999796
-
The Schematic protection model: Its definition and analysis for acyclic attenuating systems
-
R.S. Sandhu, "The Schematic Protection Model: Its Definition and Analysis for Acyclic Attenuating Systems," J. ACM, vol. 35, no. 2, pp. 404-432, 1988.
-
(1988)
J. ACM
, vol.35
, Issue.2
, pp. 404-432
-
-
Sandhu, R.S.1
-
29
-
-
84974744165
-
Expressive power of the schematic protection model
-
R.S. Sandhu, "Expressive Power of the Schematic Protection Model," J. Computer Security, vol. 1, no. 1, pp. 59-98, 1992.
-
(1992)
J. Computer Security
, vol.1
, Issue.1
, pp. 59-98
-
-
Sandhu, R.S.1
-
31
-
-
0026819359
-
Undecidability of the safety problem for the schematic protection model with cyclic creates
-
Feb
-
R.S. Sandhu, "Undecidability of the Safety Problem for the Schematic Protection Model with Cyclic Creates," J. Computer and System Sciences, vol. 44, no. 1, pp. 141-159, Feb. 1992.
-
(1992)
J. Computer and System Sciences
, vol.44
, Issue.1
, pp. 141-159
-
-
Sandhu, R.S.1
-
34
-
-
0842288709
-
The Dynamic-typed access matrix model and decidability of the safety problem
-
Jan
-
M. Soshi, M. Maekawa, and E. Okamoto, "The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem," IEICE Trans. Fundamentals, vol. E87-A, no. 1, pp. 190-203, Jan. 2004.
-
(2004)
IEICE Trans. Fundamentals
, vol.E87-A
, Issue.1
, pp. 190-203
-
-
Soshi, M.1
Maekawa, M.2
Okamoto, E.3
|