-
3
-
-
84875547646
-
A constraint and attribute based security framework for dynamic role assignment in collaborative environments
-
Orlando, FL, USA, November 13-16
-
Cruz I. F., Gjomemo R., Lin B., M. Orsini. A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments. Proc. The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing. Orlando, FL, USA, November 13-16, 2008.
-
(2008)
Proc. The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing
-
-
Cruz, I.F.1
Gjomemo, R.2
Lin, B.3
Orsini, M.4
-
4
-
-
84875545846
-
Dealing with the formal analysis of information security policies through ontologies: A case study
-
Da Silva G. M. H., Rademaker A., Vasconcelos D. R., Amaral F. N., Bazílio C., Costa V. G., Haeusler E. H. Dealing with the Formal Analysis of Information Security Policies through Ontologies: A Case Study. 3rd Australasian Ontology Workshop (AOW-07), Gold Coast, Queensland, Australia. Conferences in Research and Practice in Information Technology, Vol. 85, 2007.
-
(2007)
3rd Australasian Ontology Workshop (AOW-07), Gold Coast, Queensland, Australia. Conferences in Research and Practice in Information Technology
, vol.85
-
-
Da Silva, G.M.H.1
Rademaker, A.2
Vasconcelos, D.R.3
Amaral, F.N.4
Bazílio, C.5
Costa, V.G.6
Haeusler, E.H.7
-
5
-
-
35348924314
-
Analyzing web access control policies
-
ACM, New York, NY, USA
-
Kolovski, V., Hendler, J., and Parsia B. Analyzing web access control policies. In WWW '07: Proceedings of the 16th international conference on World Wide Web. ACM, New York, NY, USA, 2007, pp. 677-686.
-
(2007)
WWW '07: Proceedings of the 16th International Conference on World Wide Web
, pp. 677-686
-
-
Kolovski, V.1
Hendler, J.2
Parsia, B.3
-
7
-
-
50249143592
-
Confident firewall policy configuration management using description logic
-
Short Paper, Reykjavik, Iceland, October 11-12
-
Fitzgerald W. M., Foley S. N., O'Foghlu M. Confident Firewall Policy Configuration Management using Description Logic. Twelfth Nordic Workshop on Secure IT Systems, Short Paper, Reykjavik, Iceland, October 11-12, 2007.
-
(2007)
Twelfth Nordic Workshop on Secure IT Systems
-
-
Fitzgerald, W.M.1
Foley, S.N.2
O'Foghlu, M.3
-
8
-
-
84875491758
-
Attack goal generation using description logic-based knowledge representation
-
Edinburgh, Scotland, UK, July 26-28
-
Rochaeli T., Eckert C. Attack Goal Generation Using Description Logic-based Knowledge Representation. Proceedings of the 2005 International Workshop on Description Logics (DL2005), Edinburgh, Scotland, UK, July 26-28, 2005.
-
(2005)
Proceedings of the 2005 International Workshop on Description Logics (DL2005)
-
-
Rochaeli, T.1
Eckert, C.2
-
13
-
-
34250320312
-
-
International Business Machines Corporation
-
Ogle, D., Kreger, H., Salahshour, A., Cornpropst, J., Labadie, E., Chessell, M., Horn, B., Gerken, J., Schoech, J., Wamboldt, M., 2004. Canonical Situation Data Format: The Common Base Event V1.0.1. International Business Machines Corporation.
-
(2004)
Canonical Situation Data Format: The Common Base Event V1.0.1
-
-
Ogle, D.1
Kreger, H.2
Salahshour, A.3
Cornpropst, J.4
Labadie, E.5
Chessell, M.6
Horn, B.7
Gerken, J.8
Schoech, J.9
Wamboldt, M.10
-
23
-
-
84875536277
-
-
Virtuoso. http://virtuoso.openlinksw.com
-
-
-
|