-
1
-
-
33750534177
-
Towards secure information sharing using role-based delegation
-
Jan.
-
G.-J. Ahn, B. Mohan, and S.-P. Hong. Towards secure information sharing using role-based delegation. J. Netw. Comput. Appl., 30(1):42{59, Jan. 2007.
-
(2007)
J. Netw. Comput. Appl.
, vol.30
, Issue.1
, pp. 42-59
-
-
Ahn, G.-J.1
Mohan, B.2
Hong, S.-P.3
-
2
-
-
21644471547
-
Role-based delegation model/hierarchical roles (rbdm1)
-
Washington, DC, USA, IEEE Computer Society
-
E. Barka and R. Sandhu. Role-based delegation model/hierarchical roles (rbdm1). In Proceedings of the 20th Annual Computer Security Applications Conference, ACSAC '04, pages 396{404, Washington, DC, USA, 2004. IEEE Computer Society.
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference, ACSAC '04
, pp. 396-404
-
-
Barka, E.1
Sandhu, R.2
-
3
-
-
33746684330
-
Term rewriting for access control
-
S. Barker and M. Fernández. Term rewriting for access control. In DBSec, pages 179{193, 2006.
-
(2006)
DBSec
, pp. 179-193
-
-
Barker, S.1
Fernández, M.2
-
4
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
D. Basin and J. Doser. Model driven security: From UML models to access control infrastructures. ACM Transactions on Software, (1945):353{398, 2006.
-
(2006)
ACM Transactions on Software
, Issue.1945
, pp. 353-398
-
-
Basin, D.1
Doser, J.2
-
5
-
-
77953082000
-
A delegation model for extended rbac
-
June
-
M. Ben-Ghorbel-Talbi, F. Cuppens, N. Cuppens-Boulahia, and A. Bouhoula. A delegation model for extended rbac. Int. J. Inf. Secur., 9(3):209{236, June 2010.
-
(2010)
Int. J. Inf. Secur.
, vol.9
, Issue.3
, pp. 209-236
-
-
Ben-Ghorbel-talbi, M.1
Cuppens, F.2
Cuppens-Boulahia, N.3
Bouhoula, A.4
-
6
-
-
0040884892
-
A exible authorization mechanism for relational data management systems
-
E. Bertino, S. Jajodia, and P. Samarati. A exible authorization mechanism for relational data management systems. ACM Trans. Inf. Syst., 17(2):101{140, 1999.
-
(1999)
ACM Trans. Inf. Syst.
, vol.17
, Issue.2
, pp. 101-140
-
-
Bertino, E.1
Jajodia, S.2
Samarati, P.3
-
7
-
-
37849037811
-
Dynamic event-based access control as term rewriting
-
C. Bertolissi, M. Fernández, and S. Barker. Dynamic event-based access control as term rewriting. In DBSec, pages 195{210, 2007.
-
(2007)
DBSec
, pp. 195-210
-
-
Bertolissi, C.1
Fernández, M.2
Barker, S.3
-
8
-
-
33748970808
-
The Fractal component model and its support in java
-
E. Bruneton, T. Coupaye, M. Leclercq, V. Quéma, and J. Stefani. The FRACTAL Component Model and its Support in Java. Software Practice and Experience, Special Issue on Experiences with Auto-adaptive and Reconfigurable Systems, 36(11-12):1257{1284, 2006.
-
(2006)
Software Practice and Experience, Special Issue on Experiences with Auto-adaptive and Reconfigurable Systems
, vol.36
, Issue.11-12
, pp. 1257-1284
-
-
Bruneton, E.1
Coupaye, T.2
Leclercq, M.3
Quéma, V.4
Stefani, J.5
-
9
-
-
41849110585
-
Delegation in role-based access control
-
J. Crampton and H. Khambhammettu. Delegation in role-based access control. Int. J. Inf. Sec., 7(2):123{136, 2008.
-
(2008)
Int. J. Inf. Sec.
, vol.7
, Issue.2
, pp. 123-136
-
-
Crampton, J.1
Khambhammettu, H.2
-
10
-
-
20444505719
-
Mac and uml for secure software design
-
New York, NY, USA, ACM
-
T. Doan, S. Demurjian, T. C. Ting, and A. Ketterl. Mac and uml for secure software design. In FMSE '04: Proceedings of the 2004 ACM workshop on Formal methods in security engineering, pages 75{85, New York, NY, USA, 2004. ACM.
-
(2004)
FMSE '04: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering
, pp. 75-85
-
-
Doan, T.1
Demurjian, S.2
Ting, T.C.3
Ketterl, A.4
-
11
-
-
0001619596
-
Flexible support for multiple access control policies
-
S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian. Flexible support for multiple access control policies. ACM Trans. Database Syst., 26(2):214{260, 2001.
-
(2001)
ACM Trans. Database Syst.
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
12
-
-
79955163100
-
UMLsec: Extending UML for secure systems development
-
Dresden, Germany, Springer-Verlag
-
J. Jürjens. UMLsec: Extending UML for Secure Systems Development. In UML'02: 5th International Conference on The UML, pages 412{425, Dresden, Germany, 2002. Springer-Verlag.
-
(2002)
UML'02: 5th International Conference on the UML
, pp. 412-425
-
-
Jürjens, J.1
-
13
-
-
33144472884
-
Modeling role-based access control using parameterized uml models
-
D.-K. Kim, I. Ray, R. B. France, and N. Li. Modeling role-based access control using parameterized uml models. In FASE, pages 180{193, 2004.
-
(2004)
FASE
, pp. 180-193
-
-
Kim, D.-K.1
Ray, I.2
France, R.B.3
Li, N.4
-
14
-
-
84876008007
-
Xpand: A closer look at the model2text transformation language
-
(10/16/2008)
-
B. Klatt. Xpand: A closer look at the model2text transformation language. Language, (10/16/2008), 2007.
-
(2007)
Language
-
-
Klatt, B.1
-
15
-
-
79955143136
-
SecureUML: A UML-based modeling language for model-driven security
-
Dresden, Germany, Springer-Verlag
-
T. Lodderstedt, D. Basin, and J. Doser. SecureUML: A UML-Based Modeling Language for Model-Driven Security. In UML'02: 5th International Conference on The UML, pages 426{441, Dresden, Germany, 2002. Springer-Verlag.
-
(2002)
UML'02: 5th International Conference on the UML
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
17
-
-
70350345225
-
Models@ run.time to support dynamic adaptation
-
Oct.
-
B. Morin, O. Barais, J.-M. Jezequel, F. Fleurey, and A. Solberg. Models@ run.time to support dynamic adaptation. Computer, 42(10):44{51, Oct. 2009.
-
(2009)
Computer
, vol.42
, Issue.10
, pp. 44-51
-
-
Morin, B.1
Barais, O.2
Jezequel, J.-M.3
Fleurey, F.4
Solberg, A.5
-
18
-
-
70350303567
-
Taming dynamically adaptive systems with models and aspects
-
Vancouver, Canada, May
-
B. Morin, O. Barais, G. Nain, and J. Jzéquel. Taming Dynamically Adaptive Systems with Models and Aspects. In ICSE'09: 31st International Conference on Software Engineering, Vancouver, Canada, May 2009.
-
(2009)
ICSE'09: 31st International Conference on Software Engineering
-
-
Morin, B.1
Barais, O.2
Nain, G.3
Jzéquel, J.4
-
19
-
-
56649106269
-
An aspect-oriented and model-driven approach for managing dynamic variability
-
Berlin, Heidelberg, Springer-Verlag
-
B. Morin, F. Fleurey, N. Bencomo, J.-M. Jézéquel, A. Solberg, V. Dehlen, and G. Blair. An aspect-oriented and model-driven approach for managing dynamic variability. In Proceedings of the 11th international conference on Model Driven Engineering Languages and Systems, MoDELS '08, pages 782{796, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
Proceedings of the 11th International Conference on Model Driven Engineering Languages and Systems, MoDELS '08
, pp. 782-796
-
-
Morin, B.1
Fleurey, F.2
Bencomo, N.3
Jézéquel, J.-M.4
Solberg, A.5
Dehlen, V.6
Blair, G.7
-
20
-
-
78649790488
-
Security-driven model-based dynamic adaptation
-
New York, NY, USA, ACM
-
B. Morin, T. Mouelhi, F. Fleurey, Y. Le Traon, O. Barais, and J.-M. J-ez-equel. Security-driven model-based dynamic adaptation. In Proceedings of the IEEE/ACM international conference on Automated software engineering, ASE '10, pages 205{214, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, ASE '10
, pp. 205-214
-
-
Morin, B.1
Mouelhi, T.2
Fleurey, F.3
Traon, Y.L.4
Barais, O.5
Jézé quel, J.-M.6
-
21
-
-
67650163992
-
Transforming and selecting functional test cases for security policy testing
-
Washington, DC, USA, IEEE Computer Society
-
T. Mouelhi, Y. L. Traon, and B. Baudry. Transforming and selecting functional test cases for security policy testing. In Proceedings of the 2009 International Conference on Software Testing Veri-cation and Validation, ICST '09, pages 171{180, Washington, DC, USA, 2009. IEEE Computer Society.
-
(2009)
Proceedings of the 2009 International Conference on Software Testing Veri-cation and Validation, ICST '09
, pp. 171-180
-
-
Mouelhi, T.1
Traon, Y.L.2
Baudry, B.3
-
22
-
-
33646181776
-
Weaving executability into object-oriented meta-languages
-
LNCS 3713, Springer
-
P.-A. Muller, F. Fleurey, and J.-M. Jézéquel. Weaving executability into object-oriented meta-languages. In International Conference on Model Driven Engineering Languages and Systems (MoDELS), LNCS 3713, pages 264{278. Springer, 2005.
-
(2005)
International Conference on Model Driven Engineering Languages and Systems (MoDELS)
, pp. 264-278
-
-
Muller, P.-A.1
Fleurey, F.2
Jézéquel, J.-M.3
-
23
-
-
0033661308
-
Role delegation in role-based access control
-
New York, NY, USA, ACM
-
S. Na and S. Cheon. Role delegation in role-based access control. In Proceedings of the fifth ACM workshop on Role-based access control, RBAC '00, pages 39{44, New York, NY, USA, 2000. ACM.
-
(2000)
Proceedings of the Fifth ACM Workshop on Role-based Access Control, RBAC '00
, pp. 39-44
-
-
Na, S.1
Cheon, S.2
-
24
-
-
33744989032
-
Usage control: A vision for next generation access control
-
V. Gorodetsky et al. (Eds.), LNCS 2776, 1:17{31
-
R. Sandhu and J. Park. Usage control: A vision for next generation access control. V. Gorodetsky et al. (Eds.): MMM-ACNS 2003, LNCS 2776, 1:17{31, 2003.
-
(2003)
MMM-ACNS 2003
-
-
Sandhu, R.1
Park, J.2
-
25
-
-
0030086382
-
Role-based access control models
-
Feb.
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. Computer, 29(2):38{47, Feb. 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
27
-
-
0242540371
-
Pbdm: A exible delegation model in rbac
-
New York, NY, USA, ACM
-
X. Zhang, S. Oh, and R. Sandhu. Pbdm: a exible delegation model in rbac. In Proceedings of the eighth ACM symposium on Access control models and technologies, SACMAT '03, pages 149{157, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies, SACMAT '03
, pp. 149-157
-
-
Zhang, X.1
Oh, S.2
Sandhu, R.3
|