-
2
-
-
0003400251
-
Secure computer systems : Unified exposition and multics interpretation
-
MTR-2997, MITRE, Bedford, Mass
-
D. Bell, L. LaPadula : "Secure Computer Systems : Unified Exposition and Multics Interpretation". Technical Report ESD-TR-75-306, MTR-2997, MITRE, Bedford, Mass, 1975.
-
(1975)
Technical Report ESD-TR-75-306
-
-
Bell, D.1
Lapadula, L.2
-
3
-
-
0003400255
-
Integrity considerations for secure computer systems
-
Hanscom AFB, Bedford, MA (Apr
-
K. Biba : "Integrity Considerations for Secure Computer Systems", ESD-TR-76-372, ESD/AFSC, Hanscom AFB, Bedford, MA (Apr. 1977)
-
(1977)
ESD-TR-76-372, ESD/AFSC
-
-
Biba, K.1
-
5
-
-
84992227458
-
Proposed nist standard for role-based access control
-
AoCtt
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R Kuhn, R Chandramouli : "Proposed NIST Standard for Role-Based Access Control". ACM Transactions on Information and System Security, 4(3):222-274, AoCtt 200 1.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 222-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
6
-
-
0031387996
-
TMAC: A primitive for applying rbac in collaborative environments
-
Fairfax, Virginia, USA, 6-7 Novembre
-
RK. Thomas : "TMAC: A primitive for Applying RBAC in collaborative environments". 2nd ACM, Workshop on RBAC, pages 13-19, Fairfax, Virginia, USA, 6-7 Novembre 1997.
-
(1997)
2nd ACM, Workshop on RBAC
, pp. 13-19
-
-
Thomas, R.K.1
-
7
-
-
0002841051
-
Task-based authorization controls (tbac): A family of models for active and enterprise-oriented authorization management
-
Lake Tahoe, California, USA
-
RK. Thomas, R Sandhu : "Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management". 1 1th IFIP Working Conference on Database Security, Lake Tahoe, California, USA, 1997.
-
(1997)
11th IFIP Working Conference on Database Security
-
-
Thomas, R.K.1
Sandhu, R.2
-
8
-
-
33744989032
-
Usage control: A vision for next generation access control
-
R Sandhu, J. Park : "Usage Control: A Vision for Next Generation Access Control". MMM-ACNS 2003.
-
(2003)
MMM-ACNS
-
-
Sandhu, R.1
Park, J.2
-
9
-
-
0242625192
-
A stratification-based approach for handling conflicts in access control
-
Lake Come, Italy, June
-
S. Benferhat, R EI Baida, F. Cuppens : "A Stratification-Based Approach for Handling Conflicts in Access Control". 8th ACM Symposium on Access Control Models and Technologies (SACMAT'03), Lake Come, Italy, June 2003.
-
(2003)
8th ACM Symposium on Access Control Models and Technologies (SACMAT'03
-
-
Benferhat, S.1
Baida, R.E.I.2
Cuppens, F.3
-
10
-
-
77952407814
-
Organization based access control
-
Lake Come, Italy, June
-
A. Abou EI Kalam, R. EI Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miege, c. Saure, G. Trouessin : "Organization Based Access Control". 4th InternationalWorkshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Come, Italy, June 2003.
-
(2003)
4th InternationalWorkshop on Policies for Distributed Systems and Networks (POLICY 2003
-
-
Abou, E.I.1
Kalam, A.2
Baida, R.E.I.3
Balbiani, P.4
Benferhat, S.5
Cuppens, F.6
Deswarte, Y.7
Miege, A.8
Saure, C.9
Trouessin, G.10
-
13
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
IEEE, Oakland, CA April
-
D. Clark, D. Wilson : "A Comparison of Commercial and Military Computer Security Policies". 1987 IEEE Symposium on Security and Privacy, IEEE, Oakland, CA, pp. 184-194, April 1987.
-
(1987)
1987 IEEE Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.1
Wilson, D.2
-
15
-
-
84255207716
-
Supporting mUltiple levels of criticality
-
Munich, Germany, June
-
E. Totel, J. P. Blanquart, Y. Deswarte, D. Powell : "Supporting mUltiple levels of criticality". 28th IEEE Fault Tolerant Computing Symposium, Munich, Germany, June 1998.
-
(1998)
28th IEEE Fault Tolerant Computing Symposium
-
-
Totel, E.1
Blanquart, J.P.2
Deswarte, Y.3
Powell, D.4
-
16
-
-
84883058608
-
Critical infrastructures security modeling, enforcement and runtime checking
-
Rome, Italy, Oct. 13-15
-
A. Abou EI Kalam, Y. Deswarte : "Critical infrastructures Security Modeling, enforcement and runtime checking". 3rd InternationalWorkshop, CRITIS 2008, Rome, Italy, Oct. 13-15,2008.
-
(2008)
3rd InternationalWorkshop, CRITIS
-
-
Abou, E.I.1
Kalam, A.2
Deswarte, Y.3
-
17
-
-
71949097552
-
Polyorbac: A security framework for critical infrastructures
-
December LNCS
-
A. Abou EI Kalam, Y. Deswarte, A. Barna, M. Kaiiniche : "PolyOrBAC: A Security Framework for Critical Infrastructures". International Journal on Critical Infrastructure Protection, Elsevier, vol. 2(4), December 2009, 37pp, LNCS.
-
(2009)
International Journal on Critical Infrastructure Protection, Elsevier
, vol.2
, Issue.4
, pp. 37
-
-
Abou, E.I.1
Kalam, A.2
Deswarte, Y.3
Barna, A.4
Kaiiniche, M.5
-
20
-
-
84883096028
-
Multi-orbac: A new access control model for distributed, heterogeneous and collaborative systems
-
Sao Paulo, Bresil, 8-10 novembre
-
A. Abou EI Kalam, Y. Deswarte : "Multi-OrBAC: A New Access Control Model for Distributed, Heterogeneous and Collaborative Systems". 8th IEEE International Symposium on Systems and Information Security (SSI 2006), Sao Paulo, Bresil, 8-10 novembre 2006.
-
(2006)
8th IEEE International Symposium on Systems and Information Security (SSI 2006
-
-
Abou, E.I.1
Kalam, A.2
Deswarte, Y.3
-
21
-
-
84883131561
-
A collaborative access control framework for critical infrastructures
-
Ed. Mauricio Papa & Sujeet Shenoi, 2nd Annual IFIP 1 1. 10 Conference on Critical Infrastructure Protection, 16-19 mars Arlington (VA USA)
-
A. Barna, A. Abou EI Kalam, Y. Deswarte, M. Kaiiniche, "A Collaborative Access Control Framework for Critical Infrastructures", Critical Infrastructure Protection IT, Ed. Mauricio Papa & Sujeet Shenoi, 2nd Annual IFIP 1 1. 10 Conference on Critical Infrastructure Protection, 16-19 mars 2008, Arlington (VA USA).
-
(2008)
Critical Infrastructure Protection IT
-
-
Barna, A.1
Abou, E.I.2
Kalam, A.3
Deswarte, Y.4
Kaiiniche, M.5
-
22
-
-
84867086296
-
Access control policy: A framework to enforce recommendations
-
N. Essaouini, A. Abou EI Kalam, A. Ait Ouahman: " Access Control Policy: A Framework to Enforce Recommendations", International Journal of Computer Science and Information Technologies (UCSIT), Vol. 2 (5), 20 1 1, 2452-2463.
-
(2011)
International Journal of Computer Science and Information Technologies (UCSIT)
, vol.2
, Issue.5
, pp. 2452-2463
-
-
Essaouini, N.1
Abou, E.I.2
Kalam, A.3
Ait Ouahman, A.4
|