-
1
-
-
0003619725
-
-
C. Alberts, S. Behrens, R. Pethia, and W. Wilson. Operationally critical threat, asset, and vulnerability evaluation (octave), 1999.
-
(1999)
Operationally Critical Threat, Asset, and Vulnerability Evaluation (octave)
-
-
Alberts, C.1
Behrens, S.2
Pethia, R.3
Wilson, W.4
-
3
-
-
84893077785
-
Obligation monitoring in policy management
-
Proc. 3rd International Workshop on 2002
-
C. Bettini, S. Jajodia, X. Wang, and D. Wijesekera. Obligation monitoring in policy management. In Policies for Distributed Systems and Networks, 2002. Proc. 3rd International Workshop on, pp. 2-12, 2002.
-
(2002)
Policies for Distributed Systems and Networks
, pp. 2-12
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.3
Wijesekera, D.4
-
4
-
-
56749093226
-
Insider threat detection using situation-aware mas
-
2008 11th International Conf. on
-
J. Buford, L. Lewis, and G. Jakobson. Insider threat detection using situation-aware mas. In Information Fusion, 2008 11th International Conf. on, pp. 1-8, 2008.
-
(2008)
Information Fusion
, pp. 1-8
-
-
Buford, J.1
Lewis, L.2
Jakobson, G.3
-
6
-
-
84857844113
-
A survey on trust management for mobile ad hoc networks
-
IEEE
-
J.-H. Cho, A. Swami, and I.-R. Chen. A survey on trust management for mobile ad hoc networks. Communications Surveys Tutorials, IEEE, 13(4):562-583, 2011.
-
(2011)
Communications Surveys Tutorials
, vol.13
, Issue.4
, pp. 562-583
-
-
Cho, J.-H.1
Swami, A.2
Chen, I.-R.3
-
7
-
-
84864037216
-
Ensuring authorization privileges for cascading user obligations
-
SACMAT '12
-
O. Chowdhury, M. Pontual, W. H. Winsborough, T. Yu, K. Irwin, and J. Niu. Ensuring authorization privileges for cascading user obligations. In Proc. of the 17th ACM symposium on Access Control Models and Technologies, SACMAT '12, pp. 33-44, 2012.
-
(2012)
Proc. of the 17th ACM Symposium on Access Control Models and Technologies
, pp. 33-44
-
-
Chowdhury, O.1
Pontual, M.2
Winsborough, W.H.3
Yu, T.4
Irwin, K.5
Niu, J.6
-
8
-
-
84992227458
-
Proposed nist standard for role-based access control
-
D. F. Ferraiolo, R. Sandhu, S. Gavrila, D. R. Kuhn, and R. Chandramouli. Proposed nist standard for role-based access control. ACM Trans. Inf. Syst. Secur., 4:224-274, 2001.
-
(2001)
ACM Trans. Inf. Syst. Secur.
, vol.4
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
11
-
-
84878473144
-
-
K. L. F. D.
-
F. Greitzer, P. Paulson, K. L., L. Franklin, T. Edgar, and F. D. Predictive modeling for insider threat mitigation, 2009.
-
(2009)
Predictive Modeling for Insider Threat Mitigation
-
-
Greitzer, F.1
Paulson, P.2
Franklin, L.3
Edgar, T.4
-
13
-
-
44149127452
-
Assigning responsibility for failed obligations
-
K. Irwin, T. Yu, and W. Winsborough. Assigning responsibility for failed obligations. In Trust Management II, pp. 327-342, 2008.
-
(2008)
Trust Management II
, pp. 327-342
-
-
Irwin, K.1
Yu, T.2
Winsborough, W.3
-
15
-
-
84893405732
-
Data clustering: A review
-
A. K. Jain, M. N. Murty, and P. J. Flynn. Data clustering: a review. ACM Comput. Surv., 31(3):264-323, 1999.
-
(1999)
ACM Comput. Surv.
, vol.31
, Issue.3
, pp. 264-323
-
-
Jain, A.K.1
Murty, M.N.2
Flynn, P.J.3
-
24
-
-
84861100364
-
Dynamic risk-based decision methods for access control systems
-
R. Shaikh, K. Adi, and L. Logrippo. Dynamic risk-based decision methods for access control systems. Computers and Security, 31(4):447-464, 2012.
-
(2012)
Computers and Security
, vol.31
, Issue.4
, pp. 447-464
-
-
Shaikh, R.1
Adi, K.2
Logrippo, L.3
-
26
-
-
33646831908
-
Trustguard: Countering vulnerabilities in reputation management for decentralized overlay networks
-
WWW '05
-
M. Srivatsa, L. Xiong, and L. Liu. Trustguard: countering vulnerabilities in reputation management for decentralized overlay networks. In Proc. of the 14th international conf. on World Wide Web, WWW '05, pp. 422-431, 2005.
-
(2005)
Proc. of the 14th International Conf. on World Wide Web
, pp. 422-431
-
-
Srivatsa, M.1
Xiong, L.2
Liu, L.3
-
28
-
-
57349156959
-
Uaq: A framework for user authorization query processing in rbac extended with hybrid hierarchy and constraints
-
SACMAT '08
-
Y. Zhang and J. B. D. Joshi. Uaq: a framework for user authorization query processing in rbac extended with hybrid hierarchy and constraints. In Proc. of the 13th ACM SACMAT, SACMAT '08, pp. 83-92, 2008.
-
(2008)
Proc. of the 13th ACM SACMAT
, pp. 83-92
-
-
Zhang, Y.1
Joshi, J.B.D.2
-
30
-
-
84887367019
-
Criterion functions for document clustering experiments and analysis
-
Y. Zhao and G. Karypis. Criterion functions for document clustering experiments and analysis. Mach. Learn., 55(3), 2002.
-
(2002)
Mach. Learn.
, vol.55
, Issue.3
-
-
Zhao, Y.1
Karypis, G.2
|