-
1
-
-
0016984825
-
Protection in operating systems
-
M. A. Harrison, W. L. Ruzzo, and J. D. Ullman, "Protection in operating systems, " Communications of the ACM, vol. 19, no. 8, pp. 461-471, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
2
-
-
0017512599
-
A linear time algorithm for deciding subject security
-
R. J. Lipton and L. Snyder, "A linear time algorithm for deciding subject security, " Journal of the ACM, vol. 24, no. 3, pp. 455-464, 1977.
-
(1977)
Journal of the ACM
, vol.24
, Issue.3
, pp. 455-464
-
-
Lipton, R.J.1
Snyder, L.2
-
3
-
-
0030365407
-
The expressive power of multi-parent creation in monotonic access control models
-
P. Ammann, R. J. Lipton, and R. S. Sandhu, "The expressive power of multi-parent creation in monotonic access control models, " Journal of Computer Security, vol. 4, no. 2/3, pp. 149-166, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, Issue.2-3
, pp. 149-166
-
-
Ammann, P.1
Lipton, R.J.2
Sandhu, R.S.3
-
4
-
-
0034823078
-
A state-transition model of trust management and access control
-
A. Chander, J. C. Mitchell, and D. Dean, "A state-transition model of trust management and access control, " in CSFW. IEEE Computer Society, 2001, pp. 27-43.
-
(2001)
CSFW. IEEE Computer Society
, pp. 27-43
-
-
Chander, A.1
Mitchell, J.C.2
Dean, D.3
-
5
-
-
33847356528
-
A theory for comparing the expressive power of access control models
-
M. V. Tripunitara and N. Li, "A theory for comparing the expressive power of access control models, " Journal of Computer Security, vol. 15, no. 2, pp. 231-272, 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.2
, pp. 231-272
-
-
Tripunitara, M.V.1
Li, N.2
-
6
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
May
-
S. Osborne, R. Sandhu, and Q. Munawer, "Configuring role-based access control to enforce mandatory and discretionary access control policies, " ACM Transactions on Information and System Security, vol. 3, no. 2, pp. 85-106, May 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborne, S.1
Sandhu, R.2
Munawer, Q.3
-
7
-
-
84974744165
-
Expressive power of the schematic protection model
-
R. Sandhu, "Expressive power of the schematic protection model, " Journal of Computer Security, vol. 1, no. 1, pp. 59-98, 1992.
-
(1992)
Journal of Computer Security
, vol.1
, Issue.1
, pp. 59-98
-
-
Sandhu, R.1
-
9
-
-
0041524664
-
A logical framework for reasoning about access control models
-
E. Bertino, B. Catania, E. Ferrari, and P. Perlasca, "A logical framework for reasoning about access control models, " ACM Transactions on Information and System Security, vol. 6, no. 1, pp. 71-127, 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
, pp. 71-127
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
10
-
-
84863962705
-
Networking to enable coalition operations
-
U. S. Air Force Scientific Advisory Board
-
U. S. Air Force Scientific Advisory Board, "Networking to enable coalition operations, " MITRE Corporation, Tech. Rep., 2004.
-
(2004)
MITRE Corporation, Tech. Rep.
-
-
-
11
-
-
84884999344
-
-
T. L. Hinrichs, D. Martinoia, W. C. Garrison III, A. J. Lee, A. Panebianco, and L. Zuck, "Application-Sensitive Access Control Evaluation using Parameterized Expressiveness (Extended Version), " http://people. cs. pitt. edu/adamlee/pubs/2013/ hinrichs2013applicationsensitive-long. pdf, 2013.
-
(2013)
Application-Sensitive Access Control Evaluation Using Parameterized Expressiveness (Extended Version)
-
-
Hinrichs, T.L.1
Martinoia, D.2
Garrison III, W.C.3
Lee, A.J.4
Panebianco, A.5
Zuck, L.6
-
12
-
-
33845437573
-
Horizontal integration: Broader access models for realizing information dominance
-
Dec.
-
"Horizontal integration: Broader access models for realizing information dominance, " MITRE Corporation JASON Program Office, Tech. Rep. JSR-04-13, Dec. 2004.
-
(2004)
MITRE Corporation JASON Program Office, Tech. Rep. JSR-04-13
-
-
-
15
-
-
30544438141
-
Beyond proof-ofcompliance: Security analysis in trust management
-
N. Li, J. C. Mitchell, and W. H. Winsborough, "Beyond proof-ofcompliance: security analysis in trust management, " Journal of the ACM, vol. 52, no. 3, pp. 474-514, 2005.
-
(2005)
Journal of the ACM
, vol.52
, Issue.3
, pp. 474-514
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
16
-
-
52049125054
-
A natural axiomatization of computability and proof of Church's thesis
-
N. Dershowitz and Y. Gurevich, "A natural axiomatization of computability and proof of Church's thesis, " Bulletin of Symbolic Logic, vol. 14, no. 3, pp. 299-350, 2008.
-
(2008)
Bulletin of Symbolic Logic
, vol.14
, Issue.3
, pp. 299-350
-
-
Dershowitz, N.1
Gurevich, Y.2
|