-
1
-
-
84936873422
-
Model-based risk assessment to improve enterprise security
-
J.O. Aagedal, F.d. Braber, T. Dimitrakos, B.A. Gran, D. Raptis, and K. Stølen Model-based risk assessment to improve enterprise security Proceedings of the 6th International enterprise distributed object computing conference 2002 51
-
(2002)
Proceedings of the 6th International Enterprise Distributed Object Computing Conference
, pp. 51
-
-
Aagedal, J.O.1
Braber, F.D.2
Dimitrakos, T.3
Gran, B.A.4
Raptis, D.5
Stølen, K.6
-
3
-
-
0003619725
-
-
URL
-
C. Alberts, S. Behrens, R. Pethia, and W. Wilson Operationally critical threat, asset, and vulnerability evaluation (octave) 1999 URL http://www.cert.org/octave
-
(1999)
Operationally Critical Threat, Asset, and Vulnerability Evaluation (Octave)
-
-
Alberts, C.1
Behrens, S.2
Pethia, R.3
Wilson, W.4
-
4
-
-
33747817026
-
Reconfiguring Role Based Access Control policies using risk semantics
-
B. Aziz, S.N. Foley, J. Herbert, and G. Swart Reconfiguring role based access control policies using risk semantics Journal of High Speed Networks: Special Issue on Managing Security Policies, Modelling Verification and Configuration 15 3 2006 261 273 (Pubitemid 44285876)
-
(2006)
Journal of High Speed Networks
, vol.15
, Issue.3
, pp. 261-273
-
-
Aziz, B.1
Foley, S.N.2
Herbert, J.3
Swart, G.4
-
5
-
-
84864066552
-
A trust-and-risk aware RBAC framework: Tackling insider threat
-
ACM New York, NY, USA 10.1145/2295136.2295168
-
N. Baracaldo, and J. Joshi A trust-and-risk aware RBAC framework: tackling insider threat Proceedings of the 17th ACM symposium on access control models and technologies, SACMAT'12 2012 ACM New York, NY, USA 167 176 10.1145/2295136.2295168 http://doi.acm.org/10.1145/2295136.2295168
-
(2012)
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, SACMAT'12
, pp. 167-176
-
-
Baracaldo, N.1
Joshi, J.2
-
6
-
-
84883108231
-
Beyond accountability: Using obligations to reduce risk exposure and deter insider attacks
-
Amsterdam The Netherlands 10.1145/2462410.2462411
-
N. Baracaldo, and J. Joshi Beyond accountability: using obligations to reduce risk exposure and deter insider attacks ACM symposium on access control models and technologies (SACMAT) 2013 Amsterdam The Netherlands 213 224 10.1145/2462410.2462411 http://doi.acm.org/10.1145/2462410.2462411
-
(2013)
ACM Symposium on Access Control Models and Technologies (SACMAT)
, pp. 213-224
-
-
Baracaldo, N.1
Joshi, J.2
-
7
-
-
33846299959
-
Intrusion detection in RBAC-administered databases
-
DOI 10.1109/CSAC.2005.33, 1565245, Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005
-
E. Bertino, E. Terzi, A. Kamra, and A. Vakali Intrusion detection in RBAC-administered databases Computer security applications conference, 21st annual 2005 170 182 10.1109/CSAC.2005.33 (Pubitemid 46116474)
-
(2005)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, vol.2005
, pp. 170-179
-
-
Bertino, E.1
Kamra, A.2
Terzi, E.3
Vakali, A.4
-
10
-
-
0034314077
-
Secure databases: Constraints, inference channels, and monitoring disclosures
-
DOI 10.1109/69.895801
-
A. Brodsky, C. Farkas, and S. Jajodia Secure databases: constraints, inference channels, and monitoring disclosures Knowledge and Data Engineering, IEEE Transactions on 12 6 2000 900 919 10.1109/69.895801 (Pubitemid 32130742)
-
(2000)
IEEE Transactions on Knowledge and Data Engineering
, vol.12
, Issue.6
, pp. 900-919
-
-
Brodsky, A.1
Farkas, C.2
Jajodia, S.3
-
12
-
-
79151475857
-
A risk management approach to RBAC
-
E. Celikel, M. Kantarcioglu, X. Li, and E. Bertino A risk management approach to RBAC Risk and Decision Analysis 1 2 2009 21 33
-
(2009)
Risk and Decision Analysis
, vol.1
, Issue.2
, pp. 21-33
-
-
Celikel, E.1
Kantarcioglu, M.2
Li, X.3
Bertino, E.4
-
13
-
-
33748081445
-
TrustBAC - Integrating trust relationships into the RBAC model for access control in open systems
-
SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
-
S. Chakraborty, and I. Ray Trustbac: integrating trust relationships into the RBAC model for access control in open systems Proceedings of the eleventh ACM symposium on access control models and technologies, SACMAT'06 2006 ACM New York, NY, USA 49 58 10.1145/1133058.1133067 http://doi.acm.org/10.1145/1133058. 1133067 (Pubitemid 44300741)
-
(2006)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, vol.2006
, pp. 49-58
-
-
Chakraborty, S.1
Ray, I.2
-
14
-
-
46649105922
-
Protection of database security via collaborative inference detection
-
10.1109/TKDE.2007.190642
-
Y. Chen, and W. Chu Protection of database security via collaborative inference detection Knowledge and Data Engineering, IEEE Transactions on 20 8 2008 1013 1027 10.1109/TKDE.2007.190642
-
(2008)
Knowledge and Data Engineering, IEEE Transactions on
, vol.20
, Issue.8
, pp. 1013-1027
-
-
Chen, Y.1
Chu, W.2
-
17
-
-
84888856937
-
-
CPN CPN tools 2013 http://cpntools.org/
-
(2013)
CPN Tools
-
-
-
18
-
-
36949040331
-
Using conceptual graphs to represent database inference security analysis
-
H.S. Delugach, and T.H. Hinke Using conceptual graphs to represent database inference security analysis Journal of Computing and Information Technology 4 4 1994 291 307 http://www.cs.uah.edu/delugach/publications.html
-
(1994)
Journal of Computing and Information Technology
, vol.4
, Issue.4
, pp. 291-307
-
-
Delugach, H.S.1
Hinke, T.H.2
-
20
-
-
56349127520
-
A trust and context based access control model for distributed systems
-
IEEE Computer Society Washington, DC, USA 10.1109/HPCC.2008.37
-
F. Feng, C. Lin, D. Peng, and J. Li A trust and context based access control model for distributed systems Proceedings of the 2008 10th IEEE International conference on high performance computing and communications, HPCC'08 2008 IEEE Computer Society Washington, DC, USA 629 634 10.1109/HPCC.2008.37 http://dx.doi.org/10.1109/HPCC.2008.37
-
(2008)
Proceedings of the 2008 10th IEEE International Conference on High Performance Computing and Communications, HPCC'08
, pp. 629-634
-
-
Feng, F.1
Lin, C.2
Peng, D.3
Li, J.4
-
21
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
D.F. Ferraiolo, R. Sandhu, S. Gavrila, D.R. Kuhn, and R. Chandramouli Proposed NIST standard for role-based access control ACM Transactions on Information and System Security 4 2001 224 274
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
22
-
-
84864046807
-
Surviving insider attacks: A call for system experiments
-
S.J. Stolfo, S.M. Bellovin, A.D. Keromytis, S. Hershkop, S.W. Smith, S. Sinclair, Advances in information security Springer US 10.1007/978-0-387-77322- 3-9
-
V.D. Gligor, and C.S. Chandersekaran Surviving insider attacks: a call for system experiments S.J. Stolfo, S.M. Bellovin, A.D. Keromytis, S. Hershkop, S.W. Smith, S. Sinclair, Insider attack and Cyber security Advances in information security vol. 39 2008 Springer US 153 164 10.1007/978-0-387-77322-3- 9 http://dx.doi.org/10.1007/978-0-387-77322-3-9
-
(2008)
Insider Attack and Cyber Security
, vol.39
, pp. 153-164
-
-
Gligor, V.D.1
Chandersekaran, C.S.2
-
24
-
-
0343144868
-
Coloured petri nets
-
W. Brauer, W. Reisig, G. Rozenberg, Lecture notes in computer science Springer Berlin Heidelberg 10.1007/BFb0046842
-
K. Jensen Coloured petri nets W. Brauer, W. Reisig, G. Rozenberg, Petri nets: central models and their properties Lecture notes in computer science vol. 254 1987 Springer Berlin Heidelberg 248 299 10.1007/BFb0046842 http://dx.doi.org/10.1007/BFb0046842
-
(1987)
Petri Nets: Central Models and Their Properties
, vol.254
, pp. 248-299
-
-
Jensen, K.1
-
25
-
-
78549269431
-
Risk analysis in access control systems
-
10.1109/PST.2010.5593248
-
J. Ma, K. Adi, M. Mejri, and L. Logrippo Risk analysis in access control systems Privacy security and trust (PST), 2010 Eighth annual international conference on 2010 160 166 10.1109/PST.2010.5593248
-
(2010)
Privacy Security and Trust (PST), 2010 Eighth Annual International Conference on
, pp. 160-166
-
-
Ma, J.1
Adi, K.2
Mejri, M.3
Logrippo, L.4
-
29
-
-
84864069112
-
-
Oracle Application access controls governor 2012 http://www.oracle.com/ us/solutions/corporate-governance/access-controls/index.html
-
(2012)
Application Access Controls Governor
-
-
-
30
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
Q.M.S. Osborn, and R. Sandhu Configuring role-based access control to enforce mandatory and discretionary access control policies ACM Transaction on information and system security 2000
-
(2000)
ACM Transaction on Information and System Security
-
-
Osborn, Q.M.S.1
Sandhu, R.2
-
31
-
-
80455173614
-
An approach to access control under uncertainty
-
10.1109/ARES.2011.11
-
F. Salim, J. Reid, E. Dawson, and U. Dulleck An approach to access control under uncertainty Availability, reliability and security (ARES), 2011 Sixth International conference on 2011 1 8 10.1109/ARES.2011.11
-
(2011)
Availability, Reliability and Security (ARES), 2011 Sixth International Conference on
, pp. 1-8
-
-
Salim, F.1
Reid, J.2
Dawson, E.3
Dulleck, U.4
-
33
-
-
84864046808
-
-
SAP Access risk management 2012 http://www.sap.com/solutions/ sapbusinessobjects/large/governance-risk-compliance/accessandauthorization/ index.epx
-
(2012)
Access Risk Management
-
-
-
36
-
-
70350423179
-
An efficient framework for user authorization queries in RBAC systems
-
G.T. Wickramaarachchi, W.H. Qardaji, and N. Li An efficient framework for user authorization queries in RBAC systems Proc. of the 14th ACM SACMAT technologies, SACMAT'09, ACM 2009 23 32
-
(2009)
Proc. of the 14th ACM SACMAT Technologies, SACMAT'09, ACM
, pp. 23-32
-
-
Wickramaarachchi, G.T.1
Qardaji, W.H.2
Li, N.3
|