-
1
-
-
85031933412
-
Composing specifications
-
Formalisms, Correctness, Springer-Verlag
-
M. Abadi and L. Lamport. Composing Specifications. In Stepwise Refinement of Distributed Systems-Models, Formalisms, Correctness, Springer-Verlag, Vol. 430, pp. 1-41, 1989.
-
(1989)
Stepwise Refinement of Distributed Systems-Models
, vol.430
, pp. 1-41
-
-
Abadi, M.1
Lamport, L.2
-
2
-
-
84904256387
-
Protecting Deductive Databases from Unauthorized Retrievals
-
Kluwer Academic Publishers
-
S. Barker. Protecting Deductive Databases from Unauthorized Retrievals. In Data and Application Security, Development and Directions, IFIP TC11/WG11.3 14th Annual Working Conference on Database Security, Kluwer Academic Publishers, Vol. 201, pp. 185-196, 2000.
-
(2000)
Data and Application Security, Development and Directions, IFIP TC11/WG11.3 14th Annual Working Conference on Database Security
, vol.201
, pp. 185-196
-
-
Barker, S.1
-
4
-
-
0035790640
-
A logical framework for reasoning about access control models
-
May 3-4 Litton-TASC Westfields II Conference Facility Chantilly, VA, U.S.A
-
E. Bertino, B. Catania, E. Ferrari, and P. Perlasca. A Logical Framework for Reasoning about Access Control Models. In Proceedings of 6th ACM Symposium on Access Control Models and Technologies, May 3-4, 2001, Litton-TASC Westfields II Conference Facility Chantilly, VA, U.S.A.
-
(2001)
Proceedings of 6th ACM Symposium on Access Control Models and Technologies
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
5
-
-
0034446895
-
A modular approach to composing access control policies
-
Athens, Greece ACM Press
-
P. A. Bonatti, S. De Capitani di Vimercati, and P. Samarati. A Modular Approach to Composing Access Control Policies. In Proceedings of the 7th ACM conference on Computer and communications security, 164-173, Athens, Greece, 2000. ACM Press.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security
, pp. 164-173
-
-
Bonatti, P.A.1
Vimercati Di Capitani, S.D.2
Samarati, P.3
-
7
-
-
0002822343
-
A logic programming approach to conflict resolution in policy management
-
Anthony G. Cohn and Fausto Giunchiglia and Bart Selman editors Morgan Kaufmann
-
J. Chomicki, J. Lobo, and S. Naqvi A Logic Programming Approach to Conflict Resolution in Policy Management. In Anthony G. Cohn and Fausto Giunchiglia and Bart Selman editors, KR2000: Principles of Knowledge Representation and Reasoning, Morgan Kaufmann, pp. 121-132, 2000.
-
(2000)
KR2000: Principles of Knowledge Representation and Reasoning
, pp. 121-132
-
-
Chomicki, J.1
Lobo, J.2
Naqvi, S.3
-
11
-
-
0001619596
-
Flexible support for multiple access control policies
-
S. Jajodia, P. Samarati, M.L. Sapino, and V.S. Subrahmanian. Flexible Support for Multiple Access Control Policies. In ACM Transactions on Database Systems, 26:2, pp. 214-260, 2001.
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
12
-
-
0035790747
-
On the specification and evolution of access control policies
-
Chantilly, Virginia, USA
-
M. Koch, L. Mancini, and F. Parisi-Presicce. On the Specification and Evolution of Access Control Policies. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT-01), Chantilly, Virginia, USA, pp. 121-130, 2001.
-
(2001)
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT-01)
, pp. 121-130
-
-
Koch, M.1
Mancini, L.2
Parisi-Presicce, F.3
-
13
-
-
0030086382
-
Role-based access control models
-
February
-
R. Sandhu et al. Role-Based Access Control Models. In IEEE Computer, pp. 38-47, February 1996.
-
(1996)
IEEE Computer
, pp. 38-47
-
-
Sandhu, R.1
-
14
-
-
0033652039
-
The NIST model for role-based access control: Towards a unified standard
-
Berlin, Germany
-
R. Sandhu, D. Ferraiolo and R. Kuhn. The NIST Model for Role-Based Access Control: Towards a Unified Standard. In 5th ACM Workshop on Role-Based Access Control, Berlin, Germany, pp. 47-63, 2000.
-
(2000)
5th ACM Workshop on Role-Based Access Control
, pp. 47-63
-
-
Sandhu, R.1
Ferraiolo, D.2
Kuhn, R.3
|