-
2
-
-
0032218233
-
History-based Access Control for Mobile Code
-
San Francisco, CA, November
-
G. Edjlali, A. Acharya, and V. Chaudhary. History-based Access Control for Mobile Code. In Proceedings of the 5th ACM Conference on Computer and Communications Security, San Francisco, CA, November 1998.
-
(1998)
Proceedings of the 5th ACM Conference On Computer and Communications Security
-
-
Edjlali, G.1
Acharya, A.2
Chaudhary, V.3
-
3
-
-
18944390941
-
-
IEEE Transactions on Software Engineering, May
-
G.J. Holzmann. The Model Checker Spin. IEEE Transactions on Software Engineering, Vol. 23, No.5, pp. 279-295, May 1997. See also http://cm.bell-labs.com/cm/cs/what/spin/.
-
(1997)
The Model Checker Spin
, vol.23
, Issue.5
, pp. 279-295
-
-
Holzmann, G.J.1
-
5
-
-
84953747276
-
-
Sun Microsystems
-
JDBC Data Access API. http://java.sun.com/products/jdbc/, Sun Microsystems, 2000.
-
(2000)
JDBC Data Access API
-
-
-
7
-
-
84961746606
-
Tools to Support Secure Enterprise Computing
-
Phoenix, Arizona, December
-
M. H. Kang, B. J. Eppinger, and J. N. Froscher. Tools to Support Secure Enterprise Computing. In Proceedings of 15th Annual Computer Security Applications Conference, Phoenix, Arizona, December 1999.
-
(1999)
Proceedings of 15th Annual Computer Security Applications Conference
-
-
Kang, M.H.1
Eppinger, B.J.2
Froscher, J.N.3
-
8
-
-
84958973327
-
A Multilevel Secure Workflow Management System
-
Heidelberg, Germany, June
-
M. H. Kang, J. N. Froscher, A. P. Sheth, K. J. Kochut, and J. A. Miller. A Multilevel Secure Workflow Management System. In Proceedings of the 11th Conference on Advanced Information Systems Engineering, Heidelberg, Germany, June 1999.
-
(1999)
Proceedings of the 11th Conference On Advanced Information Systems Engineering
-
-
Kang, M.H.1
Froscher, J.N.2
Sheth, A.P.3
Kochut, K.J.4
Miller, J.A.5
-
9
-
-
0035790711
-
Access Control Mechanisms for Inter-organizational Workflow
-
Chantilly, Virginia, May
-
M. H. Kang, J. S. Park, and J. N. Froscher. Access Control Mechanisms for Inter-organizational Workflow. In Proceedings of 6th ACM Symposium on Access Control Model and Technologies (SACMAT), Chantilly, Virginia, May 2001.
-
(2001)
Proceedings of 6th ACM Symposium On Access Control Model and Technologies (SACMAT
-
-
Kang, M.H.1
Park, J.S.2
Froscher, J.N.3
-
10
-
-
0043262405
-
ORBWork: A CORBA-Based Fully Distributed, Scalable and Dynamic Workflow Enactment Service for METEOR
-
Technical Report, Department of Computer Science, University of Georgia
-
K. Kochut, A. Sheth, and J. Miller. ORBWork: A CORBA-Based Fully Distributed, Scalable and Dynamic Workflow Enactment Service for METEOR. UGA-CS-TR-98-006, Technical Report, Department of Computer Science, University of Georgia, 1998.
-
(1998)
UGA-CS-TR-98-006
-
-
Kochut, K.1
Sheth, A.2
Miller, J.3
-
11
-
-
84904260492
-
-
IONA
-
Orbix 3. http://www.iona.com/products/orbix3_home.htm, IONA, 2000.
-
(2000)
Orbix 3
-
-
-
14
-
-
0034229770
-
-
IEEE Internet Computing, July-August
-
J. S. Park and R. S. Sandhu. Secure Cookies on the Web. IEEE Internet Computing, Vol. 4, No. 4, pp. 36-44, July-August 2000.
-
Secure Cookies On the Web
, vol.4
, Issue.4
, pp. 36-44
-
-
Park, J.S.1
Sandhu, R.S.2
-
16
-
-
84994391858
-
Role-based Access Control on the Web
-
February
-
J. S. Park, R. S. Sandhu, and G. J. Ahn. Role-based Access Control on the Web. ACM Transactions on Information and System Security (TISSEC), Vol. 4, No. 1, February 2001.
-
(2001)
ACM Transactions On Information and System Security (TISSEC
, vol.4
, Issue.1
-
-
Park, J.S.1
Sandhu, R.S.2
Ahn, G.J.3
-
18
-
-
0030086382
-
-
IEEE Computer, February
-
R. S. Sandhu, E. J. Coyne, H. Feinstein, and C. Youman. Role-based Access Control Models. IEEE Computer, Vol. 29, No. 2, pp. 38-47, February 1996.
-
(1996)
Role-based Access Control Models
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.3
Youman, C.4
-
20
-
-
84904247264
-
-
Phaos SSLava, Phaos Technology
-
Phaos SSLava. http://www.phaos.com/e_security/prod-ssl.html, Phaos Technology, 2000.
-
(2000)
-
-
|