-
1
-
-
33750534177
-
Towards secure information sharing using role-based delegation
-
Ahn, G.-J., Mohan, B., Hong, S.-P.: Towards secure information sharing using role-based delegation. J. Netw. Comput. Appl. 30(1), 42-59 (2007)
-
(2007)
J. Netw. Comput. Appl
, vol.30
, Issue.1
, pp. 42-59
-
-
Ahn, G.-J.1
Mohan, B.2
Hong, S.-P.3
-
3
-
-
33746684330
-
Term rewriting for access control
-
Barker, S., Fernández, M.: Term rewriting for access control. In: DBSec, pp. 179-193 (2006)
-
(2006)
Dbsec
, pp. 179-193
-
-
Barker, S.1
Fernández, M.2
-
4
-
-
33745471209
-
Model Driven Security: From UML models to access control infrastructures
-
Basin, D., Doser, J., Lodderstedt, T.: Model Driven Security: From UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol. 15(1), 39-91 (2006)
-
(2006)
ACM Trans. Softw. Eng. Methodol
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
5
-
-
77953082000
-
A delegation model for extended RBAC
-
Ben-Ghorbel-Talbi, M., Cuppens, F., Cuppens-Boulahia, N., Bouhoula, A.: A delegation model for extended RBAC. Int. J. Inf. Secur. 9(3), 209-236 (2010)
-
(2010)
Int. J. Inf. Secur
, vol.9
, Issue.3
, pp. 209-236
-
-
Ben-Ghorbel-Talbi, M.1
Cuppens, F.2
Cuppens-Boulahia, N.3
Bouhoula, A.4
-
6
-
-
0040884892
-
A flexible authorization mechanism for relational data management systems
-
Bertino, E., Jajodia, S., Samarati, P.: A flexible authorization mechanism for relational data management systems. ACM Trans. Inf. Syst. 17(2), 101-140 (1999)
-
(1999)
ACM Trans. Inf. Syst
, vol.17
, Issue.2
, pp. 101-140
-
-
Bertino, E.1
Jajodia, S.2
Samarati, P.3
-
7
-
-
37849037811
-
Dynamic event-based access control as term rewriting
-
Bertolissi, C., Fernández, M., Barker, S.: Dynamic event-based access control as term rewriting. In: DBSec, pp. 195-210 (2007)
-
(2007)
Dbsec
, pp. 195-210
-
-
Bertolissi, C.1
Fernández, M.2
Barker, S.3
-
8
-
-
33748970808
-
The Fractal component model and its support in Java. Software Practice and Experience
-
Bruneton, E., Coupaye, T., Leclercq, M., Quéma, V., Stefani, J.: The Fractal component model and its support in Java. Software Practice and Experience, Special Issue on Experiences with Auto-adaptive and Reconfigurable Systems 36(11-12), 1257-1284 (2006)
-
(2006)
Special Issue on Experiences with Auto-Adaptive and Reconfigurable Systems
, vol.36
, Issue.11-12
, pp. 1257-1284
-
-
Bruneton, E.1
Coupaye, T.2
Leclercq, M.3
Quéma, V.4
Stefani, J.5
-
11
-
-
20444505719
-
MAC and UML for secure software design
-
ACM
-
Doan, T., Demurjian, S., Ting, T.C., Ketterl, A.: MAC and UML for secure software design. In: FMSE 2004: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, pp. 75-85. ACM (2004)
-
(2004)
FMSE 2004: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering
, pp. 75-85
-
-
Doan, T.1
Demurjian, S.2
Ting, T.C.3
Ketterl, A.4
-
12
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secur. 4(3), 224-274 (2001)
-
(2001)
ACM Trans. Inf. Syst. Secur
, vol.4
, Issue.3
, pp. 224-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
13
-
-
84867650983
-
An Eclipse Modelling Framework Alternative to Meet the Models@Runtime Requirements
-
In: France, R.B., Kazmeier, J., Breu, R., Atkinson, C. (eds.), Springer, Heidelberg
-
Fouquet, F., Nain, G., Morin, B., Daubert, E., Barais, O., Plouzeau, N., Jézéquel, J.-M.: An Eclipse Modelling Framework Alternative to Meet the Models@Runtime Requirements. In: France, R.B., Kazmeier, J., Breu, R., Atkinson, C. (eds.) MODELS 2012. LNCS, vol. 7590, pp. 87-101. Springer, Heidelberg (2012)
-
(2012)
MODELS 2012. LNCS
, vol.7590
, pp. 87-101
-
-
Fouquet, F.1
Nain, G.2
Morin, B.3
Daubert, E.4
Barais, O.5
Plouzeau, N.6
Jézéquel, J.-M.7
-
14
-
-
0001619596
-
Flexible support for multiple access control policies
-
Jajodia, S., Samarati, P., Sapino, M.L., Subrahmanian, V.S.: Flexible support for multiple access control policies. ACM Trans. Database Syst. 26(2), 214-260 (2001)
-
(2001)
ACM Trans. Database Syst
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
15
-
-
79955163100
-
UMLsec: Extending UML for secure systems development
-
In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.), Springer, Heidelberg
-
Jürjens, J.: UMLsec: Extending UML for secure systems development. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412-425. Springer, Heidelberg (2002)
-
(2002)
UML 2002. LNCS
, vol.2460
, pp. 412-425
-
-
Jürjens, J.1
-
16
-
-
77952407814
-
Organization based access control
-
Kalam, A.A.E., Baida, R.E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miege, A., Saurel, C., Trouessin, G.: Organization based access control. In: Proceedings of IEEE 4th International Workshop on Policies for Distributed Systems and Networks, POLICY 2003, pp. 120-131 (2003)
-
(2003)
Proceedings of IEEE 4Th International Workshop on Policies for Distributed Systems and Networks, POLICY 2003
, pp. 120-131
-
-
Kalam, A.1
Baida, R.E.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miege, A.7
Saurel, C.8
Trouessin, G.9
-
17
-
-
33144472884
-
Modeling role-based access control using parameterized UML models
-
In: Wermelinger, M., Margaria-Steffen, T. (eds.), Springer, Heidelberg
-
Kim, D.-K., Ray, I., France, R.B., Li, N.: Modeling role-based access control using parameterized UML models. In: Wermelinger, M., Margaria-Steffen, T. (eds.) FASE 2004. LNCS, vol. 2984, pp. 180-193. Springer, Heidelberg (2004)
-
(2004)
FASE 2004. LNCS
, vol.2984
, pp. 180-193
-
-
Kim, D.-K.1
Ray, I.2
France, R.B.3
Li, N.4
-
18
-
-
84876008007
-
Xpand: A closer look at the model2text transformation language
-
(10/16/2008)
-
Klatt, B.: Xpand: A closer look at the model2text transformation language. Language (10/16/2008) (2007)
-
(2007)
Language
-
-
Klatt, B.1
-
20
-
-
79955143136
-
SecureUML: A UML-Based Modeling Language for Model-Driven Security
-
In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.), Springer, Heidelberg
-
Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426-441. Springer, Heidelberg (2002)
-
(2002)
UML 2002. LNCS
, vol.2460
, pp. 426-441
-
-
Lodderstedt, T.1
Basin, D.2
Doser, J.3
-
21
-
-
70350345225
-
Models@ Run.Time to support dynamic adaptation
-
Morin, B., Barais, O., Jézéquel, J.-M., Fleurey, F., Solberg, A.: Models@ Run.time to support dynamic adaptation. Computer 42(10), 44-51 (2009)
-
(2009)
Computer
, vol.42
, Issue.10
, pp. 44-51
-
-
Morin, B.1
Barais, O.2
Jézéquel, J.-M.3
Fleurey, F.4
Solberg, A.5
-
23
-
-
56649106269
-
An aspect-oriented and model-driven approach for managing dynamic variability
-
In: Czarnecki, K., Ober, I., Bruel, J.-M., Uhl, A., Völter, M. (eds.), Springer, Heidelberg
-
Morin, B., Fleurey, F., Bencomo, N., Jézéquel, J.-M., Solberg, A., Dehlen, V., Blair, G.S.: An aspect-oriented and model-driven approach for managing dynamic variability. In: Czarnecki, K., Ober, I., Bruel, J.-M., Uhl, A., Völter, M. (eds.) MODELS 2008. LNCS, vol. 5301, pp. 782-796. Springer, Heidelberg (2008)
-
(2008)
MODELS 2008. LNCS
, vol.5301
, pp. 782-796
-
-
Morin, B.1
Fleurey, F.2
Bencomo, N.3
Jézéquel, J.-M.4
Solberg, A.5
Dehlen, V.6
Blair, G.S.7
-
24
-
-
78649790488
-
Security-driven model-based dynamic adaptation
-
ACM
-
Morin, B., Mouelhi, T., Fleurey, F., Le Traon, Y., Barais, O., Jézéquel, J.-M.: Security-driven model-based dynamic adaptation. In: Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, ASE 2010, pp. 205-214. ACM (2010)
-
(2010)
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, ASE 2010
, pp. 205-214
-
-
Morin, B.1
Mouelhi, T.2
Fleurey, F.3
Le Traon, Y.4
Barais, O.5
Jézéquel, J.-M.6
-
25
-
-
67650163992
-
Transforming and selecting functional test cases for security policy testing
-
IEEE Computer Society
-
Mouelhi, T., Traon, Y.L., Baudry, B.: Transforming and selecting functional test cases for security policy testing. In: Proceedings of the 2009 International Conference on Software Testing Verification and Validation, ICST 2009, pp. 171-180. IEEE Computer Society (2009)
-
(2009)
Proceedings of the 2009 International Conference on Software Testing Verification and Validation, ICST 2009
, pp. 171-180
-
-
Mouelhi, T.1
Traon, Y.L.2
Baudry, B.3
-
26
-
-
33646181776
-
Weaving executability into objectoriented meta-languages
-
In: Briand, L.C., Williams, C. (eds.), Springer, Heidelberg
-
Muller, P.-A., Fleurey, F., Jézéquel, J.-M.: Weaving executability into objectoriented meta-languages. In: Briand, L.C., Williams, C. (eds.) MoDELS 2005. LNCS, vol. 3713, pp. 264-278. Springer, Heidelberg (2005)
-
(2005)
Models 2005. LNCS
, vol.3713
, pp. 264-278
-
-
Muller, P.-A.1
Fleurey, F.2
Jézéquel, J.-M.3
-
28
-
-
84875987068
-
Model-driven adaptive delegation
-
ACM
-
Nguyen, P.H., Nain, G., Klein, J., Mouelhi, T., Le Traon, Y.: Model-driven adaptive delegation. In: Proceedings of the 12th Annual International Conference on Aspect-Oriented Software Development, Modularity: AOSD 2013, pp. 61-72. ACM (2013)
-
(2013)
Proceedings of the 12Th Annual International Conference on Aspect-Oriented Software Development, Modularity: AOSD 2013
, pp. 61-72
-
-
Nguyen, P.H.1
Nain, G.2
Klein, J.3
Mouelhi, T.4
Le Traon, Y.5
-
29
-
-
84883394518
-
Testing delegation policy enforcement via mutation analsysis
-
IEEE
-
Nguyen, P.H., Papadakis, M., Rubab, I.: Testing delegation policy enforcement via mutation analsysis. In: Proceedings of the Workshop on Mutation Testing @ the Sixth IEEE International Conference on Software Testing, ICST 2013, pp. 61-72. IEEE (2013)
-
(2013)
Proceedings of the Workshop on Mutation Testing @ the Sixth IEEE International Conference on Software Testing, ICST 2013
, pp. 61-72
-
-
Nguyen, P.H.1
Papadakis, M.2
Rubab, I.3
-
31
-
-
35248873795
-
Usage control: A vision for next generation access control
-
In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.), Springer, Heidelberg
-
Sandhu, R., Park, J.: Usage control: A vision for next generation access control. In: Gorodetsky, V., Popyack, L.J., Skormin, V.A. (eds.) MMM-ACNS 2003. LNCS, vol. 2776, pp. 17-31. Springer, Heidelberg (2003)
-
(2003)
MMM-ACNS 2003. LNCS
, vol.2776
, pp. 17-31
-
-
Sandhu, R.1
Park, J.2
-
32
-
-
0030086382
-
Role-based access control models
-
Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. Computer 29(2), 38-47 (1996)
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
34
-
-
0242540371
-
PBDM: A flexible delegation model in RBAC
-
ACM
-
Zhang, X., Oh, S., Sandhu, R.: PBDM: a flexible delegation model in RBAC. In: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies, SACMAT 2003, pp. 149-157. ACM (2003)
-
(2003)
Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies, SACMAT 2003
, pp. 149-157
-
-
Zhang, X.1
Oh, S.2
Sandhu, R.3
|