-
1
-
-
0030086382
-
Role-Based Access Control Models
-
Feb.
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-Based Access Control Models," Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
2
-
-
0001549660
-
The ARBAC97 Model for Role-Based Administration of Roles
-
Feb.
-
R. Sandhu, V. Bhamidipati, and Q. Munawer, "The ARBAC97 Model for Role-Based Administration of Roles," ACM Trans. Information and Systems Security, vol. 2, no. 1, pp. 105-135, Feb. 1999.
-
(1999)
ACM Trans. Information and Systems Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.1
Bhamidipati, V.2
Munawer, Q.3
-
3
-
-
33845517298
-
Security Analysis in Role-Based Access Control
-
Nov.
-
N. Li and M.V. Tripunitara, "Security Analysis in Role-Based Access Control," ACM Trans. Information and System Security, vol. 9, no. 4, pp. 391-420, Nov. 2006.
-
(2006)
ACM Trans. Information and System Security
, vol.9
, Issue.4
, pp. 391-420
-
-
Li, N.1
Tripunitara, M.V.2
-
4
-
-
77952403780
-
Efficient Policy Analysis for Administrative Role Based Access Control
-
S.D. Stoller, P. Yang, C.R. Ramakrishnan, and M.I. Gofman, "Efficient Policy Analysis for Administrative Role Based Access Control," Proc. 14th ACM Conf. Computer and Comm. Security (CCS), 2007.
-
(2007)
Proc. 14th ACM Conf. Computer and Comm. Security (CCS)
-
-
Stoller, S.D.1
Yang, P.2
Ramakrishnan, C.R.3
Gofman, M.I.4
-
5
-
-
84865737952
-
Policy Analysis for Administrative Role Based Access Control
-
Oct.
-
A. Sasturkar, P. Yang, S.D. Stoller, and C.R. Ramakrishnan, "Policy Analysis for Administrative Role Based Access Control," Theoretical Computer Science, vol. 412, no. 44, pp. 6208-6234, Oct. 2011.
-
(2011)
Theoretical Computer Science
, vol.412
, Issue.44
, pp. 6208-6234
-
-
Sasturkar, A.1
Yang, P.2
Stoller, S.D.3
Ramakrishnan, C.R.4
-
6
-
-
79951677949
-
Symbolic Reachability Analysis for Parameterized Administrative Role Based Access Control
-
Mar.-May
-
S.D. Stoller, P. Yang, M. Gofman, and C.R. Ramakrishnan, "Symbolic Reachability Analysis for Parameterized Administrative Role Based Access Control," Computers & Security, vol. 30, no. 2/3, pp. 148-164, Mar.-May 2011.
-
(2011)
Computers & Security
, vol.30
, Issue.2-3
, pp. 148-164
-
-
Stoller, S.D.1
Yang, P.2
Gofman, M.3
Ramakrishnan, C.R.4
-
8
-
-
74049145072
-
Expressive Policy Analysis with Enhanced System Dynamicity
-
R. Craven, J. Lobo, J. Ma, A. Russo, E. Lupu, and A. Bandara, "Expressive Policy Analysis with Enhanced System Dynamicity," Proc. Fourth Int'l Symp. Information, Computer, and Comm. Security (ASIACCS), pp. 239-250, 2009.
-
(2009)
Proc. Fourth Int'l Symp. Information, Computer, and Comm. Security (ASIACCS)
, pp. 239-250
-
-
Craven, R.1
Lobo, J.2
Ma, J.3
Russo, A.4
Lupu, E.5
Bandara, A.6
-
9
-
-
77955186221
-
A Logic for State-Modifying Authorization Policies
-
M.Y. Becker and S. Nanz, "A Logic for State-Modifying Authorization Policies," ACM Trans. Information and System Security, vol. 13, no. 3, article 20, 2010.
-
(2010)
ACM Trans. Information and System Security
, vol.13
, Issue.3
-
-
Becker, M.Y.1
Nanz, S.2
-
10
-
-
38549169180
-
The Role of Abduction in Declarative Authorization Policies
-
Proc. 10th Int'l Conf. Practical Aspects of Declarative Languages (PADL '08), ser.
-
M.Y. Becker and S. Nanz, "The Role of Abduction in Declarative Authorization Policies," Proc. 10th Int'l Conf. Practical Aspects of Declarative Languages (PADL '08), ser. Lecture Notes in Computer Science, vol. 4902, pp. 84-99, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.4902
, pp. 84-99
-
-
Becker, M.Y.1
Nanz, S.2
-
11
-
-
71049160881
-
Abductive Authorization Credential Gathering
-
July
-
M.Y. Becker, J.F. Mackay, and B. Dillaway, "Abductive Authorization Credential Gathering," Proc. IEEE Int'l Symp. Policies for Distributed Systems and Networks (POLICY), pp. 1-8, July 2009.
-
(2009)
Proc. IEEE Int'l Symp. Policies for Distributed Systems and Networks (POLICY)
, pp. 1-8
-
-
Becker, M.Y.1
Mackay, J.F.2
Dillaway, B.3
-
12
-
-
81855219131
-
Abductive Analysis of Administrative Policies in Rule-Based Access Control
-
Dec.
-
P. Gupta, S.D. Stoller, and Z. Xu, "Abductive Analysis of Administrative Policies in Rule-Based Access Control," Proc. Seventh Int'l Conf. Information Systems Security (ICISS '11), pp. 116-130, Dec. 2011.
-
(2011)
Proc. Seventh Int'l Conf. Information Systems Security (ICISS '11)
, pp. 116-130
-
-
Gupta, P.1
Stoller, S.D.2
Xu, Z.3
-
17
-
-
84977865684
-
Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-Mechanizable Activities
-
M. Barletta, S. Ranise, and L. Vigano, "Automated Analysis of Scenario-Based Specifications of Distributed Access Control Policies with Non-Mechanizable Activities," Proc. Eighth Int'l Workshop Security and Trust Management (STM), pp. 49-64, 2012.
-
(2012)
Proc. Eighth Int'l Workshop Security and Trust Management (STM)
, pp. 49-64
-
-
Barletta, M.1
Ranise, S.2
Vigano, L.3
|