-
2
-
-
0002848811
-
The Specification and Enforcement of Authotization Constraints in Workflow Management Systems
-
February
-
Elisa Bertino, Elena Ferrari, and Vijay Atluri. The Specification and Enforcement of Authotization Constraints in Workflow Management Systems. ACM Trancactions on Information and System Security, 2(1):65–104, February 1999.
-
(1999)
ACM Trancactions on Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
4
-
-
84956983027
-
Consistency checking and visualization of OCL constraints
-
A. Evans and S. Kent, editors, Springer
-
P. Bottoni, M. Koch, F. Parisi-Presicce, and G. Taentzer. Consistency checking and visualization of OCL constraints. In A. Evans and S. Kent, editors, UML 2000, number 1939 in LNCS, pages 294–308. Springer, 2000.
-
(2000)
UML 2000, Number 1939 in LNCS
, pp. 294-308
-
-
Bottoni, P.1
Koch, M.2
Parisi-Presicce, F.3
Taentzer, G.4
-
6
-
-
84949964856
-
A fully abstract model for graph-interpreted temporal logic
-
H. Ehrig, G. Engels, H.J. Kreowski, and G. Rozenberg, editors, number 1764 in LNCS. Springer
-
F. Gadducci, R. Heckel, and M. Koch. A fully abstract model for graph-interpreted temporal logic. In H. Ehrig, G. Engels, H.J. Kreowski, and G. Rozenberg, editors, Proc. of 6th Int. Workshop on Theory and Graph Transformation, number 1764 in LNCS. Springer, 2000.
-
(2000)
Proc. Of 6Th Int. Workshop on Theory and Graph Transformation
-
-
Gadducci, F.1
Heckel, R.2
Koch, M.3
-
8
-
-
84944046313
-
Taxonomy and Description of Policy Combination Methods
-
Y. Kanada. Taxonomy and Description of Policy Combination Methods. In Proc. of POLICY 2001 [1], pages 171–184.
-
In Proc. Of POLICY 2001
, pp. 171-184
-
-
Kanada, Y.1
-
9
-
-
0035790747
-
On the Specification and Evolution of Access Control Policies
-
S. Osborne, editor, ACM, May
-
M. Koch, L. V. Mancini, and F. Parisi-Presicce. On the Specification and Evolution of Access Control Policies. In S. Osborne, editor, Proc. 6th ACM Symp. on Access Control Models and Technologies, pages 121–130. ACM, May 2001.
-
(2001)
Proc. 6Th ACM Symp. On Access Control Models and Technologies
, pp. 121-130
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
10
-
-
84944075708
-
A Formal Model for Role- Based Access Control using Graph Transformation
-
F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, number 1895 in Lect. Notes in Comp. Sci, Springer
-
M. Koch, L.V. Mancini, and F. Parisi-Presicce. A Formal Model for Role- Based Access Control using Graph Transformation. In F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, Proc. of the 6th European Symposium on Research in Computer Security (ESORICS 2000), number 1895 in Lect. Notes in Comp. Sci., pages 122–139. Springer, 2000.
-
(2000)
, Proc. Of the 6Th European Symposium on Research in Computer Security (ESORICS 2000)
, pp. 122-139
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
11
-
-
84945261571
-
Foundations for a graph-based approach to the Specification of Access Control Policies
-
F.Honsell and M.Miculan, editors, (FoSSaCS 2001), Lect. Notes in Comp. Sci. Springer, March
-
M. Koch, L.V. Mancini, and F. Parisi-Presicce. Foundations for a graph-based approach to the Specification of Access Control Policies. In F.Honsell and M.Miculan, editors, Proc. of Foundations of Software Science and Computation Structures (FoSSaCS 2001), Lect. Notes in Comp. Sci. Springer, March 2001.
-
(2001)
Proc. Of Foundations Of Software Science and Computation Structures
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
12
-
-
84948988629
-
Conflict Detection and Resolution in Access Control Policy Specifications
-
M. Nielsen and U. Engberg, editors, Springer
-
M. Koch, L.V. Mancini, and F. Parisi-Presicce. Conflict Detection and Resolution in Access Control Policy Specifications. In M. Nielsen and U. Engberg, editors, Proc. of Foundations of Software Science and Computation Structures (FoSSaCS 2002), number 2303 in Lect. Notes in Comp. Sci., pages 223–237. Springer, 2002.
-
(2002)
Proc. Of Foundations Of Software Science and Computation Structures (Fossacs 2002), Number 2303 in Lect. Notes in Comp. Sci
, pp. 223-237
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
13
-
-
0009301799
-
Graph transformation units and modules
-
H. Ehrig, G. Engels, H.-J. Kreowski, and G. Rozenberg, editors
-
H.-J. Kreowski and S. Kuske. Graph transformation units and modules. In H. Ehrig, G. Engels, H.-J. Kreowski, and G. Rozenberg, editors, Handbook of Graph Grammars and Computing by Graph Transformation, volume 2, chapter 15, pages 607–638. 1999.
-
(1999)
Handbook of Graph Grammars and Computing by Graph Transformation
, vol.2
, Issue.15
, pp. 607-638
-
-
Kreowski, H.-J.1
Kuske, S.2
-
14
-
-
0004063990
-
Handbook of Graph Grammars and Computing by Graph Transformations
-
editor, World Scientific
-
G. Rozenberg, editor. Handbook of Graph Grammars and Computing by Graph Transformations. Vol. I: Foundations. World Scientific, 1997.
-
(1997)
Vol. I: Foundations
-
-
Rozenberg, G.1
-
15
-
-
19344364618
-
Role-Based Access Control
-
Academic Press
-
R. S. Sandhu. Role-Based Access Control. In Advances in Computers, volume 46. Academic Press, 1998.
-
(1998)
Advances in Computers
, vol.46
-
-
Sandhu, R.S.1
-
16
-
-
0028726831
-
Policy Driven Management for Distributed Systems
-
M. S. Sloman. Policy Driven Management for Distributed Systems. Network and Systems Management, 2(4):333–360, 1994.
-
(1994)
Network and Systems Management
, vol.2
, Issue.4
, pp. 333-360
-
-
Sloman, M.S.1
-
17
-
-
0000832186
-
Modal and Temporal Logics
-
Clarendon Press
-
C. Stirling. Modal and Temporal Logics. In Background: Computational structures, volume 2, pages 477–563. Clarendon Press, 1992.
-
(1992)
Background: Computational Structures
, vol.2
, pp. 477-563
-
-
Stirling, C.1
|