-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
M. Abadi, M. Burrows, B. Lampson, and G. D. Plotkin. A calculus for access control in distributed systems. ACM Trans. Prog. Lang. Syst., 15(4):706-734, 1993.
-
(1993)
ACM Trans. Prog. Lang. Syst.
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.D.4
-
2
-
-
0032153903
-
An access control model supporting periodicity constraints and temporal reasoning
-
E. Bertino, C. Bettini, E. Ferrari, and P. Samarati. An access control model supporting periodicity constraints and temporal reasoning. ACM Transactions on Database Systems, 23(3):231-285, 1998.
-
(1998)
ACM Transactions on Database Systems
, vol.23
, Issue.3
, pp. 231-285
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
7
-
-
0004276026
-
-
Springer- Verlag, Berlin Heidelberg, 1nd edition
-
E. Borger, E. Gradel, and Y. Gurevich. The Classical Decision Problem. Springer-Verlag, Berlin Heidelberg, 1nd edition, 1997.
-
(1997)
The Classical Decision Problem
-
-
Borger, E.1
Gradel, E.2
Gurevich, Y.3
-
12
-
-
0003546303
-
-
Internet RFC 2693
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. Simple public key certificate. At http://world.std.com/~cme/spki.txt, 1999. Internet RFC 2693.
-
(1999)
Simple Public Key Certificate
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
13
-
-
0003593599
-
-
Internet RFC 2693
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory. At http://www.ietf.org/html.charters/spki-charter.html, 1999. Internet RFC 2693.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
15
-
-
0002422823
-
A role based access control model and reference implementation within a corporate intranet
-
D. Ferraiolo, J. Barkley, and D. Kuhn. A role based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security, 1(2):34-64, 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.1
, Issue.2
, pp. 34-64
-
-
Ferraiolo, D.1
Barkley, J.2
Kuhn, D.3
-
17
-
-
84976657250
-
An authorization mechanism for a relational database system
-
P. Griffiths and B. Wade. An authorization mechanism for a relational database system. ACM Transactions on Database Systems, 1(3):242-255, 1976.
-
(1976)
ACM Transactions on Database Systems
, vol.1
, Issue.3
, pp. 242-255
-
-
Griffiths, P.1
Wade, B.2
-
23
-
-
0001619596
-
Flexible support for multiple access control policies
-
S. Jajodia, P. Samarati, M. L. Sapino, and V. Subrahmanian. Flexible support for multiple access control policies. ACM Transactions on Database Systems, 26(2):214-260, 2001.
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.4
-
29
-
-
84972542053
-
A different approach to deontic logic: Deontic logic viewed as a variant of dynamic logic
-
J.-J. C. Meyer. A different approach to deontic logic: Deontic logic viewed as a variant of dynamic logic. Notre Dame Journal of Formal Logic, 29(1), 1988.
-
(1988)
Notre Dame Journal of Formal Logic
, vol.29
, Issue.1
-
-
Meyer, J.-J.C.1
-
36
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
|