-
3
-
-
0031095278
-
Semiring-based constraint solving and optimization
-
March
-
S. Bistarelli, U. Montanari, and F. Rossi. Semiring-based constraint solving and optimization. Journal of the ACM, 44(2):201-236, March 1997.
-
(1997)
Journal of the ACM
, vol.44
, Issue.2
, pp. 201-236
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
-
4
-
-
0041405781
-
Semiring-based constraint logic programming: Syntax and semantics
-
S. Bistarelli, U. Montanari, and F. Rossi. Semiring-based constraint logic programming: Syntax and semantics. ACM Transactions on Programming Languages and Systems (TOPLAS), 23(1):1-29, 2001.
-
(2001)
ACM Transactions on Programming Languages and Systems (TOPLAS)
, vol.23
, Issue.1
, pp. 1-29
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
-
5
-
-
0003369786
-
Semiring-based CSPs and valued CSPs: Frameworks, properties and comparison
-
S. Bistarelli, U. Montanari, F. Rossi, T. Schiex, G. Verfaillie, and H. Fargier. Semiring-based CSPs and valued CSPs: Frameworks, properties and comparison. Constraints, 4(3), 1999.
-
(1999)
Constraints
, vol.4
, Issue.3
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
Schiex, T.4
Verfaillie, G.5
Fargier, H.6
-
6
-
-
85025424440
-
An algebra for composing access control policies
-
P. Bonatti, S. de Capitani di Vimercati, and P. Samarati. An algebra for composing access control policies. ACM Transactions on Information and System Security (TISSEC), 5(1):1-35, 2002.
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.1
De Capitani Di Vimercati, S.2
Samarati, P.3
-
7
-
-
84957628788
-
Compiling semiring-based constraints with clp(F D, S)
-
M. Maher and J.-F. Puget, editors, Proceedings of the 4th International Conference on the Principles and Practice of Constraint Programming (CP98), Pisa, Italy, October 1998, Springer Verlag
-
Y. Georget and P. Codognet. Compiling semiring-based constraints with clp(F D, S). In M. Maher and J.-F. Puget, editors, Proceedings of the 4th International Conference on the Principles and Practice of Constraint Programming (CP98), Pisa, Italy, October 1998, volume 1520 of Lecture Notes in Computer Science, pages 205-219. Springer Verlag, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1520
, pp. 205-219
-
-
Georget, Y.1
Codognet, P.2
-
8
-
-
84958746737
-
On the negotiation of access control policies
-
B. Christianson et al., editors, Proceedings of the 9th International Security Protocols Workshop, Cambridge, U.K., April 2001, Springer Verlag, Also see transcript of discussion
-
V. D. Gligor, H. Khurana, R. K. Koleva, V. G. Bharadwaj, and J. S. Baras. On the negotiation of access control policies. In B. Christianson et al., editors, Proceedings of the 9th International Security Protocols Workshop, Cambridge, U.K., April 2001, volume 2467 of Lecture Notes in Computer Science, pages 188-201. Springer Verlag, 2002. Also see transcript of discussion, pp. 202-212.
-
(2002)
Lecture Notes in Computer Science
, vol.2467
-
-
Gligor, V.D.1
Khurana, H.2
Koleva, R.K.3
Bharadwaj, V.G.4
Baras, J.S.5
-
9
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
A. Herzberg, Y. Mass, J. Michaeli, D. Naor, and Y. Ravid. Access control meets public key infrastructure, or: Assigning roles to strangers. In Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, May 2000.
-
Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, May 2000
-
-
Herzberg, A.1
Mass, Y.2
Michaeli, J.3
Naor, D.4
Ravid, Y.5
-
13
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
14
-
-
67650041248
-
Secure virtual enclaves: Supporting coalition use of distributed application technologies
-
D. Shands, R. Yee, J. Jacobs, and E. J. Sebes. Secure virtual enclaves: Supporting coalition use of distributed application technologies. In Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, California, 3-4 February 2000.
-
Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, California, 3-4 February 2000
-
-
Shands, D.1
Yee, R.2
Jacobs, J.3
Sebes, E.J.4
|