-
1
-
-
0003400251
-
-
Technical Report MTR-2547, MITRE Corp., Bedford, MA, Nov
-
D. Bell and L. LaPadula. Secure computer systems: Mathematical foundations. Technical Report MTR-2547, Vol 1, MITRE Corp., Bedford, MA, Nov. 1973.
-
(1973)
Secure computer systems: Mathematical foundations
, vol.1
-
-
Bell, D.1
LaPadula, L.2
-
3
-
-
0029700918
-
Supporting multiple access control policies in database systems
-
Oakland, CA, IEEE Computer Society Press
-
E. Bertino, S. Jajodia, and P. Samarati. Supporting multiple access control policies in database systems. In IEEE Symposium on Security and Privacy, pages 94–109, Oakland, CA, 1996. IEEE Computer Society Press.
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 94-109
-
-
Bertino, E.1
Jajodia, S.2
Samarati, P.3
-
8
-
-
0029700344
-
Decentralized trust management
-
Oakland, CA, May IEEE Computer Society,Technical Committee on Security and Privacy, IEEE Computer Society Press
-
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Research in Security and Privacy, Oakland, CA, May 1996. IEEE Computer Society,Technical Committee on Security and Privacy, IEEE Computer Society Press.
-
(1996)
Proceedings of the IEEE Symposium on Research in Security and Privacy, Research in Security and Privacy
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
10
-
-
0024663219
-
The chinese wall security policy
-
Oakland, CA, May IEEE, IEEECSP
-
D. F. Brewer and M. J. Nash. The chinese wall security policy. In SympSecPr, Research in Security and Privacy, pages 206–214, Oakland, CA, May 1989. IEEE, IEEECSP.
-
(1989)
SympSecPr, Research in Security and Privacy
, pp. 206-214
-
-
Brewer, D. F.1
Nash, M. J.2
-
11
-
-
85084164023
-
A comparison of methods for implementing adaptive security policies
-
Berkeley, Jan. 26–29, Usenix Association
-
M. Carney and B. Loe. A comparison of methods for implementing adaptive security policies. In Proceedings of the 7th USENIX Security Symposium (SECURITY-98), pages 1–14, Berkeley, Jan. 26–29, 1998. Usenix Association.
-
(1998)
Proceedings of the 7th USENIX Security Symposium (SECURITY-98)
, pp. 1-14
-
-
Carney, M.1
Loe, B.2
-
13
-
-
84956979622
-
A lattice model of secure information flow
-
July
-
D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 20, July 1977.
-
(1977)
Communications of the ACM
, vol.20
-
-
Denning, D. E.1
-
15
-
-
0032218233
-
History-based access control for mobile code
-
San Francisco, California, Nov. ACM Press
-
G. Edjlali, A. Acharya, and V. Chaudhary. History-based access control for mobile code. In 5th ACM Conference on Computer and Communications Security, pages 38–48, San Francisco, California, Nov. 1998. ACM Press.
-
(1998)
5th ACM Conference on Computer and Communications Security
, pp. 38-48
-
-
Edjlali, G.1
Acharya, A.2
Chaudhary, V.3
-
17
-
-
0003593599
-
-
Internet RFC 2693, Sept
-
C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. M. Thomas, and T. Ylonen. SPKI certificate theory. Internet RFC 2693, Sept. 1999.
-
(1999)
SPKI certificate theory
-
-
Ellison, C. M.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B. M.5
Ylonen, T.6
-
18
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate intranet
-
Feb
-
D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn. A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security, 2(1):34–64, Feb. 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 34-64
-
-
Ferraiolo, D. F.1
Barkley, J. F.2
Kuhn, D. R.3
-
21
-
-
0003851050
-
Transaction Processing: concepts and techniques
-
Morgan Kaufmann Publishers, Inc., San Mateo (CA), USA
-
J. Gray and A. Reuter. Transaction Processing: concepts and techniques. Data Management Systems. Morgan Kaufmann Publishers, Inc., San Mateo (CA), USA, 1993.
-
(1993)
Data Management Systems
-
-
Gray, J.1
Reuter, A.2
-
22
-
-
1542597501
-
-
Technical report, Department of Computer Science, University of California Davis, July
-
J. A. Hoagland, R. Pandley, and K. N. Levitt. Security policy specification using a graphical approach. Technical report, Department of Computer Science, University of California Davis, July 1998.
-
(1998)
Security policy specification using a graphical approach
-
-
Hoagland, J. A.1
Pandley, R.2
Levitt, K. N.3
-
23
-
-
0030677524
-
A logical language for expressing authorizations
-
Oakland, CA, May IEEECSP
-
S. Jajodia, P. Samarati, and V. S. Subrahmanian. A logical language for expressing authorizations. In SympSecPr, Research in Security and Privacy, Oakland, CA, May 1997. IEEECSP.
-
(1997)
SympSecPr, Research in Security and Privacy
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V. S.3
-
24
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
June
-
S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino. A unified framework for enforcing multiple access control policies. SIGMOD Record (ACM Special Interest Group on Management of Data), 26(2):474–485, June 1997.
-
(1997)
SIGMOD Record (ACM Special Interest Group on Management of Data)
, vol.26
, Issue.2
, pp. 474-485
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V. S.3
Bertino, E.4
-
27
-
-
85084161655
-
Unified support for heterogeneous security policies in distributed systems
-
Berkeley, Jan. 26–29, Usenix Association
-
N. H. Minsky and V. Ungureanu. Unified support for heterogeneous security policies in distributed systems. In Proceedings of the 7th USENIX Security Symposium (SECURITY-98), pages 131–142, Berkeley, Jan. 26–29, 1998. Usenix Association.
-
(1998)
Proceedings of the 7th USENIX Security Symposium (SECURITY-98)
, pp. 131-142
-
-
Minsky, N. H.1
Ungureanu, V.2
-
30
-
-
85117415611
-
Verifying workflow processes against organization security policies
-
Standford, California, June16-18 IEEE Computer Society, IEEE Computer Society
-
C. Ribeiro and P. Guedes. Verifying workflow processes against organization security policies. In Proceedings of the 8th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pages 190–191, Standford, California, June16-18 1999. IEEE Computer Society, IEEE Computer Society.
-
(1999)
Proceedings of the 8th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
, pp. 190-191
-
-
Ribeiro, C.1
Guedes, P.2
-
31
-
-
48749114683
-
-
Technical Report RT/03/00, INESC
-
C. Ribeiro, A. Zúquete, P. Ferreira, and P. Guedes. Security policy consistency. Technical Report RT/03/00, INESC, 2000.
-
(2000)
Security policy consistency
-
-
Ribeiro, C.1
Zúquete, A.2
Ferreira, P.3
Guedes, P.4
-
33
-
-
0027699087
-
Lattice-based access control models
-
Nov
-
R. S. Sandhu. Lattice-based access control models. IEEE Computer, 26(11):9, Nov. 1993.
-
(1993)
IEEE Computer
, vol.26
, Issue.11
, pp. 9
-
-
Sandhu, R. S.1
-
34
-
-
85116484591
-
Role-based access control: A multi-dimensional view
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control: A multi-dimensional view. In 10th Annual Computer Security Applications Conference, pages 54–62, 1994.
-
(1994)
10th Annual Computer Security Applications Conference
, pp. 54-62
-
-
Sandhu, R. S.1
Coyne, E. J.2
Feinstein, H. L.3
Youman, C. E.4
-
35
-
-
0030086382
-
Role-based access control models
-
Feb
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. Computer, 29(2):38–47, Feb. 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R. S.1
Coyne, E. J.2
Feinstein, H. L.3
Youman, C. E.4
|