-
2
-
-
57349158498
-
An obligation model bridging access control policies and privacy policies
-
133
-
Ni, Q., Bertino, E., Lobo, J.: An obligation model bridging access control policies and privacy policies. In: SACMAT 2008, p. 133 (2008)
-
(2008)
Sacmat
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
-
4
-
-
0033489650
-
SASI enforcement of security policies
-
Erlingsson, U., Schneider, F.B.: SASI enforcement of security policies. In: NSPW, pp. 87-95 (2000)
-
(2000)
NSPW
, pp. 87-95
-
-
Erlingsson, U.1
Schneider, F.B.2
-
5
-
-
33745267229
-
Composing security policies with polymer
-
Bauer, L., Ligatti, J., Walker, D.: Composing security policies with polymer. ACM SIGPLAN Notices 40(6), 305 (2005)
-
(2005)
ACM SIGPLAN Notices
, vol.40
, Issue.6
, pp. 305
-
-
Bauer, L.1
Ligatti, J.2
Walker, D.3
-
6
-
-
62849128528
-
Weaving rewrite-based access control policies
-
de Oliveira, A.S., Wang, E.K., Kirchner, C., Kirchner, H.: Weaving rewrite-based access control policies. In: FMSE, pp. 71-80 (2007)
-
(2007)
FMSE
, pp. 71-80
-
-
De Oliveira, A.S.1
Wang, E.K.2
Kirchner, C.3
Kirchner, H.4
-
7
-
-
57349142384
-
Aspect-oriented in-lined reference monitors
-
Hamlen, K.W., Jones, M.: Aspect-oriented in-lined reference monitors. In: PLAS, p. 11 (2008)
-
(2008)
PLAS
, pp. 11
-
-
Hamlen, K.W.1
Jones, M.2
-
8
-
-
84865280730
-
Security-policy monitoring and enforcement with JavaMOP
-
Hussein, S., Meredith, P., Rolu, G.: Security-policy monitoring and enforcement with JavaMOP. In: PLAS, pp. 1-11 (2012)
-
(2012)
PLAS
, pp. 1-11
-
-
Hussein, S.1
Meredith, P.2
Rolu, G.3
-
9
-
-
35248828504
-
Aspect-oriented programming
-
Aķsit, M., Matsuoka, S. (eds.) ECOOP Springer, Heidelberg 1997
-
Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C.V., Loingtier, J.M., Irwin, J.: Aspect-Oriented Programming. In: Aķsit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol. 1241, pp. 220-242. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1241
, pp. 220-242
-
-
Kiczales, G.1
Lamping, J.2
Mendhekar, A.3
Maeda, C.4
Lopes, C.V.5
Loingtier, J.M.6
Irwin, J.7
-
11
-
-
56649117258
-
A model-based framework for security policy specification deployment and testing
-
Czarnecki, K., Ober, I., Bruel, J.-M., Uhl, A., V̈olter, M. (eds.) MODELS Springer, Heidelberg (2008
-
Mouelhi, T., Fleurey, F., Baudry, B., Le Traon, Y.: A model-based framework for security policy specification, deployment and testing. In: Czarnecki, K., Ober, I., Bruel, J.-M., Uhl, A., V̈olter, M. (eds.) MODELS 2008. LNCS, vol. 5301, pp. 537-552. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5301
, pp. 537-552
-
-
Mouelhi, T.1
Fleurey, F.2
Baudry, B.3
Le Traon, Y.4
-
12
-
-
78649790488
-
Security-driven model-based dynamic adaptation
-
Morin, B., Mouelhi, T., Fleurey, F., Le Traon, Y., Barais, O., J́eźequel, J.M.: Security-driven model-based dynamic adaptation. In: ASE 2010 (2010)
-
(2010)
ASE
, pp. 2010
-
-
Morin, B.1
Mouelhi, T.2
Fleurey, F.3
Le Traon, Y.4
Barais, O.5
J́eź equel, J.M.6
-
13
-
-
79960151725
-
A decade of model-driven security
-
Basin, D., Clavel, M., Egea, M.: A decade of model-driven security. In: SACMAT 2011, pp. 1-10 (2011)
-
(2011)
Sacmat
, pp. 1-10
-
-
Basin, D.1
Clavel, M.2
Egea, M.3
-
14
-
-
38049059202
-
A Metamodel-based approach for analyzing security-design models
-
Engels, G., Opdyke, B., Schmidt, D.C., Weil, F. (eds.) MODELS Springer, Heidelberg (2007
-
Basin, D., Clavel, M., Doser, J., Egea, M.: A Metamodel-Based Approach for Analyzing Security-Design Models. In: Engels, G., Opdyke, B., Schmidt, D.C., Weil, F. (eds.) MODELS 2007. LNCS, vol. 4735, pp. 420-435. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4735
, pp. 420-435
-
-
Basin, D.1
Clavel, M.2
Doser, J.3
Egea, M.4
-
15
-
-
33947620690
-
Privacy APIs: Access control techniques to analyze and verify legal privacy policies
-
CSFW
-
May, M., Gunter, C., Lee, I.: Privacy APIs: Access control techniques to analyze and verify legal privacy policies. In: 19th IEEE Computer Security Foundations Workshop, CSFW 2006 (2006)
-
(2006)
19th IEEE Computer Security Foundations Workshop
, pp. 2006
-
-
May, M.1
Gunter, C.2
Lee, I.3
-
16
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
Barth, A., Datta, A., Mitchell, J., Nissenbaum, H.: Privacy and contextual integrity: framework and applications. In: IEEE Symposium on Security and Privacy (2006)
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Barth, A.1
Datta, A.2
Mitchell, J.3
Nissenbaum, H.4
-
17
-
-
35048898814
-
Privacy and utility in business processes
-
Barth, A., Mitchell, J., Datta, A., Sundaram, S.: Privacy and Utility in Business Processes. In: 20th IEEE Computer Security Foundations Symposium, pp. 279-294 (2007)
-
(2007)
20th IEEE Computer Security Foundations Symposium
, pp. 279-294
-
-
Barth, A.1
Mitchell, J.2
Datta, A.3
Sundaram, S.4
-
18
-
-
70350600124
-
A formalization of HIPAA for a medical messaging system
-
Fischer-Ḧubner, S., Lambrinoudakis, C., Pernul, G. (eds.) Springer, Heidelberg (2009
-
Lam, P.E., Mitchell, J.C., Sundaram, S.: A formalization of HIPAA for a medical messaging system. In: Fischer-Ḧubner, S., Lambrinoudakis, C., Pernul, G. (eds.) TrustBus 2009. LNCS, vol. 5695, pp. 73-85. Springer, Heidelberg (2009)
-
(2009)
TrustBus LNCS
, vol.5695
, pp. 73-85
-
-
Lam, P.E.1
Mitchell, J.C.2
Sundaram, S.3
-
19
-
-
33745471209
-
Model driven security: From UML models to access control infrastructures
-
Basin, D., Doser, J., Lodderstedt, T.: Model driven security: From UML models to access control infrastructures. ACM Transactions on Software Engineering and Methodology (TOSEM) 15(1), 39-91 (2006)
-
(2006)
ACM Transactions on Software Engineering and Methodology (TOSEM)
, vol.15
, Issue.1
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
-
20
-
-
79955163100
-
UMLsec: Extending UML for secure systems development
-
J́eźequel, J.-M., Hussmann, H., Cook, S. (eds.) UML Springer, Heidelberg (2002
-
J̈urjens, J.: UMLsec: Extending UML for secure systems development. In: J́eźequel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412-425. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2460
, pp. 412-425
-
-
J̈urjens, J.1
-
21
-
-
70349673753
-
SecureMDD: A model-driven development method for secure smart card applications
-
March 2009
-
Moebius, N., Stenzel, K., Grandy, H., Reif, W.: SecureMDD: a model-driven development method for secure smart card applications. In: International Conference on Availability, Reliability and Security, ARES 2009, pp. 841-846 (March 2009)
-
(2009)
International Conference on Availability, Reliability and Security, ARES
, pp. 841-846
-
-
Moebius, N.1
Stenzel, K.2
Grandy, H.3
Reif, W.4
-
22
-
-
84944754330
-
Modelling contexts in the Or-BAC model
-
Cuppens, F., Mìege, A.: Modelling contexts in the Or-BAC model. In: ACSAC, pp. 416-425 (2003)
-
(2003)
Acsac
, pp. 416-425
-
-
Cuppens, F.1
-
23
-
-
84872723550
-
Formal enforcement and management of obligation policies
-
Elrakaiby, Y., Cuppens, F., Cuppens-Boulahia, N.: Formal enforcement and management of obligation policies. In: Data & Knowledge Engineering, pp. 1-21 (2011)
-
(2011)
Data & Knowledge Engineering
, pp. 1-21
-
-
Elrakaiby, Y.1
Cuppens, F.2
Cuppens-Boulahia, N.3
-
24
-
-
0030677524
-
A logical language for expressing authorizations
-
Jajodia, S., Samarati, P., Subrahmanian, V.: A logical language for expressing authorizations. In: Proceedings of 1997 IEEE Symposium on Security and Privacy, pp. 31-42 (1997)
-
(1997)
Proceedings of 1997 IEEE Symposium on Security and Privacy
, pp. 31-42
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.3
-
26
-
-
0003518498
-
-
Addison-Wesley Longman
-
Gosling, J., Joy, B., Steele, G., Bracha, G., Buckley, A.: The Java Language Specification. Addison-Wesley Longman (2013)
-
(2013)
The Java Language Specification
-
-
Gosling, J.1
Joy, B.2
Steele, G.3
Bracha, G.4
Buckley, A.5
-
27
-
-
77953082000
-
A delegation model for extended RBAC
-
Ben-Ghorbel-Talbi, M., Cuppens, F., Cuppens-Boulahia, N., Bouhoula, A.: A delegation model for extended RBAC. International Journal of Information Security 9(3), 209-236 (2010)
-
(2010)
International Journal of Information Security
, vol.9
, Issue.3
, pp. 209-236
-
-
Ben-Ghorbel-Talbi, M.1
Cuppens, F.2
Cuppens-Boulahia, N.3
Bouhoula, A.4
-
28
-
-
34347273369
-
High level conflict management strategies in advanced access control models
-
Cuppens, F., Cuppens-Boulahia, N., Ghorbel, M.B.: High Level Conflict Management Strategies in Advanced Access Control Models. Electronic Notes in Theoretical Computer Science 186, 3-26 (2007)
-
(2007)
Electronic Notes in Theoretical Computer Science
, vol.186
, pp. 3-26
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Ghorbel, M.B.3
-
29
-
-
70350388459
-
-
Loctudy, France
-
Autrel, F., Cuppens, F., Cuppens-Boulahia, N., Coma, C.: Motorbac 2: a security policy tool. In: 3rd Conference on Security in Network Architectures and Information Systems (SAR-SSI 2008), Loctudy, France, pp. 273-288 (2008)
-
(2008)
Motorbac 2: A Security Policy Tool 3rd Conference on Security in Network Architectures and Information Systems (SAR-SSI 2008)
, pp. 273-288
-
-
Autrel, F.1
Cuppens, F.2
Cuppens-Boulahia, N.3
Coma, C.4
-
30
-
-
84861043720
-
Refactoring access control policies for performance improvement
-
Kateb, D.E., Mouelhi, T., Traon, Y.L., Hwang, J., Xie, T.: Refactoring access control policies for performance improvement. In: ICPE, pp. 323-334 (2012)
-
(2012)
ICPE
, pp. 323-334
-
-
Kateb, D.E.1
Mouelhi, T.2
Traon, Y.L.3
Hwang, J.4
Xie, T.5
-
31
-
-
73149125546
-
ModelSec: A generative architecture for model-driven security
-
Molina, F., Toval, A., Śanchez, O., Garca-Molina, J.: ModelSec: A Generative Architecture for Model-Driven Security. Journal of Universal Computer Science 15(15), 2957-2980 (2009)
-
(2009)
Journal of Universal Computer Science
, vol.15
, Issue.15
, pp. 2957-2980
-
-
Molina, F.1
Toval, A.2
Śanchez, O.3
Garca-Molina, J.4
-
32
-
-
35348977674
-
Model based development of access policies
-
Breu, R., Popp, G., Alam, M.: Model based development of access policies. International Journal on Software Tools for Technology Transfer 9(5-6), 457-470 (2007)
-
(2007)
International Journal on Software Tools for Technology Transfer
, vol.9
, Issue.5-6
, pp. 457-470
-
-
Breu, R.1
Popp, G.2
Alam, M.3
-
33
-
-
84900644980
-
-
emfText
-
emfText, http://www.emftext.org/index.php/EMFText
-
-
-
-
34
-
-
84900583168
-
-
XSB Porlog
-
XSB Porlog, http://xsb.sourceforge.net
-
-
-
-
35
-
-
84900607512
-
-
interProlog
-
interProlog, http://www.declarativa.com/interprolog
-
-
-
-
36
-
-
84900649397
-
-
Extensible Access Control Markup Language (XACML) version 3.0
-
Extensible Access Control Markup Language (XACML) version 3.0, http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-cs-01-en.pdf
-
-
-
|