-
1
-
-
0027667638
-
A calculus for access control in distributed systems
-
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15:706–734, 1993. 173, 174
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
2
-
-
0004595416
-
Supporting access control in an object-oriented database language
-
Vienna, Austria
-
R. Ahad, J. David, S. Gower, P. Lyngbaek, A. Marynowski, and E. Onuebge. Supporting access control in an object-oriented database language. In Proc. of the Int. Conference on Extending Database Technology (EDBT), Vienna, Austria, 1992. 171
-
(1992)
Proc. of the Int. Conference on Extending Database Technology (EDBT)
, pp. 171
-
-
Ahad, R.1
David, J.2
Gower, S.3
Lyngbaek, P.4
Marynowski, A.5
Onuebge, E.6
-
3
-
-
85031151129
-
The RSL99 language for role-based separation of duty constraints
-
Fairfax, VA, USA, October, 181
-
G. Ahn and R. Sandhu. The RSL99 language for role-based separation of duty constraints. In Proc. of the fourth ACM Workshop on Role-based Access Control, pages 43–54, Fairfax, VA, USA, October 1999. 181
-
(1999)
Proc. of the Fourth ACM Workshop on Role-Based Access Control
, pp. 43-54
-
-
Ahn, G.1
Sandhu, R.2
-
5
-
-
0004200684
-
-
Technical Report ESD-TR-73-51, Electronic System Division/AFSC, Bedford, MA, October, 138
-
J. P. Anderson. Computer security technology planning study. Technical Report ESD-TR-73-51, Electronic System Division/AFSC, Bedford, MA, October 1972. 138
-
(1972)
Computer Security Technology Planning Study
-
-
Anderson, J.P.1
-
6
-
-
85045339519
-
-
171
-
Apache http server version 2.0. http://www.apache.org/docs-2.0/misc/tutorials.html. 171
-
-
-
-
9
-
-
0011312984
-
Naming and grouping privileges to simplify security management in large database
-
Oakland, CA, April, 180, 181
-
Robert W. Baldwin. Naming and grouping privileges to simplify security management in large database. In Proceedings IEEE Computer Society Symposium on Research in Security and Privacy, pages 61–70, Oakland, CA, April 1990. 180, 181
-
(1990)
Proceedings IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 61-70
-
-
Baldwin, R.W.1
-
10
-
-
0003400251
-
-
Technical Report ESD-TR-278, The Mitre Corp., Bedford, MA, 152, 153
-
D. E. Bell. Secure computer systems: A refinement of the mathematical model. Technical Report ESD-TR-278, vol. 3, The Mitre Corp., Bedford, MA, 1973. 152, 153
-
(1973)
Secure Computer Systems: A Refinement of the Mathematical Model
, vol.3
-
-
Bell, D.E.1
-
11
-
-
0003400251
-
-
Technical Report ESD-TR-278, The Mitre Corp., Bedford, MA, 152
-
D. E. Bell and L. J. LaPadula. Secure computer system: Unified exposition and multics interpretation. Technical Report ESD-TR-278, vol. 4, The Mitre Corp., Bedford, MA, 1973. 152
-
(1973)
Secure computer system: Unified exposition and multics interpretation
, vol.4
-
-
Bell, D.E.1
Lapadula, L.J.2
-
12
-
-
0003400251
-
-
Technical Report ESD-TR-278, The Mitre Corp., Bedford, MA, 150, 152
-
D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations. Technical Report ESD-TR-278, vol. 1, The Mitre Corp., Bedford, MA, 1973. 150, 152
-
(1973)
Secure Computer Systems: Mathematical Foundations
, vol.1
-
-
Bell, D.E.1
Lapadula, L.J.2
-
13
-
-
0032153903
-
An access control model supporting periodicity constraints and temporal reasoning
-
September, 172, 173
-
E. Bertino, C. Bettini, E. Ferrari, and P. Samarati. An access control model supporting periodicity constraints and temporal reasoning. ACM Transactions on Database Systems, 23(3):231–285, September 1998. 172, 173
-
(1998)
ACM Transactions on Database Systems
, vol.23
, Issue.3
, pp. 231-285
-
-
Bertino, E.1
Bettini, C.2
Ferrari, E.3
Samarati, P.4
-
14
-
-
0346203703
-
Exception-based information flow control in object-oriented systems
-
165, 166
-
E. Bertino, S. de Capitani di Vimercati, E. Ferrari, and P. Samarati. Exception-based information flow control in object-oriented systems. ACM Transactions on Information and System Security (TISSEC), 1(1):26–65, 1998. 165, 166
-
(1998)
ACM Transactions on Information and System Security (TISSEC)
, vol.1
, Issue.1
, pp. 26-65
-
-
Bertino, E.1
de Capitani Di Vimercati, S.2
Ferrari, E.3
Samarati, P.4
-
15
-
-
0030732547
-
An extended authorization model for relational databases
-
January-February, 177
-
E. Bertino, P. Samarati, and S. Jajodia. An extended authorization model for relational databases. IEEE-TKDE, 9(1):85–101, January-February 1997. 177
-
(1997)
IEEE-TKDE
, vol.9
, Issue.1
, pp. 85-101
-
-
Bertino, E.1
Samarati, P.2
Jajodia, S.3
-
16
-
-
0003400255
-
-
Technical Report TR-3153, The Mitre Corporation, Bedford, MA, April, 153
-
K. J. Biba. Integrity considerations for secure computer systems. Technical Report TR-3153, The Mitre Corporation, Bedford, MA, April 1977. 153
-
(1977)
Integrity Considerations for Secure Computer Systems
-
-
Biba, K.J.1
-
18
-
-
0029700344
-
Decentralized trust management
-
Oakland, CA, May, 189
-
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proc. of 1996 IEEE Symposium on Security and Privacy, pages 164–173, Oakland, CA, May 1996. 189
-
(1996)
Proc. of 1996 IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
20
-
-
0034446895
-
A modular approach to composing access control policies
-
Athens, Greece, 187
-
P. Bonatti, S. de Capitani di Vimercati, and P. Samarati. A modular approach to composing access control policies. In Proc. of the Seventh ACM Conference on Computer and Communications Security, Athens, Greece, 2000. 187
-
(2000)
Proc. of the Seventh ACM Conference on Computer and Communications Security
-
-
Bonatti, P.1
de Capitani Di Vimercati, S.2
Samarati, P.3
-
21
-
-
0034449399
-
Regulating service access and information release on the web
-
Athens, Greece, 189, 190, 191
-
P. Bonatti and P. Samarati. Regulating service access and information release on the web. In Proc. of the Seventh ACM Conference on Computer and Communications Security, Athens, Greece, 2000. 189, 190, 191
-
(2000)
Proc. of the Seventh ACM Conference on Computer and Communications Security
-
-
Bonatti, P.1
Samarati, P.2
-
22
-
-
0024663219
-
The Chinese Wall security policy
-
Oakland, CA, 162, 163
-
D. F. C. Brewer and M. J. Nash. The Chinese Wall security policy. In Proc. IEEE Symposium on Security and Privacy, pages 215–228, Oakland, CA, 1989. 162, 163
-
(1989)
Proc. IEEE Symposium on Security and Privacy
, pp. 215-228
-
-
Brewer, D.F.C.1
Nash, M.J.2
-
24
-
-
0001470602
-
REFEREE: Trust management for Web applications
-
189
-
Y.-H. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, and M. Strauss. REFEREE: Trust management for Web applications. Computer Networks and ISDN Systems, 29(8–13):953–964, 1997. 189
-
(1997)
Computer Networks and ISDN Systems
, vol.29
, Issue.8-13
, pp. 953-964
-
-
Chu, Y.-H.1
Feigenbaum, J.2
Lamacchia, B.3
Resnick, P.4
Strauss, M.5
-
25
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
Oakland, CA, May, 178
-
D. D. Clark and D. R. Wilson. A comparison of commercial and military computer security policies. In Proceedings IEEE Computer Society Symposium on Security and Privacy, pages 184–194, Oakland, CA, May 1987. 178
-
(1987)
Proceedings IEEE Computer Society Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
26
-
-
0033723110
-
Design and implementation of an access control processor for XML documents
-
191
-
E. Damiani, S. de Capitani di Vimercati, S. Paraboschi, and P. Samarati. Design and implementation of an access control processor for XML documents. Computer Networks, 33(1–6):59–75, June 2000. 191
-
(2000)
Computer Networks
, vol.33
, Issue.1-6
, pp. 59-75
-
-
Damiani, E.1
de Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
27
-
-
84976482712
-
Fine grained access control for SOAP e-services
-
Hong Kong, China, May, 191
-
E. Damiani, S. de Capitani di Vimercati, S. Paraboschi, and P. Samarati. Fine grained access control for SOAP e-services. In Tenth International World Wide Web Conference, Hong Kong, China, May 2001. 191
-
(2001)
Tenth International World Wide Web Conference
-
-
Damiani, E.1
de Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
-
28
-
-
84856551233
-
-
ISo/IEC 9075:1999, 177, 180, 181
-
Database language SQL – part 2: Foundation (SQL/foundation). ISO International Standard, ISo/IEC 9075:1999, 1999. 177, 180, 181
-
(1999)
ISO International Standard
-
-
-
30
-
-
0032690110
-
Minimal data upgrading to prevent inference and association attacks
-
Philadelphia, CA, 156, 159
-
S. Dawson, S. de Capitani di Vimercati, P. Lincoln, and P. Samarati. Minimal data upgrading to prevent inference and association attacks. In Proc. of the 18th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS), Philadelphia, CA, 1999. 156, 159
-
(1999)
Proc. of the 18Th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (PODS)
-
-
Dawson, S.1
de Capitani Di Vimercati, S.2
Lincoln, P.3
Samarati, P.4
-
31
-
-
0016949746
-
A lattice model of secure information flow
-
May, 149, 161, 164
-
D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5):236–243, May 1976. 149, 161, 164
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
33
-
-
84937407052
-
Commutative filters for reducing inference threats in multilevel database systems
-
160
-
D. E. Denning. Commutative filters for reducing inference threats in multilevel database systems. In Proc. of the 1985 IEEE Symposium on Security and Privacy, pages 134–146, April 1985. 160
-
(1985)
Proc. of the 1985 IEEE Symposium on Security and Privacy
, pp. 134-146
-
-
Denning, D.E.1
-
35
-
-
0028404874
-
A model for evaluation and administration of security in object-oriented databases
-
169, 171
-
E. B. Fernandez, E. Gudes, and H. Song. A model for evaluation and administration of security in object-oriented databases. IEEE Transaction on Knowledge and Data Engineering, 6(2):275–292, 1994. 169, 171
-
(1994)
IEEE Transaction on Knowledge and Data Engineering
, vol.6
, Issue.2
, pp. 275-292
-
-
Fernandez, E.B.1
Gudes, E.2
Song, H.3
-
36
-
-
0002357382
-
Role-based access controls
-
Baltimore, MD, October, 181
-
D. Ferraiolo and R. Kuhn. Role-based access controls. In Proc. of the 15th NIST-NCSC Naional Computer Security Conference, pages 554–563, Baltimore, MD, October 1992. 181
-
(1992)
Proc. of the 15Th NIST-NCSC Naional Computer Security Conference
, pp. 554-563
-
-
Ferraiolo, D.1
Kuhn, R.2
-
37
-
-
0001439194
-
The compositional security checker: A tool for the verification of information flow security properties
-
161
-
R. Focardi and R. Gorrieri. The compositional security checker: A tool for the verification of information flow security properties. IEEE Transactions on Software Engineering, 23(9), September 1997. 161
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.9
-
-
Focardi, R.1
Gorrieri, R.2
-
38
-
-
0041901780
-
-
C. E. Landwehr and S. Jajodia, editors, Database Security, V: Status and Prospects, North-Holland, Elsevier Science Publishers. 159
-
T. D. Garvey and T. F. Lunt. Cover stories for database security. In C. E. Landwehr and S. Jajodia, editors, Database Security, V: Status and Prospects, North-Holland, 1992. Elsevier Science Publishers. 159
-
(1992)
Cover Stories for Database Security
-
-
Garvey, T.D.1
Lunt, T.F.2
-
41
-
-
84942812332
-
-
AFIPS Press, editor, Proc. Spring Jt. Computer Conference, Montvale, N. J., 140
-
G. S. Graham and P. J. Denning. Protection – principles and practice. In AFIPS Press, editor, Proc. Spring Jt. Computer Conference, volume 40, pages 417–429, Montvale, N. J., 1972. 140
-
(1972)
Protection – Principles and Practice
, vol.40
, pp. 417-429
-
-
Graham, G.S.1
Denning, P.J.2
-
42
-
-
84976657250
-
An authorization mechanism for a relational database system
-
175
-
P. P. Griffiths and B. W. Wade. An authorization mechanism for a relational database system. ACM Transactions on Database Systems, 1(3):242–255, 1976. 175
-
(1976)
ACM Transactions on Database Systems
, vol.1
, Issue.3
, pp. 242-255
-
-
Griffiths, P.P.1
Wade, B.W.2
-
43
-
-
0009431182
-
-
S. Jajodia and C. E. Landwehr, editors, Database Security, IV: Status and Prospects, North-Holland, Elsevier Science Publishers. 157
-
J. T. Haigh, R. C. O’Brien, and D. J. Thomsen. The LDV secure relational DBMS model. In S. Jajodia and C. E. Landwehr, editors, Database Security, IV: Status and Prospects, pages 265–279, North-Holland, 1991. Elsevier Science Publishers. 157
-
(1991)
The LDV Secure Relational DBMS Model
, pp. 265-279
-
-
Haigh, J.T.1
O’Brien, R.C.2
Thomsen, D.J.3
-
44
-
-
0016984825
-
Protection in operating systems
-
140
-
M. H. Harrison, W. L. Ruzzo, and J. D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461–471, 1976. 140
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.H.1
Ruzzo, W.L.2
Ullman, J.D.3
-
45
-
-
0029426927
-
Requirements of role-based access control for collaborative systems
-
Gaithersburg, MD, USA, November, 181
-
T. Jaeger and A. Prakash. Requirements of role-based access control for collaborative systems. In Proc. of the first ACM Workshop on Role-Based Access Control, Gaithersburg, MD, USA, November 1995. 181
-
(1995)
Proc. of the First ACM Workshop on Role-Based Access Control
-
-
Jaeger, T.1
Prakash, A.2
-
46
-
-
0025065897
-
Integrating an object-oriented data model with multilevel security
-
Oakland, CA, 166
-
S. Jajodia and B. Kogan. Integrating an object-oriented data model with multilevel security. In Proc. of the IEEE Symposium on Security and Privacy, pages 76–85, Oakland, CA, 1990. 166
-
(1990)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 76-85
-
-
Jajodia, S.1
Kogan, B.2
-
47
-
-
0007664281
-
Inference problems in multilevel secure database management systems
-
M. D. Abrams, S. Jajodia, and H. J. Podell, editors, IEEE Computer Society Press, 159
-
S. Jajodia and C. Meadows. Inference problems in multilevel secure database management systems. In M. D. Abrams, S. Jajodia, and H. J. Podell, editors, Information Security: An Integrated Collection of Essays, pages 570–584. IEEE Computer Society Press, 1995. 159
-
(1995)
Information Security: An Integrated Collection of Essays
, pp. 570-584
-
-
Jajodia, S.1
Meadows, C.2
-
48
-
-
30344445451
-
Flexible supporting for multiple access control policies
-
To appear. 168, 169, 181, 185, 186, 187, 188
-
S. Jajodia, P. Samarati, M. L. Sapino, and V. S. Subrahmanian. Flexible supporting for multiple access control policies. ACM Transactions on Database Systems, 2000. To appear. 168, 169, 181, 185, 186, 187, 188
-
(2000)
ACM Transactions on Database Systems
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
49
-
-
85029488605
-
Polyinstantiation for cover stories
-
Toulouse, France, November, 155, 159
-
S. Jajodia and R. Sandhu. Polyinstantiation for cover stories. In Proc. of the Second European Symposium on Research in Computer Security, pages 307–328, Toulouse, France, November 1992. 155, 159
-
(1992)
Proc. of the Second European Symposium on Research in Computer Security
, pp. 307-328
-
-
Jajodia, S.1
Sandhu, R.2
-
50
-
-
84976698642
-
Toward a multilevel secure relational data model
-
Denver, CO, May, 155, 158
-
S. Jajodia and Ravi S. Sandhu. Toward a multilevel secure relational data model. In Proc. CM SIGMOD International Conference on Management of Data, pages 50–59, Denver, CO, May 1991. 155, 158
-
(1991)
Proc. CM SIGMOD International Conference on Management of Data
, pp. 50-59
-
-
Jajodia, S.1
Sandhu, R.S.2
-
51
-
-
0023168930
-
Limiting the damage potential of discretionary Trojan Horses
-
Oakland, CA, 164
-
P. A. Karger. Limiting the damage potential of discretionary Trojan Horses. In Proc. IEEE Symposium on Security and Privacy, pages 32–37, Oakland, CA, 1987. 164
-
(1987)
Proc. IEEE Symposium on Security and Privacy
, pp. 32-37
-
-
Karger, P.A.1
-
52
-
-
84976667065
-
Share resource matrix methodology: An approach to identifying storage and timing channels
-
April, 161
-
R. Kemmerer. Share resource matrix methodology: an approach to identifying storage and timing channels. ACM Transactions on Computer Systems, 1(3):256– 277, April 1983. 161
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 256-277
-
-
Kemmerer, R.1
-
54
-
-
0019608720
-
Formal models for computer security
-
C. E. Landwehr. Formal models for computer security. ACM Computing Surveys, 13(3):247–278, 1981. 138
-
(1981)
ACM Computing Surveys
, vol.13
, Issue.3
, pp. 247-278
-
-
Landwehr, C.E.1
-
55
-
-
0003400251
-
-
Technical Report ESD-TR-278, The Mitre Corp., Bedford, MA, 152, 153, 164
-
L. J. LaPadula and D. E. Bell. Secure computer systems: A mathematical model. Technical Report ESD-TR-278, vol. 2, The Mitre Corp., Bedford, MA, 1973. 152, 153, 164
-
(1973)
Secure Computer Systems: A Mathematical Model
, vol.2
-
-
Lapadula, L.J.1
Bell, D.E.2
-
57
-
-
0033718059
-
A practically implementable and tractable delegation logic
-
Oakland, CA, 189
-
N. Li, B. N. Grosof, and J. Feigenbaum. A practically implementable and tractable delegation logic. In Proc. of the IEEE Symposium on Security and Privacy, pages 27–42, Oakland, CA, 2000. 189
-
(2000)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 27-42
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
58
-
-
0041177826
-
Access control policies: Some unanswered questions
-
Franconia, NH, June, 168
-
Teresa Lunt. Access control policies: Some unanswered questions. In IEEE Computer Security Foundations Workshop II, pages 227–245, Franconia, NH, June 1988. 168
-
(1988)
IEEE Computer Security Foundations Workshop II
, pp. 227-245
-
-
Lunt, T.1
-
59
-
-
0024663399
-
Aggregation and inference: Facts and fallacies
-
Oakland, CA, 159
-
T. F. Lunt. Aggregation and inference: Facts and fallacies. In Proc. IEEE Symposium on Security and Privacy, pages 102–109, Oakland, CA, 1989. 159
-
(1989)
Proc. IEEE Symposium on Security and Privacy
, pp. 102-109
-
-
Lunt, T.F.1
-
60
-
-
84878950991
-
Polyinstantiation: An inevitable part of a multilevel world
-
Franconia, New Hampshire, June, 155
-
T. F. Lunt. Polyinstantiation: an inevitable part of a multilevel world. In Proc. Of the IEEE Workshop on computer Security Foundations, pages 236–238, Franconia, New Hampshire, June 1991. 155
-
(1991)
Proc. of the IEEE Workshop on Computer Security Foundations
, pp. 236-238
-
-
Lunt, T.F.1
-
61
-
-
0025442003
-
The SeaView security model
-
June
-
T. F. Lunt, D. E. Denning, R. R. Schell, M. Heckman, and W. R. Shockley. The SeaView security model. IEEE Transactions on Software Engineering, 16(6):593– 607, June 1990. 155, 158
-
(1990)
IEEE Transactions on Software Engineering
, vol.16
, Issue.6
, pp. 593-607
-
-
Lunt, T.F.1
Denning, D.E.2
Schell, R.R.3
Heckman, M.4
Shockley, W.R.5
-
62
-
-
0025022888
-
Beyond the pale of MAC and DAC - Defining new forms of access control
-
Oakland, CA, 164
-
C. J. McCollum, J. R. Messing, and L. Notargiacomo. Beyond the pale of MAC and DAC - Defining new forms of access control. In Proc. of the IEEE Symposium on Security and Privacy, pages 190–200, Oakland, CA, 1990. 164
-
(1990)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 190-200
-
-
McCollum, C.J.1
Messing, J.R.2
Notargiacomo, L.3
-
63
-
-
0025211594
-
The specification and modeling of computer security
-
153
-
J. McLean. The specification and modeling of computer security. Computer, 23(1):9–16, January 1990. 153
-
(1990)
Computer
, vol.23
, Issue.1
, pp. 9-16
-
-
McLean, J.1
-
66
-
-
85045302382
-
-
Redwood City, CA, Version 7.0, January, 159
-
Oracle Corporation, Redwood City, CA. Trusted Oracle7 Server Administration Guide, Version 7.0, January 1993. 159
-
(1993)
Trusted Oracle7 Server Administration Guide
-
-
-
67
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
181
-
S. Osborn, R. Sandhu, and Q. Munawer. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security, 3(2):85–106, 2000. 181
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
68
-
-
48349113295
-
-
Technical Report NIST special publication 800-8, Institute of Standards and Technology, 160
-
W. R. Polk and L. E. Bassham. Security issues in the database language SQL. Technical Report NIST special publication 800-8, Institute of Standards and Technology, 1993. 160
-
(1993)
Security Issues in the Database Language SQL
-
-
Polk, W.R.1
Bassham, L.E.2
-
70
-
-
0005092487
-
A model of authorization for next-generation database systems
-
March, 167, 169
-
F. Rabitti, E. Bertino, W. Kim, and D. Woelk. A model of authorization for next-generation database systems. ACM TODS, 16(1):89–131, March 1991. 167, 169
-
(1991)
ACM TODS
, vol.16
, Issue.1
, pp. 89-131
-
-
Rabitti, F.1
Bertino, E.2
Kim, W.3
Woelk, D.4
-
72
-
-
0029713982
-
A communication agreement framework for ac-cess/action control
-
Oakland, CA, May, 189
-
M. Roscheisen and T. Winograd. A communication agreement framework for ac-cess/action control. In Proc. of 1996 IEEE Symposium on Security and Privacy, pages 154–163, Oakland, CA, May 1996. 189
-
(1996)
Proc. of 1996 IEEE Symposium on Security and Privacy
, pp. 154-163
-
-
Roscheisen, M.1
Winograd, T.2
-
76
-
-
0033652039
-
The NIST model for role-based access control: Towards a unified standard
-
Berlin Germany, July, 181
-
R. Sandhu, D. Ferraiolo, and R. Kuhn. The NIST model for role-based access control: Towards a unified standard. In Proc. of the fifth ACM Workshop on Role-based Access Control, pages 47–63, Berlin Germany, July 2000. 181
-
(2000)
Proc. of the Fifth ACM Workshop on Role-Based Access Control
, pp. 47-63
-
-
Sandhu, R.1
Ferraiolo, D.2
Kuhn, R.3
-
78
-
-
0037510581
-
Authentication, access control and intrusion detection
-
A. Tucker, editor, CRC Press Inc
-
R. Sandhu and P. Samarati. Authentication, access control and intrusion detection. In A. Tucker, editor, CRC Handbook of Computer Science and Engineering, pages 1929–1948. CRC Press Inc., 1997.
-
(1997)
CRC Handbook of Computer Science and Engineering
, pp. 1929-1948
-
-
Sandhu, R.1
Samarati, P.2
-
79
-
-
0024125647
-
Transaction control expressions for separation of duties
-
Orlando, FL, December, 183
-
Ravi S. Sandhu. Transaction control expressions for separation of duties. In Fourth Annual Computer Security Application Conference, pages 282–286, Orlando, FL, December 1988. 183
-
(1988)
Fourth Annual Computer Security Application Conference
, pp. 282-286
-
-
Sandhu, R.S.1
-
80
-
-
0030086382
-
Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role-based access control models
-
February
-
Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role-based access control models. IEEE Computer, 29(2):38–47, February 1996. 181
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
-
82
-
-
0003324667
-
Internet credential acceptance policies
-
Leuven, Belgium, 190
-
K. E. Seamons, W. Winsborough, and M. Winslett. Internet credential acceptance policies. In Proceedings of the Workshop on Logic Programming for Internet Applications, Leuven, Belgium, July 1997. 190
-
(1997)
Proceedings of the Workshop on Logic Programming for Internet Applications
-
-
Seamons, K.E.1
Winsborough, W.2
Winslett, M.3
-
83
-
-
85045300405
-
-
171
-
Security. http://java.sun.com/products/jdk/1.2/docs/guide/security/index.html. 171
-
-
-
-
85
-
-
0019658399
-
Access flow: A protection model which integrates access control and information flow
-
Oakland, CA, 164
-
A. Stoughton. Access flow: A protection model which integrates access control and information flow. In Proc. of the IEEE Symposium on Security and Privacy, pages 9–18, Oakland, CA, 1981. 164
-
(1981)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 9-18
-
-
Stoughton, A.1
-
87
-
-
3943068905
-
-
Technical Report TR ESD-TR-4-117, Case Western Reserve University, 165
-
K. G. Walter, W. F. Ogden, W. C. Rounds, F. T. Bradshaw, S. R. Ames, and D. G. Sumaway. Primitive models for computer security. Technical Report TR ESD-TR-4-117, Case Western Reserve University, 1974. 165
-
(1974)
Primitive Models for Computer Security
-
-
Walter, K.G.1
Ogden, W.F.2
Rounds, W.C.3
Bradshaw, F.T.4
Ames, S.R.5
Sumaway, D.G.6
-
88
-
-
84939548725
-
Automated trust negotiation
-
Hilton Head Island, SC, USA, January 25-27 2000. IEEE-CS. 190
-
W. Winsborough, K. E. Seamons, and V. Jones. Automated trust negotiation. In Proc. of the DARPA Information Survivability Conf. & Exposition, Hilton Head Island, SC, USA, January 25-27 2000. IEEE-CS. 190
-
Proc. of the DARPA Information Survivability Conf. & Exposition
-
-
Winsborough, W.1
Seamons, K.E.2
Jones, V.3
-
89
-
-
0030698978
-
-
Proceedings of ADL ’97 — Forum on Research and Tech. Advances in Digital Libraries, Washington, DC, May, 189, 190
-
M. Winslett, N. Ching, V. Jones, and I. Slepchin. Assuring security and privacy for digital library transactions on the web: Client and server security policies. In Proceedings of ADL ’97 — Forum on Research and Tech. Advances in Digital Libraries, Washington, DC, May 1997. 189, 190
-
(1997)
Assuring Security and Privacy for Digital Library Transactions on the Web: Client and Server Security Policies
-
-
Winslett, M.1
Ching, N.2
Jones, V.3
Slepchin, I.4
-
90
-
-
0028720693
-
Formal query languages for secure relational databases
-
December, 159
-
M. Winslett, K. Smith, and X. Qian. Formal query languages for secure relational databases. ACM Transactions on Database Systems, 19(4):626–662, December 1994. 159
-
(1994)
ACM Transactions on Database Systems
, vol.19
, Issue.4
, pp. 626-662
-
-
Winslett, M.1
Smith, K.2
Qian, X.3
-
91
-
-
84974750564
-
Authorizations in distributed systems: A new approach
-
184
-
T. Y. C. Woo and S. S. Lam. Authorizations in distributed systems: A new approach. Journal of Computer Security, 2(2,3):107–136, 1993. 184
-
(1993)
Journal of Computer Security
, vol.2
, Issue.2-3
, pp. 107-136
-
-
Woo, T.Y.C.1
Lam, S.S.2
-
93
-
-
0034449542
-
An efficient complete strategy for automated trust negotiation over the internet
-
Athens, Greece, November, 190
-
T. Yu, X. Ma, and M. Winslett. An efficient complete strategy for automated trust negotiation over the internet. In Proceedings of 7th ACM Computer and Communication Security, Athens, Greece, November 2000. 190
-
(2000)
Proceedings of 7Th ACM Computer and Communication Security
-
-
Yu, T.1
Ma, X.2
Winslett, M.3
|