-
1
-
-
84956993736
-
Role-based authorization constraints specification
-
4 (Nov. 2000
-
Ahn, G.-J., Sandhu, R., 2000. Role-based authorization constraints specification.ACM Trans. Inf. Syst. Security 3, 4 (Nov. 2000).
-
(2000)
ACM Trans. Inf. Syst. Security
, vol.3
-
-
Ahn, G.-J.1
Sandhu, R.2
-
3
-
-
84974776848
-
The extended schematic protection model
-
Ammann, P., Sandhu, R., 1992. The extended schematic protection model.J. Comput. Security 1 (1992).
-
(1992)
J. Comput. Security
, vol.1
-
-
Ammann, P.1
Sandhu, R.2
-
4
-
-
0001659355
-
One-representative safety analysis in the non-monotonic transform model
-
1994), IEEE
-
Ammann, P., Sandhu, R., 1994. One-representative safety analysis in the non-monotonic transform model. In Proceedings of the 7th IEEE Computer Security Foundations Workshop (1994), IEEE, 138-149.
-
(1994)
Proceedings of the 7th IEEE Computer Security Foundations Workshop
, pp. 138-149
-
-
Ammann, P.1
Sandhu, R.2
-
5
-
-
0008724838
-
An authorization model for temporal and derived data: Securing information portals
-
1 (Feb. 2002
-
Atluri, V., Gal, A., 2002. An authorization model for temporal and derived data: Securing information portals.ACM Trans. Inf. Syst. Security 5, 1 (Feb. 2002).
-
(2002)
ACM Trans. Inf. Syst. Security
, vol.5
-
-
Atluri, V.1
Gal, A.2
-
6
-
-
84865788031
-
A model of OASIS role-based access control and its support for active security
-
4 (Nov. 2002
-
Bacon, J., Moody, K., Yao, W., 2002. A model of OASIS role-based access control and its support for active security.ACM Trans. Inf. Sys. Security 5, 4 (Nov. 2002).
-
(2002)
ACM Trans. Inf. Sys. Security
, vol.5
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
7
-
-
85084162952
-
A domain and type enforcement UNIX prototype
-
Badger, L., Sterne, D. F., Sherman, D. L., Walker, K. M., Haghighat, S. A., 1995. A domain and type enforcement UNIX prototype. In Proceedings of the 1995 USENIX Security Symposium, 1995. Also available from TIS online archives.
-
(1995)
Proceedings of the 1995 USENIX Security Symposium
-
-
Badger, L.1
Sterne, D.F.2
Sherman, D.L.3
Walker, K.M.4
Haghighat, S.A.5
-
8
-
-
0003400251
-
Secure computer systems: Mathematical foundations
-
ESD-TR-73-278, Mitre Corp. 1973
-
Bell, D., Lapadula, L., 1973. Secure computer systems: Mathematical foundations (Vol. 1). Tech. Rep. ESD-TR-73-278, Mitre Corp. 1973.
-
(1973)
Tech. Rep.
, vol.1
-
-
Bell, D.1
Lapadula, L.2
-
9
-
-
0041524664
-
A logical framework for reasoning about access control models
-
1 (Feb. 2003
-
Bertino, E., Catania, B., Ferrari, E., Perlasca, P., 2003. A logical framework for reasoning about access control models.ACM Trans. Inf. Syst. Security 6, 1 (Feb. 2003).
-
(2003)
ACM Trans. Inf. Syst. Security
, vol.6
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
10
-
-
0003400255
-
Integrity considerations for secure computer systems
-
MTR-3153, Mitre Corp. June 1975
-
Biba, K. J., 1975. Integrity considerations for secure computer systems. Tech. Rep. MTR-3153, Mitre Corp. June 1975.
-
(1975)
Tech. Rep.
-
-
Biba, K.J.1
-
11
-
-
0004078695
-
The Key Note trust-management system
-
version 2. IETF RFC 2704, Sept. 1999
-
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A., 1999. The Key Note trust-management system, version 2. IETF RFC 2704, Sept. 1999.
-
(1999)
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
12
-
-
0003282331
-
A practical alternative to hierarchical integrity policies
-
Gaithersburg, MD, 1985
-
Boebert, W. E., Kain, R. Y., 1985. A practical alternative to hierarchical integrity policies. In Proceedings of the 8th National Computer Security Conference (Gaithersburg, MD, 1985).
-
(1985)
Proceedings of the 8th National Computer Security Conference
-
-
Boebert, W.E.1
Kain, R.Y.2
-
14
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate intranet
-
1 (Feb. 1999
-
Ferraiolo, D., Barkley, J., Kuhn, D. R., 1999. A role-based access control model and reference implementation within a corporate intranet.ACM Trans. Inf. Syst. Security 2, 1 (Feb. 1999).
-
(1999)
ACM Trans. Inf. Syst. Security
, vol.2
-
-
Ferraiolo, D.1
Barkley, J.2
Kuhn, D.R.3
-
15
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
3 (Aug. 2001
-
Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D. R., Chandramouli, R., 2001. Proposed NIST standard for role-based access control.ACM Trans. Inf. Syst. Security 4, 3 (Aug. 2001).
-
(2001)
ACM Trans. Inf. Syst. Security
, vol.4
-
-
Ferraiolo, D.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
16
-
-
77954107830
-
Secure database systems
-
O. Diaz and M. Piattini, Eds., 2000
-
Ferrari, E., Thuraisingham, B., 2000. Secure database systems. In Advanced Databases: Technology and Design O. Diaz and M. Piattini, Eds., 2000.
-
(2000)
Databases: Technology and Design
-
-
Ferrari, E.1
Thuraisingham, B.2
-
17
-
-
0016984825
-
Protection in operating systems
-
8 (Aug. 1976
-
Harrison, M. A., Ruzzo, W. L., Ullman, J. D., 1976. Protection in operating systems.Commun. ACM 19, 8 (Aug. 1976).
-
(1976)
Commun. ACM
, vol.19
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
19
-
-
85006937063
-
Practical safety in flexible access control models
-
2 (May 2001
-
Jaeger, T., Tidswell, J. E., 2001. Practical safety in flexible access control models.ACM Trans. Inf. Syst. Security 4, 2 (May 2001).
-
(2001)
ACM Trans. Inf. Syst. Security
, vol.4
-
-
Jaeger, T.1
Tidswell, J.E.2
-
20
-
-
0242540396
-
Managing access control policies using access control spaces
-
June 2002
-
Jaeger, T., Edwards, A., Zhang, X., 2002. Managing access control policies using access control spaces. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, June 2002.
-
(2002)
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies
-
-
Jaeger, T.1
Edwards, A.2
Zhang, X.3
-
21
-
-
0030677524
-
A logical language for expressing authorizations
-
Jajodia, S., Samarati, P., Subrahmanian, V., 1997. A logical language for expressing authorizations. In Proceedings of the IEEE Symposium on Security and Privacy, 1997.
-
(1997)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.3
-
22
-
-
0242625215
-
Temporal hierarchies and inheritance semantics for GTRBAC
-
June 2002
-
Joshi, J., Bertino, E., Ghafoor, A., 2002. Temporal hierarchies and inheritance semantics for GTRBAC. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, June 2002.
-
(2002)
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies
-
-
Joshi, J.1
Bertino, E.2
Ghafoor, A.3
-
24
-
-
85024274228
-
Decidability of safety in graph-based models for access control
-
2002, Oct. 2002
-
Koch, M., Mancini, L., Parisi-Presicce, F., 2002. Decidability of safety in graph-based models for access control. In Proceedings of ESORICS 2002, Oct. 2002.
-
(2002)
Proceedings of ESORICS
-
-
Koch, M.1
Mancini, L.2
Parisi-Presicce, F.3
-
25
-
-
85008430937
-
A graph formalism for RBAC
-
3 (Aug. 2002
-
Koch, M., Mancini, L., Parisi-Presicce, F., 2002. A graph formalism for RBAC.ACM Trans. Inf. Syst. Security 5, 3 (Aug. 2002).
-
(2002)
ACM Trans. Inf. Syst. Security
, vol.5
-
-
Koch, M.1
Mancini, L.2
Parisi-Presicce, F.3
-
26
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
1 (Feb. 2003
-
Li, N., Grosof, B., Feigenbaum, J., 2003. Delegation logic: A logic-based approach to distributed authorization.ACM Trans. Inf. Syst. Security 6, 1 (Feb. 2003).
-
(2003)
ACM Trans. Inf. Syst. Security
, vol.6
-
-
Li, N.1
Grosof, B.2
Feigenbaum, J.3
-
27
-
-
0038825043
-
Beyond proof-of-compliance: Safety and availability analysis in trust management
-
May 2003
-
Li, N., Winsborough, W. H., Mitchell, J. C., 2003. Beyond proof-of-compliance: Safety and availability analysis in trust management. In Proceedings of the IEEE Symposium on Security and Privacy, May 2003.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
28
-
-
0033646048
-
A model of accountability, confidentiality, and override for healthcare and other applications
-
July 2000
-
Longstaff, J. J., Lockyer, M. A., Capper, G., Thick, M. G., 2000. A model of accountability, confidentiality, and override for healthcare and other applications. In Proceedings of 5th ACM Workshop on Role-Based Access Control, July 2000.
-
(2000)
Proceedings of 5th ACM Workshop on Role-Based Access Control
-
-
Longstaff, J.J.1
Lockyer, M.A.2
Capper, G.3
Thick, M.G.4
-
29
-
-
0001940210
-
The role graph model and conflict of interest
-
ACM, February 1999
-
Nyanchama, M., Osborn, S., 1999. The role graph model and conflict of interest.ACM Trans. Inf. Syst. Security 2, 1, ACM, February 1999.
-
(1999)
ACM Trans. Inf. Syst. Security
, vol.2
, Issue.1
-
-
Nyanchama, M.1
Osborn, S.2
-
30
-
-
0028699105
-
Role-based access control: A multidimensional view
-
Sandhu, R. S., Coyne, E., Feinstein, H. L., Youman, C. E., 1994. Role-based access control: A multidimensional view. In Proceedings of the 10th Computer Security Applications Conference, 1994.
-
(1994)
Proceedings of the 10th Computer Security Applications Conference
-
-
Sandhu, R.S.1
Coyne, E.2
Feinstein, H.L.3
Youman, C.E.4
-
31
-
-
0030086382
-
Role-based access control models
-
2 (Feb. 1996
-
Sandhu, R. S., Coyne, E., Feinstein, H. L., Youman, C. E., 1996. Role-based access control models.IEEE Computer 29, 2 (Feb. 1996), 38-47.
-
(1996)
IEEE Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.2
Feinstein, H.L.3
Youman, C.E.4
-
32
-
-
33748161983
-
Configuring the SELinux policy
-
NAI Labs Rep. 02-007, available at www.nsa.gov/selinux. June 2002
-
Smalley, S., 2002. Configuring the SELinux policy. NAI Labs Rep. 02-007, available at www.nsa.gov/selinux. June 2002.
-
(2002)
-
-
Smalley, S.1
-
34
-
-
85024285628
-
An analysis of application-specific security policies
-
Sterne, D., Branstad, M., Hubbard, B., Mayer, B., Wolcott, D., 1991. An analysis of application-specific security policies. In Proceedings of the 14th National Computer Security Conference, 1991.
-
(1991)
Proceedings of the 14th National Computer Security Conference
-
-
Sterne, D.1
Branstad, M.2
Hubbard, B.3
Mayer, B.4
Wolcott, D.5
-
35
-
-
84961645820
-
IMPROVING THE GRANULARITY OF ACCESS CONTROL FOR WINDOWS 2000
-
4 (Nov. 2002
-
Swift, M., Brundett, P., Vandyke, C., Garg, P., Hopkins, A., Chan, S., Goertzel, M., Jensenworth, G., 2002. IMPROVING THE GRANULARITY OF ACCESS CONTROL FOR WINDOWS 2000. ACM Trans. Inf. Syst. Security 5, 4 (Nov. 2002).
-
(2002)
ACM Trans. Inf. Syst. Security
, vol.5
-
-
Swift, M.1
Brundett, P.2
Vandyke, C.3
Garg, P.4
Hopkins, A.5
Chan, S.6
Goertzel, M.7
Jensenworth, G.8
|