-
1
-
-
0011560546
-
The transitive reduction of a directed graph
-
AHO, A. V., GAREY, M. R., AND ULLMAN, J. D. 1972. The transitive reduction of a directed graph. SIAM J. Comput. 1, 2, 131-137.
-
(1972)
SIAM J. Comput.
, vol.1
, Issue.2
, pp. 131-137
-
-
Aho, A.V.1
Garey, M.R.2
Ullman, J.D.3
-
2
-
-
0025028340
-
Naming & grouping privileges to simplify security management in large databases
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
BALDWIN, R. 1990. Naming & grouping privileges to simplify security management in large databases. In Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, Los Alamitos, Calif., pp. 116-132.
-
(1990)
Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy
, pp. 116-132
-
-
Baldwin, R.1
-
3
-
-
0004063990
-
-
EDS. World Scientific
-
EHRIG, H., ENGELS, G., KREOWSKI, H.-J., AND ROZENBERG, G., EDS. 1999. Handbook of Graph Grammars and Computing by Graph Transformations. Vol. II: Applications, Languages, and Tools. World Scientific.
-
(1999)
Handbook of Graph Grammars and Computing by Graph Transformations. Vol. II: Applications, Languages, and Tools
-
-
Ehrig, H.1
Engels, G.2
Kreowski, H.-J.3
Rozenberg, G.4
-
4
-
-
84992227458
-
Proposed NIST standard for role-based access control
-
FERRAIOLO, D. F., SANDHU, R., GAVRILA, S., KUHN, D. R., AND CHANDRAMOULI, R. 2001. Proposed NIST standard for role-based access control. ACM Trans. Inf. Syst. Secu. 4, 3, 222-274.
-
(2001)
ACM Trans. Inf. Syst. Secu.
, vol.4
, Issue.3
, pp. 222-274
-
-
Ferraiolo, D.F.1
Sandhu, R.2
Gavrila, S.3
Kuhn, D.R.4
Chandramouli, R.5
-
5
-
-
0031611731
-
Formal specification for role based access control user/role and role/role relationship management
-
ACM, New York
-
GAVRILA, S. I. AND BARKLEY, J. F. 1998. Formal specification for role based access control user/role and role/role relationship management. In Proceedings of 3rd ACM Workshop on Role-Based Access Control. ACM, New York, pp. 81-90.
-
(1998)
Proceedings of 3rd ACM Workshop on Role-Based Access Control
, pp. 81-90
-
-
Gavrila, S.I.1
Barkley, J.F.2
-
6
-
-
84949934945
-
Refinements of graph transformation systems via rule expressions
-
H. Ehrig, G. Engels, H.-J. Kreowski, and G. Rozenberg, eds. Lecture Notes in Computer Science, Springer-Verlag, New York
-
GROSSE-RHODE, M., PARISI-PRESICCE, F., AND SIMEONI, M. 2000. Refinements of graph transformation systems via rule expressions. In Proceedings of TAGT'98, H. Ehrig, G. Engels, H.-J. Kreowski, and G. Rozenberg, eds. Lecture Notes in Computer Science, vol. 1764. Springer-Verlag, New York, pp. 368-382.
-
(2000)
Proceedings of TAGT'98
, vol.1764
, pp. 368-382
-
-
Grosse-Rhode, M.1
Parisi-Presicce, F.2
Simeoni, M.3
-
7
-
-
18944376711
-
Ensuring consistency of conditional graph grammars-A constructive approach
-
A. Corradini, and U. Montanari, eds. Elsevier North-Holland, Amsterdam, The Netherlands
-
HECKEL, R., AND WAGNER, A. 1995. Ensuring consistency of conditional graph grammars-A constructive approach. In Proceedings of SEGRAGRA'95, Volume 2 of Electronic Notes of TCS A. Corradini, and U. Montanari, eds. Elsevier North-Holland, Amsterdam, The Netherlands, pp. 95-103. http://www.elsevier.nl/locate/entcs/volume2.html.
-
(1995)
Proceedings of SEGRAGRA'95, Volume 2 of Electronic Notes of TCS
, pp. 95-103
-
-
Heckel, R.1
Wagner, A.2
-
8
-
-
84944075708
-
A formal model for role-based access control using graph transformation
-
F. Cuppens. et al. eds. Lecture Notes in Computer Science, Springer Verlag, New York
-
KOCH, M., MANCINI, L. V., AND PARISI-PRESICCE, F. 2000. A formal model for role-based access control using graph transformation. In Proceedings of the 6th European Symposium on Research in Computer Security (ESORICS 2000) F. Cuppens. et al. eds. Lecture Notes in Computer Science, vol. 1895. Springer Verlag, New York, pp. 122-139.
-
(2000)
Proceedings of the 6th European Symposium on Research in Computer Security (ESORICS 2000)
, vol.1895
, pp. 122-139
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
9
-
-
0035790747
-
On the specification and evolution of access control policies
-
New York
-
KOCH, M., MANCINI, L. V., AND PARISI-PRESICCE, F. 2001. On the specification and evolution of access control policies. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies ACM, New York, pp. 121-130.
-
(2001)
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies ACM
, pp. 121-130
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
10
-
-
84957011508
-
Decidability of safety in graph-based models for access control
-
to appear
-
KOCH, M., MANCINI, L. V., AND PARISI-PRESICCE, F. 2002. Decidability of safety in graph-based models for access control. In Proceedings of the 7th European Symposium on Research in Computer Security (ESORICS 2002), Lecture Notes in Computer Science, to appear.
-
(2002)
Proceedings of the 7th European Symposium on Research in Computer Security (ESORICS 2002), Lecture Notes in Computer Science
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
11
-
-
0010573970
-
Access right administration in role-based security systems
-
North Holland, Amsterdam, The Netherlands
-
NYANCHAMA, M., AND OSBORN, S. 1994. Access right administration in role-based security systems. In Proceedings of IFIP WG 11.3 Database Security, Vol. VIII. North Holland, Amsterdam, The Netherlands, pp. 37-56.
-
(1994)
Proceedings of IFIP WG 11.3 Database Security
, vol.8
, pp. 37-56
-
-
Nyanchama, M.1
Osborn, S.2
-
12
-
-
0001940210
-
The role graph model and conflict of interest
-
NYANCHAMA, M., AND OSBORN, S. 1999. The role graph model and conflict of interest. ACM Trans. Inf. Syst. Sec. 1, 2, 3-33.
-
(1999)
ACM Trans. Inf. Syst. Sec.
, vol.1
, Issue.2
, pp. 3-33
-
-
Nyanchama, M.1
Osborn, S.2
-
13
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
OSBORN, S., SANDHU, R., AND MUNAWER, Q. 2000. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Sec. 3, 2, 85-106.
-
(2000)
ACM Trans. Inf. Syst. Sec.
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer, Q.3
-
15
-
-
19344364618
-
Role-based access control
-
Academic Press, Orlands, Fla
-
SANDHU, R. S. 1998. Role-based access control. In Advances in Computers, Vol. 46. Academic Press, Orlands, Fla.
-
(1998)
Advances in Computers
, vol.46
-
-
Sandhu, R.S.1
-
16
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
SANDHU, R. S., BHAMIDIPATI, V., AND MUNAWER, Q. 1999. The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security 2, 1, 105-135.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.1
, pp. 105-135
-
-
Sandhu, R.S.1
Bhamidipati, V.2
Munawer, Q.3
-
17
-
-
0030086382
-
Role-based access control models
-
SANDHU, R. S., COYNE, E., FEINSTEIN, H., AND YOUMAN, C. 1996. Role-based access control models. IEEE Comput. 29, 2, 38-47.
-
(1996)
IEEE Comput
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
18
-
-
0033652039
-
The NIST Model for Role-Based Access Control: Towards A Unified Standard
-
ACM, New York
-
SANDHU, R., FERRAIOLO, D., AND KUHN, R. 2000. The NIST Model for Role-Based Access Control: Towards A Unified Standard. In Proceedings of the 5th ACM Workshop on Role-Based Access Control. ACM, New York, pp. 47-63.
-
(2000)
Proceedings of the 5th ACM Workshop on Role-Based Access Control
, pp. 47-63
-
-
Sandhu, R.1
Ferraiolo, D.2
Kuhn, R.3
|