-
1
-
-
85084162095
-
The CRISIS wide area security architecture
-
Berkeley, CA
-
Belani, E., Vahdat, A., Anderson, T., and Dahlin, M. 1998. The CRISIS wide area security architecture. In Proceedings of the 7th USENIX Security Symposium (Jan.). USENIX Assoc., Berkeley, CA, 15-29
-
(1998)
Proceedings of the 7th USENIX Security Symposium (Jan.). USENIX Assoc.
, pp. 15-29
-
-
Belani, E.1
Vahdat, A.2
Anderson, T.3
Dahlin, M.4
-
2
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
(Feb.)
-
Bertino, E., Ferrari, E., and Atluri, V. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 1, 2 (Feb.), 65-104
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
3
-
-
0030092390
-
Checking for race conditions in file accesses
-
Bishop, M. and Dilger, M. 1996. Checking for race conditions in file accesses. Comput. Syst. 9, 2, 131-152
-
(1996)
Comput. Syst.
, vol.9
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
5
-
-
0026982115
-
Computational mail as network infrastructure for computer-supported cooperative work
-
In Proceedings of the ACM Conference on Computer-Supported Cooperative Work (CSCW '92, Toronto, Canada, Oct. 31-Nov. 4), M. Mantel and R. Baecker, Eds. ACM Press, New York, NY
-
Borenstein, N. S. 1992. Computational mail as network infrastructure for computer-supported cooperative work. In Proceedings of the ACM Conference on Computer-Supported Cooperative Work (CSCW '92, Toronto, Canada, Oct. 31-Nov. 4), M. Mantel and R. Baecker, Eds. ACM Press, New York, NY, 67-74
-
(1992)
, pp. 67-74
-
-
Borenstein, N.S.1
-
6
-
-
0028732129
-
Email with a mind of its own: The Safe-Tcl language for enabled mail
-
Borenstein, N. S. 1994. Email with a mind of its own: The Safe-Tcl language for enabled mail. In ULPAA '94. 389-402
-
(1994)
ULPAA '94
, pp. 389-402
-
-
Borenstein, N.S.1
-
7
-
-
0024663219
-
The Chinese Wall security policy
-
In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA
-
Brewer, D. F. C. and Nash, M. J. 1989. The Chinese Wall security policy. In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA, 206-214
-
(1989)
, pp. 206-214
-
-
Brewer, D.F.C.1
Nash, M.J.2
-
9
-
-
0029697575
-
Java security: From HotJava to Netscape and beyond
-
In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA, May). IEEE Press, Piscataway, NJ
-
Dean, D., Felten, E., and Wallach, D. 1996. Java security: From HotJava to Netscape and beyond. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, CA, May). IEEE Press, Piscataway, NJ
-
(1996)
-
-
Dean, D.1
Felten, E.2
Wallach, D.3
-
10
-
-
0000338326
-
Programming semantics for multiprogrammed computations
-
(Mar.)
-
Dennis, J. B. and Van Horn, E. C. 1966. Programming semantics for multiprogrammed computations. Commun. ACM 9, 3 (Mar.), 143-155
-
(1966)
Commun. ACM
, vol.9
, Issue.3
, pp. 143-155
-
-
Dennis, J.B.1
Van Horn, E.C.2
-
12
-
-
85024245670
-
Specifying security for CSCW systems
-
IEEE Computer Society Press, Los Alamitos, CA
-
Foley, S. and Jacob, J. 1991. Specifying security for CSCW systems. In Proceedings of the Fourth IEEE Workshop on Computer Security Foundations. IEEE Computer Society Press, Los Alamitos, CA, 136-145
-
(1991)
Proceedings of the Fourth IEEE Workshop on Computer Security Foundations
, pp. 136-145
-
-
Foley, S.1
Jacob, J.2
-
14
-
-
3643075543
-
Penguin: Java done right
-
Gallo, F. S. 1996. Penguin: Java done right. Perl J. 1, 2, 10-12
-
(1996)
Perl J.
, vol.1
, Issue.2
, pp. 10-12
-
-
Gallo, F.S.1
-
15
-
-
0024984237
-
An architecture for practical delegation in a distributed system
-
In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA
-
Gasser, M. and Mcdermott, E. 1990. An architecture for practical delegation in a distributed system. In Proceedings of the IEEE Symposium on Research in Security and Privacy (Oakland, CA). IEEE Computer Society Press, Los Alamitos, CA, 20-30
-
(1990)
, pp. 20-30
-
-
Gasser, M.1
Mcdermott, E.2
-
16
-
-
0031365182
-
Role templates for content-based access control
-
(RBAC '97, Fairfax, VA, Nov. 6-7, 1997), C. Youman, E. Coyne, and T. Jaeger, Eds. ACM Press, New York, NY
-
Giuri, L. and Iglio, P. 1997. Role templates for content-based access control. In Proceedings of the Second ACM Workshop on Role-based Access Control (RBAC '97, Fairfax, VA, Nov. 6-7, 1997), C. Youman, E. Coyne, and T. Jaeger, Eds. ACM Press, New York, NY, 153-159
-
(1997)
Proceedings of the Second ACM Workshop on Role-based Access Control
, pp. 153-159
-
-
Giuri, L.1
Iglio, P.2
-
17
-
-
0027002106
-
Active mail-a framework for implementing groupware
-
In Proceedings of the ACM Conference on Computer-Supported Cooperative Work (CSCW '92, Toronto, Canada, Oct. 31-Nov. 4), M. Mantel and R. Baecker, Eds. ACM Press, New York, NY
-
Goldberg, Y., Safran, M., and Shapiro, E. 1992. Active mail-a framework for implementing groupware. In Proceedings of the ACM Conference on Computer-Supported Cooperative Work (CSCW '92, Toronto, Canada, Oct. 31-Nov. 4), M. Mantel and R. Baecker, Eds. ACM Press, New York, NY, 75-83
-
(1992)
, pp. 75-83
-
-
Goldberg, Y.1
Safran, M.2
Shapiro, E.3
-
18
-
-
0031120737
-
Enclaves: Enabling secure communication over the internet
-
(Apr.)
-
Gong, L. 1997. Enclaves: Enabling secure communication over the internet. IEEE J. Sel. Areas Commun. 15, 3 (Apr.)
-
(1997)
IEEE J. Sel. Areas Commun.
, vol.15
, pp. 3
-
-
Gong, L.1
-
19
-
-
0003313661
-
Java security: Present and near future
-
Gong, L. 1997. Java security: Present and near future. IEEE Micro 17, 3, 14-19
-
(1997)
IEEE Micro
, vol.17
, Issue.3
, pp. 14-19
-
-
Gong, L.1
-
20
-
-
0003518498
-
The Java Language Specification
-
Addison-Wesley, Reading, MA
-
Gosling, J., Joy, B., and Steele, G. 1996. The Java Language Specification. Addison-Wesley, Reading, MA
-
(1996)
-
-
Gosling, J.1
Joy, B.2
Steele, G.3
-
21
-
-
0344001283
-
Providing policy-neutral and transparent access control in extensible systems
-
Technical Report Number UW-CSE-98-02-02. University of Washington, Seattle, WA
-
Grimm, R. and Bershad, B. N. 1998. Providing policy-neutral and transparent access control in extensible systems. Technical Report Number UW-CSE-98-02-02. University of Washington, Seattle, WA
-
(1998)
-
-
Grimm, R.1
Bershad, B.N.2
-
22
-
-
0030721196
-
A protection scheme for mobile agents on Java
-
(MOBICOM '97, Budapest, Hungary, Sept. 26-30, 1997), L. Pap, K. Sohraby, D. B. Johnson, and C. Rose, Eds. ACM Press, New York, NY
-
Hagimont, D. and Ismail, L. 1997. A protection scheme for mobile agents on Java. In Proceedings of the 3rd Annual ACM/IEEE International Conference on Mobile Computing and Networking (MOBICOM '97, Budapest, Hungary, Sept. 26-30, 1997), L. Pap, K. Sohraby, D. B. Johnson, and C. Rose, Eds. ACM Press, New York, NY, 215-222
-
(1997)
Proceedings of the 3rd Annual ACM/IEEE International Conference on Mobile Computing and Networking
, pp. 215-222
-
-
Hagimont, D.1
Ismail, L.2
-
24
-
-
4544248480
-
IMPLEMENTING MULTIPLE PROTECTION DOMAINS IN JAVA
-
USENIX Assoc., Berkeley, CA
-
Hawblitzel, C., Chang, C.-C., Czajkowski, G., Hu, D., and Von Eicken, T. 1998. IMPLEMENTING MULTIPLE PROTECTION DOMAINS IN JAVA. IN Proceedings of the 1998 USENIX Conference. USENIX Assoc., Berkeley, CA
-
(1998)
Proceedings of the 1998 USENIX Conference
-
-
Hawblitzel, C.1
Chang, C.-C.2
Czajkowski, G.3
Hu, D.4
Von Eicken, T.5
-
25
-
-
0031234163
-
A flexible security model for using Internet content
-
(Sept.)
-
Islam, N., Anand, R., Jaeger, T., and Rao, J. R. 1997. A flexible security model for using Internet content. IEEE Softw. 14, 5 (Sept.)
-
(1997)
IEEE Softw.
, vol.14
, pp. 5
-
-
Islam, N.1
Anand, R.2
Jaeger, T.3
Rao, J.R.4
-
26
-
-
0032644713
-
Flexible access control using IPC redirection
-
Jaeger, T., Elphinstone, K., Liedtke, J., Panteleenko, V., and Park, Y. 1999. Flexible access control using IPC redirection. In Proceedings of the 7th Workshop on Hot Topics in Operating Systems
-
(1999)
Proceedings of the 7th Workshop on Hot Topics in Operating Systems
-
-
Jaeger, T.1
Elphinstone, K.2
Liedtke, J.3
Panteleenko, V.4
Park, Y.5
-
27
-
-
0031379041
-
A role-based access control model for protection domain derivation and management
-
(RBAC '97, Fairfax, VA, Nov. 6-7, 1997), C. Youman, E. Coyne, and T. Jaeger, Eds. ACM Press, New York, NY
-
Jaeger, T., Giraud, F., Islam, N., and Liedtke, J. 1997. A role-based access control model for protection domain derivation and management. In Proceedings of the Second ACM Workshop on Role-based Access Control (RBAC '97, Fairfax, VA, Nov. 6-7, 1997), C. Youman, E. Coyne, and T. Jaeger, Eds. ACM Press, New York, NY, 95-106
-
(1997)
Proceedings of the Second ACM Workshop on Role-based Access Control
, pp. 95-106
-
-
Jaeger, T.1
Giraud, F.2
Islam, N.3
Liedtke, J.4
-
28
-
-
85084160573
-
Operating system protection for fine-grained programs
-
Berkeley, CA
-
Jaeger, T., Liedtke, J., and Islam, N. 1998. Operating system protection for fine-grained programs. In Proceedings of the 7th USENIX Security Symposium (Jan.). USENIX Assoc., Berkeley, CA, 143-156
-
(1998)
Proceedings of the 7th USENIX Security Symposium (Jan.). USENIX Assoc.
, pp. 143-156
-
-
Jaeger, T.1
Liedtke, J.2
Islam, N.3
-
29
-
-
84897398755
-
Support for the file system security requirements of computational E-mail systems
-
In Proceedings of the 2nd ACM Conference on Computer and Communications Security (Fairfax, VA, Nov. 2-4), D. Denning, R. Pyle, R. Ganesan, and R. Sandhu, Eds. ACM Press, New York, NY
-
Jaeger, T. and Prakash, A. 1994. Support for the file system security requirements of computational E-mail systems. In Proceedings of the 2nd ACM Conference on Computer and Communications Security (Fairfax, VA, Nov. 2-4), D. Denning, R. Pyle, R. Ganesan, and R. Sandhu, Eds. ACM Press, New York, NY, 1-9
-
(1994)
, pp. 1-9
-
-
Jaeger, T.1
Prakash, A.2
-
30
-
-
0029532185
-
Implementation of a discretionary access control model for script-based systems
-
IEEE Computer Society Press, Los Alamitos, CA
-
Jaeger, T. and Prakash, A. 1995. Implementation of a discretionary access control model for script-based systems. In Proceedings of the 8th IEEE Workshop on Computer Security Foundations. IEEE Computer Society Press, Los Alamitos, CA, 70-84
-
(1995)
Proceedings of the 8th IEEE Workshop on Computer Security Foundations
, pp. 70-84
-
-
Jaeger, T.1
Prakash, A.2
-
31
-
-
85084161058
-
Building systems that flexibly control downloaded executable content
-
Berkeley, CA
-
Jaeger, T., Rubin, A., and Prakash, A. 1996. Building systems that flexibly control downloaded executable content. In Proceedings of the 6th USENIX Security Symposium. USENIX Assoc., Berkeley, CA, 131-148
-
(1996)
Proceedings of the 6th USENIX Security Symposium. USENIX Assoc.
, pp. 131-148
-
-
Jaeger, T.1
Rubin, A.2
Prakash, A.3
-
32
-
-
0022583712
-
On access checking in capability-based systems
-
In Proceedings of the 1986 IEEE Symposium on Security and Privacy (Oakland, CA, Apr. Press
-
Kain, R. Y. and Landwehr, C. E. 1986. On access checking in capability-based systems. In Proceedings of the 1986 IEEE Symposium on Security and Privacy (Oakland, CA, Apr. 7-9, 1986). IEEE Computer Society Press, Los Alamitos, CA, 95-100
-
(1986)
IEEE Computer Society
, Issue.7-9
, pp. 95-100
-
-
Kain, R.Y.1
Landwehr, C.E.2
-
34
-
-
0027557372
-
Issues in the design of a toolkit for supporting multiple group editors
-
Knister, M. and Prakash, A. 1993. Issues in the design of a toolkit for supporting multiple group editors. Comput. Syst. 6, 2, 135-166
-
(1993)
Comput. Syst.
, vol.6
, Issue.2
, pp. 135-166
-
-
Knister, M.1
Prakash, A.2
-
35
-
-
84976834054
-
Authentication in distributed systems: theory and practice
-
(Nov.)
-
Lampson, B., Abadi, M., Burrows, M., and Wobber, E. 1992. Authentication in distributed systems: theory and practice. ACM Trans. Comput. Syst. 10, 4 (Nov. 1992), 265-310
-
(1992)
ACM Trans. Comput. Syst.
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
36
-
-
0030388877
-
Supporting multi-user multi-applet workspaces in CBE
-
In Proceedings of the 6th ACM Conference on Computer-Supported Coorperative Work (CSCW '96, Boston MA, Nov.). ACM Press, New York, NY
-
Lee, J., Prakash, A., Jaeger, T., and Wu, G. 1996. Supporting multi-user multi-applet workspaces in CBE. In Proceedings of the 6th ACM Conference on Computer-Supported Coorperative Work (CSCW '96, Boston MA, Nov.). ACM Press, New York, NY, 344-353
-
(1996)
, pp. 344-353
-
-
Lee, J.1
Prakash, A.2
Jaeger, T.3
Wu, G.4
-
38
-
-
85024257886
-
Clans & chiefs
-
In Architektur von Rechensystemen. Springer-Verlag, Vienna, Austria
-
Liedtke, J. 1992. Clans & chiefs. In Architektur von Rechensystemen. Springer-Verlag, Vienna, Austria
-
(1992)
-
-
Liedtke, J.1
-
39
-
-
85024277528
-
On-kernel construction
-
In Proceedings of the 15th ACM Symposium on Operating Systems Principles (SIGOPS '95, Copper Mountain Resort, CO, Dec. 3-6), M. B. Jones, Ed. ACM Press, New York, NY
-
Liedtke, J. 1995. On-kernel construction. In Proceedings of the 15th ACM Symposium on Operating Systems Principles (SIGOPS '95, Copper Mountain Resort, CO, Dec. 3-6), M. B. Jones, Ed. ACM Press, New York, NY
-
(1995)
-
-
Liedtke, J.1
-
40
-
-
0031382488
-
Reconciling role based management and role based access control
-
(RBAC '97, Fairfax, VA, Nov. 6-7, 1997), C. Youman, E. Coyne, and T. Jaeger, Eds. ACM Press, New York, NY
-
Lupu, E. and Sloman, M. 1997. Reconciling role based management and role based access control. In Proceedings of the Second ACM Workshop on Role-based Access Control (RBAC '97, Fairfax, VA, Nov. 6-7, 1997), C. Youman, E. Coyne, and T. Jaeger, Eds. ACM Press, New York, NY, 135-141
-
(1997)
Proceedings of the Second ACM Workshop on Role-based Access Control
, pp. 135-141
-
-
Lupu, E.1
Sloman, M.2
-
43
-
-
0003885069
-
Tcl and the Tk Toolkit
-
Addison-Wesley Professional Computing Series. Addison-Wesley Longman Publ. Co., Inc., Reading, MA
-
Ousterhout, J. K. 1994. Tcl and the Tk Toolkit. Addison-Wesley Professional Computing Series. Addison-Wesley Longman Publ. Co., Inc., Reading, MA
-
(1994)
-
-
Ousterhout, J.K.1
-
44
-
-
0003613073
-
The Safe-Tcl security model
-
Berkeley, CA
-
Ousterhout, J. K., Levy, J. Y., and Welch, B. B. 1998. The Safe-Tcl security model. In Proceedings of the 23rd USENIX Annual Conference. USENIX Assoc., Berkeley, CA
-
(1998)
Proceedings of the 23rd USENIX Annual Conference. USENIX Assoc.
-
-
Ousterhout, J.K.1
Levy, J.Y.2
Welch, B.B.3
-
45
-
-
0016555241
-
The protection of information in computer systems
-
(Sept.)
-
Saltzer, J. H. and Schroeder, M. D. 1975. The protection of information in computer systems. Proc. IEEE 63, 9 (Sept.), 1278-1308
-
(1975)
Proc. IEEE
, vol.63
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
46
-
-
0031600970
-
Role activation hierarchies
-
(RBAC '98, Fairfax, VA, Oct. 22-23, 1998), C. Youman and T. Jaeger, Eds. ACM Press, New York, NY
-
Sandhu, R. 1998. Role activation hierarchies. In Proceedings of the Third ACM Workshop on Role-Based Access Control (RBAC '98, Fairfax, VA, Oct. 22-23, 1998), C. Youman and T. Jaeger, Eds. ACM Press, New York, NY, 33-40
-
(1998)
Proceedings of the Third ACM Workshop on Role-Based Access Control
, pp. 33-40
-
-
Sandhu, R.1
-
47
-
-
0001549660
-
The ARBAC97 model for role-based administration of roles
-
(Feb.)
-
Sandhu, R. S., Bhamidipati, V., and Munawer, Q. 1999. The ARBAC97 model for role-based administration of roles. ACM Trans. Inf. Syst. Secur. 1, 2 (Feb.)
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.1
, pp. 2
-
-
Sandhu, R.S.1
Bhamidipati, V.2
Munawer, Q.3
-
48
-
-
0030086382
-
Role-based access control models
-
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman, C. E. 1996. Role-based access control models. IEEE Comput. 29, 2, 38-47
-
(1996)
IEEE Comput.
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
49
-
-
84982871639
-
Role based access control framework for network enterprises
-
IEEE Computer Society Press, Los Alamitos, CA
-
Thomsen, D., O'Brien, D., and Bogle, J. 1998. Role based access control framework for network enterprises. In Proceedings of the 14th Conference on Computer Security Applications. IEEE Computer Society Press, Los Alamitos, CA
-
Proceedings of the 14th Conference on Computer Security Applications
-
-
Thomsen, D.1
O'Brien, D.2
Bogle, J.3
-
52
-
-
0028380781
-
Authentication in the Taos operating system
-
(Feb.)
-
Wobber, E., Abadi, M., Burrows, M., and Lampson, B. 1994. Authentication in the Taos operating system. ACM Trans. Comput. Syst. 12, 1 (Feb. 1994), 3-32
-
(1994)
ACM Trans. Comput. Syst.
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
|