-
2
-
-
0034449399
-
Regulating service access and information release on the web
-
New York, NY, USA. ACM
-
P. Bonatti and P. Samarati. Regulating service access and information release on the web. In Proceedings of the 7th ACM conference on Computer and communications security, CCS '00, pages 134-143, New York, NY, USA, 2000. ACM.
-
(2000)
Proceedings of the 7th ACM conference on Computer and communications security, CCS '00
, pp. 134-143
-
-
Bonatti, P.1
Samarati, P.2
-
3
-
-
33745767674
-
Cpol: high-performance policy evaluation
-
New York, NY, USA. ACM
-
K. Borders, X. Zhao, and A. Prakash. Cpol: high-performance policy evaluation. In Proceedings of the 12th ACM conference on Computer and communications security, CCS '05, pages 147-157, New York, NY, USA, 2005. ACM.
-
(2005)
Proceedings of the 12th ACM conference on Computer and communications security, CCS '05
, pp. 147-157
-
-
Borders, K.1
Zhao, X.2
Prakash, A.3
-
4
-
-
34548769351
-
Fuzzy multi-level security: An experiment on quantified risk-adaptive access control
-
IEEE Computer Society
-
P.-C. Cheng, P. Rohatgi, C. Keser, P. A. Karger, G. M. Wagner, and A. S. Reninger. Fuzzy multi-level security: An experiment on quantified risk-adaptive access control. In IEEE Symposium on Security and Privacy. IEEE Computer Society, 2007.
-
(2007)
IEEE Symposium on Security and Privacy
-
-
Cheng, P.-C.1
Rohatgi, P.2
Keser, C.3
Karger, P.A.4
Wagner, G.M.5
Reninger, A.S.6
-
6
-
-
84955646607
-
Mathematics in Financial Risk Management
-
E. Eberlein, R. Frey, M. Kalkbrener, and L. Overbeck. Mathematics in Financial Risk Management. Jahresbericht der Deutschen Mathematiker Vereinigung, 109: 165-193, 2007.
-
(2007)
Jahresbericht der Deutschen Mathematiker Vereinigung
, vol.109
, pp. 165-193
-
-
Eberlein, E.1
Frey, R.2
Kalkbrener, M.3
Overbeck, L.4
-
7
-
-
85139870260
-
GetAccess design and administration guide
-
September
-
Entrust. GetAccess design and administration guide, September 1999.
-
(1999)
Entrust
-
-
-
10
-
-
85075837457
-
Botminer: clustering analysis of network trafic for protocol-and structure-independent botnet detection
-
USENIX Association
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee. Botminer: clustering analysis of network trafic for protocol-and structure-independent botnet detection. In Proceedings of the 17th conference on Security symposium, pages 139-154. USENIX Association, 2008.
-
(2008)
Proceedings of the 17th conference on Security symposium
, pp. 139-154
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
11
-
-
2942624556
-
Access control with IBM Tivoli Access Manager
-
May
-
G. Karjoth. Access control with IBM Tivoli Access Manager. ACM Trans. Inf. Syst. Secur., 6: 232-257, May 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, pp. 232-257
-
-
Karjoth, G.1
-
13
-
-
78650024495
-
Accessminer: Using system-centric models for malware protection
-
Jul
-
A. Lanzi, D. Balzarotti, C. Kruegel, M. Christodorescu, and E. Kirda. Accessminer: Using system-centric models for malware protection. CCS '10: Proceedings of the 17th ACM conference on Computer and communications security, pages 399-419, Jul 2010.
-
(2010)
CCS '10: Proceedings of the 17th ACM conference on Computer and communications security
, pp. 399-419
-
-
Lanzi, A.1
Balzarotti, D.2
Kruegel, C.3
Christodorescu, M.4
Kirda, E.5
-
14
-
-
0030353831
-
Secure Computer Systems: A Mathematical Model
-
L. LaPadula and D. Bell. Secure Computer Systems: A Mathematical Model. Journal of Computer Security, 4: 239-263, 1996.
-
(1996)
Journal of Computer Security
, vol.4
, pp. 239-263
-
-
LaPadula, L.1
Bell, D.2
-
15
-
-
80052077852
-
Trading in risk: Using markets to improve access control
-
I. Molloy, P.-C. Cheng, and P. Rohatgi. Trading in risk: Using markets to improve access control. In NSPW, 2008.
-
(2008)
NSPW
-
-
Molloy, I.1
Cheng, P.-C.2
Rohatgi, P.3
-
16
-
-
85139841228
-
Siteminder concepts guide
-
Netegrity. Siteminder concepts guide, 2000.
-
(2000)
Netegrity
-
-
-
17
-
-
70450284416
-
Automating role-based provisioning by learning from examples
-
B. Carminati and J. Joshi, editors, ACM
-
Q. Ni, J. Lobo, S. B. Calo, P. Rohatgi, and E. Bertino. Automating role-based provisioning by learning from examples. In B. Carminati and J. Joshi, editors, SACMAT, pages 75-84. ACM, 2009.
-
(2009)
SACMAT
, pp. 75-84
-
-
Ni, Q.1
Lobo, J.2
Calo, S.B.3
Rohatgi, P.4
Bertino, E.5
-
18
-
-
3142702944
-
Extending query rewriting techniques for _ne-grained access control
-
New York, NY, USA. ACM
-
S. Rizvi, A. Mendelzon, S. Sudarshan, and P. Roy. Extending query rewriting techniques for _ne-grained access control. In Proceedings of the 2004 ACM SIGMOD international conference on Management of data, SIGMOD '04, pages 551-562, New York, NY, USA, 2004. ACM.
-
(2004)
Proceedings of the 2004 ACM SIGMOD international conference on Management of data, SIGMOD '04
, pp. 551-562
-
-
Rizvi, S.1
Mendelzon, A.2
Sudarshan, S.3
Roy, P.4
-
19
-
-
33745616976
-
Administering permissions for distributed data: factoring and automated inference
-
Norwell, MA, USA. Kluwer Academic Publishers
-
A. Rosenthal and E. Sciore. Administering permissions for distributed data: factoring and automated inference. In Proceedings of the fifteenth annual working conference on Database and application security, DAS'01, pages 91-104, Norwell, MA, USA, 2002. Kluwer Academic Publishers.
-
(2002)
Proceedings of the fifteenth annual working conference on Database and application security, DAS'01
, pp. 91-104
-
-
Rosenthal, A.1
Sciore, E.2
-
20
-
-
79951951140
-
-
Safeway Inc, January 3
-
Safeway Inc. Annual report for the fiscal year ended January 3, 2009. http://http://www. sec. gov/Archives/edgar/data/86144/000119312509043434/d10k. htm.
-
(2009)
Annual report for the fiscal year ended
-
-
-
21
-
-
79951951140
-
-
Supervalu Inc, February 28
-
Supervalu Inc. Annual report for the fiscal year ended February 28, 2009. http://www. sec. gov/Archives/edgar/data/95521/000095015209004223/c50531e10vk. htm.
-
(2009)
Annual report for the fiscal year ended
-
-
-
22
-
-
85139865204
-
-
The Great Atlantic & Pacific Tea Company Inc
-
The Great Atlantic & Pacific Tea Company Inc. Fiscal 2008 Annual Report to Stockholders. http://www. sec. gov/Archives/edgar/data/43300/000139843209000171/ex13. Txt.
-
Fiscal 2008 Annual Report to Stockholders
-
-
-
23
-
-
79951951140
-
-
The Kroger Co, January 31
-
The Kroger Co. ANNUAL REPORT for the fiscal year ended January 31, 2009. http://www. sec. gov/Archives/edgar/data/56873/000110465909021710/a09-1837 110k. htm.
-
(2009)
ANNUAL REPORT for the fiscal year ended
-
-
-
24
-
-
80051985554
-
Design and evaluation of a real-time url spam filtering service
-
Mar
-
K. Thomas, C. Grier, J. Ma, V. Paxson, and D. Song. Design and evaluation of a real-time url spam filtering service. IEEE Symposium on Security and Privacy, pages 1-16, Mar 2011.
-
(2011)
IEEE Symposium on Security and Privacy
, pp. 1-16
-
-
Thomas, K.1
Grier, C.2
Ma, J.3
Paxson, V.4
Song, D.5
-
29
-
-
20444479906
-
A logic-based framework for attribute based access control
-
New York, NY, USA. ACM
-
L. Wang, D. Wijesekera, and S. Jajodia. A logic-based framework for attribute based access control. In Proceedings of the 2004 ACM workshop on Formal methods in security engineering, FMSE '04, pages 45-55, New York, NY, USA, 2004. ACM.
-
(2004)
Proceedings of the 2004 ACM workshop on Formal methods in security engineering, FMSE '04
, pp. 45-55
-
-
Wang, L.1
Wijesekera, D.2
Jajodia, S.3
-
30
-
-
57349189402
-
Authorization recycling in rbac systems
-
New York, NY, USA. ACM
-
Q. Wei, J. Crampton, K. Beznosov, and M. Ripeanu. Authorization recycling in rbac systems. In Proceedings of the 13th ACM symposium on Access control models and technologies, SACMAT '08, pages 63-72, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 13th ACM symposium on Access control models and technologies, SACMAT '08
, pp. 63-72
-
-
Wei, Q.1
Crampton, J.2
Beznosov, K.3
Ripeanu, M.4
-
31
-
-
34548060280
-
Cooperative secondary authorization recycling
-
New York, NY, USA. ACM
-
Q. Wei, M. Ripeanu, and K. Beznosov. Cooperative secondary authorization recycling. In Proceedings of the 16th international symposium on High performance distributed computing, HPDC '07, pages 65-74, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 16th international symposium on High performance distributed computing, HPDC '07
, pp. 65-74
-
-
Wei, Q.1
Ripeanu, M.2
Beznosov, K.3
-
32
-
-
33646124011
-
An authorization framework for sharing data in web service federations
-
W. Jonker and M. Petkovic, editors. Springer
-
M. Wimmer and A. Kemper. An authorization framework for sharing data in web service federations. In W. Jonker and M. Petkovic, editors, Secure Data Management, volume 3674 of Lecture Notes in Computer Science, pages 47-62. Springer, 2005.
-
(2005)
Secure Data Management, volume 3674 of Lecture Notes in Computer Science
, pp. 47-62
-
-
Wimmer, M.1
Kemper, A.2
|