-
1
-
-
0031185890
-
Information flow control in object-oriented systems
-
P. Samarati, E. Bertino, A. Ciampichetti, and S. Jajodia, "Information flow control in object-oriented systems", IEEE Transactions on Knowledge and Data Engineering 9(4) (1997) 524-538.
-
(1997)
IEEE Transactions on Knowledge and Data Engineering
, vol.9
, Issue.4
, pp. 524-538
-
-
Samarati, P.1
Bertino, E.2
Ciampichetti, A.3
Jajodia, S.4
-
2
-
-
0036434226
-
Information flow analysis on role-based access control model
-
C. N. Zhang and C. Yang, "Information flow analysis on role-based access control model", Information Management and Control Security 10(5) (2002) 225-236.
-
(2002)
Information Management and Control Security
, vol.10
, Issue.5
, pp. 225-236
-
-
Zhang, C.N.1
Yang, C.2
-
3
-
-
71449117058
-
An object-oriented RBAC model for distributed systems
-
(WIGSA), Amsterdam, The Netherlands
-
C. N. Zhang and C. Yang, "An object-oriented RBAC model for distributed systems", Working IEEE/IFIP Conference on Software Architecture, (WIGSA), Amsterdam, The Netherlands, 2001, pp. 24-32.
-
(2001)
Working IEEE/IFIP Conference on Software Architecture
, pp. 24-32
-
-
Zhang, C.N.1
Yang, C.2
-
4
-
-
84884311106
-
Configuring role-based access control to enforce mandatory and discretionary access control policies
-
S. Osborn, R. Sandhu, and Munawer, "Configuring role-based access control to enforce mandatory and discretionary access control policies", ACM Trans. on Information and System Security 3(2) (2000) 85-106.
-
(2000)
ACM Trans. on Information and System Security
, vol.3
, Issue.2
, pp. 85-106
-
-
Osborn, S.1
Sandhu, R.2
Munawer3
-
6
-
-
0034835461
-
A new type system for secure information flow
-
Cape Breton, Nova Scotia
-
G. Smith, "A new type system for secure information flow", in Proc. 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, 2001, pp. 115-125.
-
(2001)
Proc. 14th IEEE Computer Security Foundations Workshop
, pp. 115-125
-
-
Smith, G.1
-
8
-
-
84945262623
-
Secure information flow and CPS
-
April
-
S. Zdancewic and A. C. Myers, "Secure information flow and CPS", in Proc. European Symposium on Programming, Vol. 2028 of LNCS, April 2001, pp. 46-61.
-
(2001)
Proc. European Symposium on Programming, Vol. 2028 of LNCS
, vol.2028
, pp. 46-61
-
-
Zdancewic, S.1
Myers, A.C.2
-
11
-
-
0001048139
-
Protecting privacy using the decentralized label model
-
A. C. Myers and B. Liskov, "Protecting privacy using the decentralized label model", ACM TOSEM 9(4) (2000) 410-442.
-
(2000)
ACM TOSEM
, vol.9
, Issue.4
, pp. 410-442
-
-
Myers, A.C.1
Liskov, B.2
-
12
-
-
0031682833
-
Complete, safe information flow with decentralized labels
-
Oakland, California
-
A. C. Myers and B. Liskov, "Complete, safe information flow with decentralized labels", in Proc. IEEE S&P, Oakland, California, 1998.
-
(1998)
Proc. IEEE S&P
-
-
Myers, A.C.1
Liskov, B.2
-
13
-
-
0031543270
-
A decentralized model for information flow control
-
Saint-Malo, France
-
A. C. Myers and B. Liskov, "A decentralized model for information flow control", in Proc. ACM Symp. on Operating System Principles (SOSP), Saint-Malo, France, 1997, pp. 129-142.
-
(1997)
Proc. ACM Symp. on Operating System Principles (SOSP)
, pp. 129-142
-
-
Myers, A.C.1
Liskov, B.2
-
15
-
-
0000052619
-
Authentication, access control, and audit
-
March
-
R. Sandhu and P. Samarati, "Authentication, access control, and audit", ACM Computing Surveys 28, No. 1, March 1996.
-
(1996)
ACM Computing Surveys
, vol.28
, Issue.1
-
-
Sandhu, R.1
Samarati, P.2
-
16
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning, "A lattice model of secure information flow", Comm. ACM 19(5) (1976) 236-243.
-
(1976)
Comm. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
17
-
-
0017517624
-
Certification of programs for secure information flow
-
D. E. Denning and P. J. Denning, "Certification of programs for secure information flow", Comm. ACM20(7) (1977) 504-513.
-
(1977)
Comm. ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
18
-
-
0030708182
-
Providing flexibility in information flow control for object-oriented systems
-
Oakland, CA, USA, May
-
E. Ferrari, P. Samarati, E. Bertino, and S. Jajodia, "Providing flexibility in information flow control for object-oriented systems", in Proc. IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 1997, pp. 130-140.
-
(1997)
Proc. IEEE Symposium on Security and Privacy
, pp. 130-140
-
-
Ferrari, E.1
Samarati, P.2
Bertino, E.3
Jajodia, S.4
-
19
-
-
0002262722
-
Role-based access control: Features and motivations
-
New Orleans, LA, Dec.
-
D. F. Ferraiolo, J. A. Gugini, and D. R. Kuhn, "Role-based access control: Features and motivations", in Proc. 11th Annual Computer Security Applications Conference, New Orleans, LA, Dec. 1995.
-
(1995)
Proc. 11th Annual Computer Security Applications Conference
-
-
Ferraiolo, D.F.1
Gugini, J.A.2
Kuhn, D.R.3
-
20
-
-
0002422823
-
A role-based access control model and reference implementation within a corporate intranet
-
Feb.
-
D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn, "A role-based access control model and reference implementation within a corporate intranet", ACM Trans. on Information and Systems Security 2, No. 1, Feb. 1999.
-
(1999)
ACM Trans. on Information and Systems Security
, vol.2
, Issue.1
-
-
Ferraiolo, D.F.1
Barkley, J.F.2
Kuhn, D.R.3
-
21
-
-
8644265634
-
Information flow control using versions in object-oriented systems
-
Department of Mathematics & Computer Science, UAE University, Al-Ain, UAE, June
-
A. Maamir, A. Fellah, and I. Rahwan, "Information flow control using versions in object-oriented systems", Technical Report (CS#9P), Department of Mathematics & Computer Science, UAE University, Al-Ain, UAE, June 1999.
-
(1999)
Technical Report (CS#9P)
-
-
Maamir, A.1
Fellah, A.2
Rahwan, I.3
-
22
-
-
0025065897
-
Integrating an object-oriented data model with multilevel security
-
Oakland, CA, USA
-
S. Jajodia and B. Kogan, "Integrating an object-oriented data model with multilevel security", in Proc. IEEE Symp. on Security and Privacy, Oakland, CA, USA, 1990, pp. 76-85.
-
(1990)
Proc. IEEE Symp. on Security and Privacy
, pp. 76-85
-
-
Jajodia, S.1
Kogan, B.2
|