Role-based access control for a distributed calculus
Journal of Computer Security - Special issue on CSFW17
Token-based dynamic trust establishment for web services
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Requirements of federated trust management for service-oriented architectures
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Strengthening employee's responsibility to enhance governance of IT: COBIT RACI chart case study
Proceedings of the first ACM workshop on Information security governance
System configuration as a privilege
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
The structure of authority: why security is not a separable concern
MOZ'04 Proceedings of the Second international conference on Multiparadigm Programming in Mozart/Oz
Securely accessing shared resources with concurrent constraint programming
SEFM'12 Proceedings of the 10th international conference on Software Engineering and Formal Methods
Ensuring continuous compliance through reconciling policy with usage
Proceedings of the 18th ACM symposium on Access control models and technologies
Hi-index | 0.00 |
With new methods for enforcing security policies comes the opportunity toformulate application-specific policies. But leveraging that flexibility might prove a difficult problem not only in practice, but also in theory.