The Z notation: a reference manual
The Z notation: a reference manual
ACM Transactions on Programming Languages and Systems (TOPLAS)
Specification and verification of the UCLA Unix security kernel
Communications of the ACM
Assuring Distributed Trusted Mach
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Providing policy control over object operations in a mach based system
SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
Embedding security policies into a distributed computing environment
ACM SIGOPS Operating Systems Review
Design and implementation of a distributed virtual machine for networked computers
Proceedings of the seventeenth ACM symposium on Operating systems principles
Dynamic rights: safe extensible access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Security architecture-based system design
Proceedings of the 1999 workshop on New security paradigms
Separating access control policy, enforcement, and functionality in extensible systems
ACM Transactions on Computer Systems (TOCS)
Providing policy-neutral and transparent access control in extensible systems
Secure Internet programming
THINK: a secure distributed systems architecture
EW 10 Proceedings of the 10th workshop on ACM SIGOPS European workshop
The flask security architecture: system support for diverse security policies
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Hi-index | 0.00 |