On protection in operating systems
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Protection in programmed systems.
Protection in programmed systems.
Problems, mechanisms and solutions.
Problems, mechanisms and solutions.
Selective and locally controlled transport of privileges
ACM Transactions on Programming Languages and Systems (TOPLAS) - Lecture notes in computer science Vol. 174
The schematic protection model: its definition and analysis for acyclic attenuating schemes
Journal of the ACM (JACM)
IEEE Transactions on Software Engineering
A Model for Multilevel Security in Computer Networks
IEEE Transactions on Software Engineering
ACM Transactions on Database Systems (TODS)
On the decidability of accessibility problems (extended abstract)
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
Survey of recent operating systems research, designs and implementations
ACM SIGOPS Operating Systems Review
On the synthesis and analysis of protection systems
SOSP '77 Proceedings of the sixth ACM symposium on Operating systems principles
Hierarchical Take-Grant Protection systems
SOSP '81 Proceedings of the eighth ACM symposium on Operating systems principles
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Security analysis in role-based access control
Proceedings of the ninth ACM symposium on Access control models and technologies
Beyond proof-of-compliance: security analysis in trust management
Journal of the ACM (JACM)
An attribute-based access matrix model
Proceedings of the 2005 ACM symposium on Applied computing
Safety analysis of usage control authorization models
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Running the manual: an approach to high-assurance microkernel development
Proceedings of the 2006 ACM SIGPLAN workshop on Haskell
NETRA:: seeing through access control
Proceedings of the fourth ACM workshop on Formal methods in security
Resiliency policies in access control
Proceedings of the 13th ACM conference on Computer and communications security
Security analysis in role-based access control
ACM Transactions on Information and System Security (TISSEC)
Formal Models of Capability-Based Protection Systems
IEEE Transactions on Computers
Efficient policy analysis for administrative role based access control
Proceedings of the 14th ACM conference on Computer and communications security
On complexity of grammars related to the safety problem
Theoretical Computer Science
Verified Protection Model of the seL4 Microkernel
VSTTE '08 Proceedings of the 2nd international conference on Verified Software: Theories, Tools, Experiments
Kernel design for isolation and assurance of physical memory
Proceedings of the 1st workshop on Isolation and integration in embedded systems
A security policy for a profile-oriented operating system
AFIPS '81 Proceedings of the May 4-7, 1981, national computer conference
Resiliency Policies in Access Control
ACM Transactions on Information and System Security (TISSEC)
Foundations for group-centric secure information sharing models
Proceedings of the 14th ACM symposium on Access control models and technologies
A Verified Shared Capability Model
Electronic Notes in Theoretical Computer Science (ENTCS)
Distributed and Parallel Databases
Graph-based delegation authorization in workflow
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
A privacy preservation model for facebook-style social network systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Analyzing uncertainty in TG protection graphs with TG/MC
Journal of Computer Security
capDL: a language for describing capability-based systems
Proceedings of the first ACM asia-pacific workshop on Workshop on systems
Detection of access control flaws in a distributed database system with local site autonomy
IDEAS'97 Proceedings of the 1997 international conference on International database engineering and applications symposium
A practical formal model for safety analysis in capability-based systems
TGC'05 Proceedings of the 1st international conference on Trustworthy global computing
Journal of Network and Systems Management
ITP'11 Proceedings of the Second international conference on Interactive theorem proving
Policy analysis for Administrative Role-Based Access Control
Theoretical Computer Science
Group-Centric Secure Information-Sharing Models for Isolated Groups
ACM Transactions on Information and System Security (TISSEC)
Integration of graph based authorization policies
ISMIS'06 Proceedings of the 16th international conference on Foundations of Intelligent Systems
On complexity of grammars related to the safety problem
ICALP'06 Proceedings of the 33rd international conference on Automata, Languages and Programming - Volume Part II
Leftist grammars and the chomsky hierarchy
FCT'05 Proceedings of the 15th international conference on Fundamentals of Computation Theory
Network vulnerability analysis through vulnerability take-grant model (VTG)
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Discretionary capability confinement
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
Implementing authorization delegations using graph
DEXA'06 Proceedings of the 17th international conference on Database and Expert Systems Applications
Visualizing privacy implications of access control policies in social network systems
DPM'09/SETOP'09 Proceedings of the 4th international workshop, and Second international conference on Data Privacy Management and Autonomous Spontaneous Security
Unifying decidability results on protection systems using simulations
FAST'05 Proceedings of the Third international conference on Formal Aspects in Security and Trust
A visualization tool for evaluating access control policies in facebook-style social network systems
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Turtles all the way down: a clean-slate, ground-up, first-principles approach to secure systems
Proceedings of the 2012 workshop on New security paradigms
The need for application-aware access control evaluation
Proceedings of the 2012 workshop on New security paradigms
Modelling Access Propagation in Dynamic Systems
ACM Transactions on Information and System Security (TISSEC)
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles
ACM SIGOPS 24th Symposium on Operating Systems Principles
From L3 to seL4 what have we learnt in 20 years of L4 microkernels?
Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles
Comprehensive formal verification of an OS microkernel
ACM Transactions on Computer Systems (TOCS)
Formal verification of security properties in trust management policy
Journal of Computer Security
Hi-index | 0.01 |