Foundations of logic programming
Foundations of logic programming
A model of authorization for next-generation database systems
ACM Transactions on Database Systems (TODS)
Access control for collaborative environments
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
A flexible authorization mechanism for relational data management systems
ACM Transactions on Information Systems (TOIS)
Design and implementation of an access control processor for XML documents
Proceedings of the 9th international World Wide Web conference on Computer networks : the international journal of computer and telecommunications netowrking
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
A Logic-based Knowledge Representation for Authorization with Delegation
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
A Logical Language for Expressing Authorizations
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
A graphical definition of authorization schema in the DTAC model
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
On the specification and evolution of access control policies
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Policy algebras for access control: the propositional case
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
An algebra for composing access control policies
ACM Transactions on Information and System Security (TISSEC)
Policy algebras for access control the predicate case
Proceedings of the 9th ACM conference on Computer and communications security
Consistent policy enforcement in distributed systems using mobile policies
Data & Knowledge Engineering - Data and applications security
A Uniform Model for Authorization and Access Control in Enterprise Information Platform
EDCIS '02 Proceedings of the First International Conference on Engineering and Deployment of Cooperative Information Systems
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Explicit Modeling of Influences, and of Their Absence, in Distributed Systems
TACAS '02 Proceedings of the 8th International Conference on Tools and Algorithms for the Construction and Analysis of Systems
Describing Policies with Graph Constraints and Rules
ICGT '02 Proceedings of the First International Conference on Graph Transformation
Foundations for a Graph-Based Approach to the Specification of Access Control Policies
FoSSaCS '01 Proceedings of the 4th International Conference on Foundations of Software Science and Computation Structures
A propositional policy algebra for access control
ACM Transactions on Information and System Security (TISSEC)
A Unified Scheme for Resource Protection in Automated Trust Negotiation
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Recent advances in access control models
Das'01 Proceedings of the fifteenth annual working conference on Database and application security
A System to Specify and Manage Multipolicy Access Control Models
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Using certified policies to regulate E-commerce transactions
ACM Transactions on Internet Technology (TOIT)
A policy flexible architecture for secure operating system
ACM SIGOPS Operating Systems Review
Defeasible security policy composition for web services
Proceedings of the fourth ACM workshop on Formal methods in security
Beyond separation of duty: an algebra for specifying high-level security policies
Proceedings of the 13th ACM conference on Computer and communications security
Requirements for scalable access control and security management architectures
ACM Transactions on Internet Technology (TOIT)
Partial and Fuzzy Constraint Satisfaction to Support Coalition Formation
Electronic Notes in Theoretical Computer Science (ENTCS)
Beyond separation of duty: An algebra for specifying high-level security policies
Journal of the ACM (JACM)
Controlling Usage in Business Process Workflows through Fine-Grained Security Policies
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Path-Based Access Control for Enterprise Networks
ISC '08 Proceedings of the 11th international conference on Information Security
D-algebra for composing access control policy decisions
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Practical declarative network management
Proceedings of the 1st ACM workshop on Research on enterprise networking
PolicyGlobe: a framework for integrating network and operating system security policies
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
Proceedings of the 2009 ACM workshop on Secure web services
ASITL: adaptive secure interoperation using trust-level
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
A model of triangulating environments for policy authoring
Proceedings of the 15th ACM symposium on Access control models and technologies
Security rules versus security properties
ICISS'10 Proceedings of the 6th international conference on Information systems security
Rewrite specifications of access control policies in distributed environments
STM'10 Proceedings of the 6th international conference on Security and trust management
Defining and measuring policy coverage in testing access control policies
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
An algebra for enterprise privacy policies closed under composition and conjunction
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
An approach for trusted interoperation in a multidomain environment
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
TBA: a hybrid of logic and extensional access control systems
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
Automated analysis of rule-based access control policies
PLPV '13 Proceedings of the 7th workshop on Programming languages meets program verification
Hi-index | 0.00 |