ACM SIGOPS Operating Systems Review
Specification case studies
Formal Models for Computer Security
ACM Computing Surveys (CSUR)
Protection and the control of information sharing in multics
Communications of the ACM
ACM SIGOPS Operating Systems Review
ACM SIGMOD Record - Directions for future database research & development
ACM SIGSAC Review - Special issue on Issues '91: data management security and privacy standards
Access control for large collections
ACM Transactions on Information Systems (TOIS)
Determining role rights from use cases
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
The multipolicy paradigm for trusted systems
NSPW '92-93 Proceedings on the 1992-1993 workshop on New security paradigms
A new approach to security system development
NSPW '94 Proceedings of the 1994 workshop on New security paradigms
Protection in a distributed document processing system
ACM SIGOPS Operating Systems Review
A Model for Evaluation and Administration of Security in Object-Oriented Databases
IEEE Transactions on Knowledge and Data Engineering
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
The structure of authority: why security is not a separable concern
MOZ'04 Proceedings of the Second international conference on Multiparadigm Programming in Mozart/Oz
Cooperative management in open distributed systems
Computer Communications
Hi-index | 4.10 |
The authors discuss the need for protection in commercial organizations, and the way in which control principles have met this need, despite having evolved before computer systems came into use. The basis for these principles is the concept of authority and how it is designated within an organization. A simulation model for access control, written in Prolog, is presented.