Controlled information sharing in a computer utility
Controlled information sharing in a computer utility
Segmentation and the Design of Multiprogrammed Computer Systems
Journal of the ACM (JACM)
The nucleus of a multiprogramming system
Communications of the ACM
Protection in an information processing utility
Communications of the ACM
Implementations of the SHARER2 time-sharing system
Communications of the ACM
Programming semantics for multiprogrammed computations
Communications of the ACM
Time Sharing Computer Systems
Authentication Mechanisms in Microprocessor-Based Local Area Networks
IEEE Transactions on Software Engineering
Authentication in distributed systems: theory and practice
SOSP '91 Proceedings of the thirteenth ACM symposium on Operating systems principles
Miro: Visual Specification of Security
IEEE Transactions on Software Engineering
Redundant rights in protection systems
ACM SIGOPS Operating Systems Review
Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
Access control for collaborative environments
CSCW '92 Proceedings of the 1992 ACM conference on Computer-supported cooperative work
Authentication in the Taos operating system
SOSP '93 Proceedings of the fourteenth ACM symposium on Operating systems principles
Authentication in the Taos operating system
ACM Transactions on Computer Systems (TOCS) - Special issue on operating systems principles
Extensible access control for a hierarchy of servers
ACM SIGOPS Operating Systems Review
ACM SIGPLAN Notices
Computational Issues in Secure Interoperation
IEEE Transactions on Software Engineering
Access control in virtual environments
VRST '97 Proceedings of the ACM symposium on Virtual reality software and technology
Extensible security architectures for Java
Proceedings of the sixteenth ACM symposium on Operating systems principles
Support for discretionary role based access control in ACL-oriented operating systems
RBAC '97 Proceedings of the second ACM workshop on Role-based access control
Controlling access in multiuser interfaces
ACM Transactions on Computer-Human Interaction (TOCHI)
Towards a task-based paradigm for flexible and adaptable access control in distributed applications
NSPW '92-93 Proceedings on the 1992-1993 workshop on New security paradigms
How to do discretionary access control using roles
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
Flexible meta access-control for collaborative applications
CSCW '98 Proceedings of the 1998 ACM conference on Computer supported cooperative work
The Use of Cooperation Scenarios in the Design and Evaluation of a CSCW System
IEEE Transactions on Software Engineering
An integrated framework for security and dependability
Proceedings of the 1998 workshop on New security paradigms
Design and implementation of a distributed virtual machine for networked computers
Proceedings of the seventeenth ACM symposium on Operating systems principles
Dynamic rights: safe extensible access control
RBAC '99 Proceedings of the fourth ACM workshop on Role-based access control
Rewriting Histories: Recovering from Malicious Transactions
Distributed and Parallel Databases - Security of data and transaction processing
An access control model for simplifying constraint expression
Proceedings of the 7th ACM conference on Computer and communications security
Fault Tolerant Operating Systems
ACM Computing Surveys (CSUR)
Protection in operating systems
Communications of the ACM
Disarming offense to facilitate defense
Proceedings of the 2000 workshop on New security paradigms
Proceedings of the 10th international conference on World Wide Web
A graphical definition of authorization schema in the DTAC model
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Panel: which access control technique will provide the greatest overall benefit
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
An argument for the role-based access control model
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Reflective authorization systems: possibilities, benefits, and drawbacks
Secure Internet programming
A view-based access control model for CORBA
Secure Internet programming
Access control in configurable systems
Secure Internet programming
Providing policy-neutral and transparent access control in extensible systems
Secure Internet programming
Secure Internet programming
Protection in a distributed document processing system
ACM SIGOPS Operating Systems Review
ACM SIGOPS Operating Systems Review
Practical safety in flexible access control models
ACM Transactions on Information and System Security (TISSEC)
Proposed NIST standard for role-based access control
ACM Transactions on Information and System Security (TISSEC)
Role-based access control and the access control matrix
ACM SIGOPS Operating Systems Review
An access control language for web services
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Computational paradigms and protection
Proceedings of the 2001 workshop on New security paradigms
AngeL: a tool to disarm computer systems
Proceedings of the 2001 workshop on New security paradigms
An agreement centric access control mechanism for business to business e-commerce
Proceedings of the 2002 ACM symposium on Applied computing
A new dimension in access control: studying maintenance engineering across organizational boundaries
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
Security Considerations for a Distributed LocationService
Journal of Network and Systems Management
Efficient Group Coordination in Multicast Trees
The Journal of Supercomputing
Lattice-Based Access Control Models
Computer
Java Security: Present and Near Future
IEEE Micro
Data Management Issues and Trade-Offs in CSCW Systems
IEEE Transactions on Knowledge and Data Engineering
A hardware implementation of capability-based addressing
ACM SIGARCH Computer Architecture News
The Design of a COTSReal-Time Distributed Security Kernel
EDCC-4 Proceedings of the 4th European Dependable Computing Conference on Dependable Computing
An Analysis of Access Control Models
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Authenticated Operation of Open Computing Devices
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Organizational Modeling for Efficient Specification of Information Security Requirements
ADBIS '99 Proceedings of the Third East European Conference on Advances in Databases and Information Systems
MIERA: Method for Inter-Enterprise Role-Based Authorization
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Mathematical Models of Computer Security
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
The Set and Function Approach to Modeling Authorization in Distributed Systems
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Coordination and Access Control in Open Distributed Agent Systems: The TuCSoN Approach
COORDINATION '00 Proceedings of the 4th International Conference on Coordination Languages and Models
The New Topicality of Using Formal Models of Security Policy within the Security Engineering Process
FM-Trends 98 Proceedings of the International Workshop on Current Trends in Applied Formal Method: Applied Formal Methods
Security Issues in Mobile Code Systems
Mobile Agents and Security
Information Flow Control among Objects in Role-Based Access Control Model
DEXA '01 Proceedings of the 12th International Conference on Database and Expert Systems Applications
Manageable access control for CORBA
Journal of Computer Security - Special issue on ESORICS 2000
Sentry: A novel hardware implementation of classic operating system mechanisms
ISCA '82 Proceedings of the 9th annual symposium on Computer Architecture
The Lattice Security Model In A Public Computing Network
ACM '78 Proceedings of the 1978 annual conference
On protection in operating systems
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Dynamic linking and environment initialization in a multi-domain process.
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Sharing data and services in a virtual machine system
SOSP '75 Proceedings of the fifth ACM symposium on Operating systems principles
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
A hardware implementation of capability-based addressing
ACM SIGOPS Operating Systems Review
Computer
Protection at the micromachine level
ACM SIGARCH Computer Architecture News
Building a Secure, Location Transparent Object Invocation System
IWOOOS '95 Proceedings of the 4th International Workshop on Object-Orientation in Operating Systems
A security framework for reflective Java applications
Software—Practice & Experience
The UCONABC usage control model
ACM Transactions on Information and System Security (TISSEC)
Security analysis in role-based access control
Proceedings of the ninth ACM symposium on Access control models and technologies
Computer Security in the Real World
Computer
A top-down view of software engineering
ACM SIGSOFT Software Engineering Notes
Comparing the expressive power of access control models
Proceedings of the 11th ACM conference on Computer and communications security
End-user controlled group formation and access rights management in a shared workspace system
CSCW '04 Proceedings of the 2004 ACM conference on Computer supported cooperative work
Formal access control analysis in the software development process
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
Access control in collaborative systems
ACM Computing Surveys (CSUR)
Composing and combining policies under the policy machine
Proceedings of the tenth ACM symposium on Access control models and technologies
Beyond proof-of-compliance: security analysis in trust management
Journal of the ACM (JACM)
Secure information sharing enabled by Trusted Computing and PEI models
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Ad hoc extensibility and access control
ACM SIGOPS Operating Systems Review
An overview of VOAC, a virtual organizations access control infrastructure
PDCN'06 Proceedings of the 24th IASTED international conference on Parallel and distributed computing and networks
Resiliency policies in access control
Proceedings of the 13th ACM conference on Computer and communications security
Security analysis in role-based access control
ACM Transactions on Information and System Security (TISSEC)
A review of information security issues and respective research contributions
ACM SIGMIS Database
Compact access control labeling for efficient secure XML query evaluation
Data & Knowledge Engineering
MIS '05 Proceedings of the 2005 symposia on Metainformatics
Requirements for scalable access control and security management architectures
ACM Transactions on Internet Technology (TOIT)
A group-based authorization model for cooperative systems
ECSCW'97 Proceedings of the fifth conference on European Conference on Computer-Supported Cooperative Work
Rendezvous-based access control for medical records in the pre-hospital environment
Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments
USITS'97 Proceedings of the USENIX Symposium on Internet Technologies and Systems on USENIX Symposium on Internet Technologies and Systems
TRON: process-specific file protection for the UNIX operating system
TCON'95 Proceedings of the USENIX 1995 Technical Conference Proceedings
Operating system protection for fine-grained programs
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Authorizing applications in singularity
Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007
A type discipline for authorization policies
ACM Transactions on Programming Languages and Systems (TOPLAS) - Special Issue ESOP'05
Weaving rewrite-based access control policies
Proceedings of the 2007 ACM workshop on Formal methods in security engineering
A dynamic key management solution to access hierarchy
International Journal of Network Management
Access control in mobile ambient calculi: A comparative view
Theoretical Computer Science
Usage control platformization via trustworthy SELinux
Proceedings of the 2008 ACM symposium on Information, computer and communications security
A type system for data-flow integrity on windows vista
Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security
Access control by action control
Proceedings of the 13th ACM symposium on Access control models and technologies
A rewriting framework for the composition of access control policies
Proceedings of the 10th international ACM SIGPLAN conference on Principles and practice of declarative programming
Combining Scenario- and Model-Based Testing to Ensure POSIX Compliance
ABZ '08 Proceedings of the 1st international conference on Abstract State Machines, B and Z
EON: modeling and analyzing dynamic access control systems with logic programs
Proceedings of the 15th ACM conference on Computer and communications security
Asynchronous policy evaluation and enforcement
Proceedings of the 2nd ACM workshop on Computer security architectures
Non-delegatable authorities in capability systems
Journal of Computer Security
Family accounts: a new paradigm for user accounts within the home environment
Proceedings of the 2008 ACM conference on Computer supported cooperative work
A type system for data-flow integrity on Windows Vista
ACM SIGPLAN Notices
A communication mechanism for resource isolation
Proceedings of the Second Workshop on Isolation and Integration in Embedded Systems
Action Control by Term Rewriting
Electronic Notes in Theoretical Computer Science (ENTCS)
A conceptual framework for Group-Centric secure information sharing
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Computer-supported access control
ACM Transactions on Computer-Human Interaction (TOCHI)
Robustly secure computer systems: a new security paradigm of system discontinuity
NSPW '07 Proceedings of the 2007 Workshop on New Security Paradigms
A type system for discretionary access control†
Mathematical Structures in Computer Science
Instance-level access control for business-to-business electronic commerce
IBM Systems Journal
Data base security: requirements, policies, and models
IBM Systems Journal
Security considerations for personal computers
IBM Systems Journal
An overview of computer security
IBM Systems Journal
Towards Modelling Information Security with Key-Challenge Petri Nets
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Semantic Usage Policies for Web Services
ISWC '09 Proceedings of the 8th International Semantic Web Conference
A system for visual role-based policy modelling
Journal of Visual Languages and Computing
The dynamic community of interest and its realization in ZODIAC
IEEE Communications Magazine
Practical protection for personal storage in the cloud
Proceedings of the Third European Workshop on System Security
The infrastructure problem in HCI
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Towards a times-based usage control model
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
Stabilizing trust and reputation for self-stabilizing efficient hosts in spite of Byzantine guests
SSS'07 Proceedings of the 9h international conference on Stabilization, safety, and security of distributed systems
On the evolution of adversary models in security protocols: or know your friend and foe alike
Proceedings of the 13th international conference on Security protocols
Sentry: light-weight auxiliary memory access control
Proceedings of the 37th annual international symposium on Computer architecture
Stabilizing trust and reputation for self-stabilizing efficient hosts in spite of byzantine guests
ACM SIGOPS Operating Systems Review
Relation-Based Access Control: An Access Control Model for Context-Aware Computing Environment
Wireless Personal Communications: An International Journal
Proceedings of the 17th ACM conference on Computer and communications security
Proceedings of the 4th Symposium on Computer Human Interaction for the Management of Information Technology
Group-centric models for secure and agile information sharing
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
A self-policing policy language
ISWC'10 Proceedings of the 9th international semantic web conference on The semantic web - Volume Part I
A communication agreement framework for access/action control
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Java security: from hotjava to netscape and beyond
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Access Control for Databases: Concepts and Systems
Foundations and Trends in Databases
NEW2AN'11/ruSMART'11 Proceedings of the 11th international conference and 4th international conference on Smart spaces and next generation wired/wireless networking
ITP'11 Proceedings of the Second international conference on Interactive theorem proving
Counterfactually reasoning about security
Proceedings of the 4th international conference on Security of information and networks
Term rewriting for access control
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Grid supporting platform for AMS data processing
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
A relational database integrity framework for access control policies
Journal of Intelligent Information Systems
Specifying and reasoning about dynamic access-control policies
IJCAR'06 Proceedings of the Third international joint conference on Automated Reasoning
A formal privacy system and its application to location based services
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
A metaphor and user interface for managing access permissions in shared workspace systems
From Integrated Publication and Information Systems to Virtual Information and Knowledge Environments
The structure of authority: why security is not a separable concern
MOZ'04 Proceedings of the Second international conference on Multiparadigm Programming in Mozart/Oz
Higher-order abstract non-interference
TLCA'05 Proceedings of the 7th international conference on Typed Lambda Calculi and Applications
Safety problems in access control with temporal constraints
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Foundation for a time interval access control model
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
A survey of security issue in multi-agent systems
Artificial Intelligence Review
Access rights – the keys to cooperative work/learning
MIS'04 Proceedings of the 2004 international conference on Metainformatics
A feather-weight application isolation model
INTRUST'09 Proceedings of the First international conference on Trusted Systems
Towards access control model engineering
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Implementation of access control model for distributed information systems using usage control
SIIS'11 Proceedings of the 2011 international conference on Security and Intelligent Information Systems
The authorization leap from rights to attributes: maturation or chaos?
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Decentralized governance of distributed systems via interaction control
Logic Programs, Norms and Action
Challenging issues of UCON in modern computing environments
Proceedings of the Fifth Balkan Conference in Informatics
Modular access control via strategic rewriting
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Future Generation Computer Systems
Heuristic safety analysis of access control models
Proceedings of the 18th ACM symposium on Access control models and technologies
Model-based, event-driven programming paradigm for interactive web applications
Proceedings of the 2013 ACM international symposium on New ideas, new paradigms, and reflections on programming & software
Verification and enforcement of access control policies
Formal Methods in System Design
Hi-index | 0.02 |
Abstract models are given which reflect the properties of most existing mechanisms for enforcing protection or access control, together with some possible implementations. The properties of existing systems are explicated in terms of the model and implementations.