An authorization mechanism for a relational database system
ACM Transactions on Database Systems (TODS)
A Linear Time Algorithm for Deciding Subject Security
Journal of the ACM (JACM)
Protection in operating systems
Communications of the ACM
POPL '83 Proceedings of the 10th ACM SIGACT-SIGPLAN symposium on Principles of programming languages
The Darwin software-evolution environment
SDE 1 Proceedings of the first ACM SIGSOFT/SIGPLAN software engineering symposium on Practical software development environments
The schematic protection model: its definition and analysis for acyclic attenuating schemes
Journal of the ACM (JACM)
A formal protection model of security in centralized, parallel, and distributed systems
ACM Transactions on Computer Systems (TOCS)
The Imposition of Protocols Over Open Distributed Systems
IEEE Transactions on Software Engineering
POPL '83 Proceedings of the 10th ACM SIGACT-SIGPLAN symposium on Principles of programming languages
An Access Control Model and Its Use in Representing Mental Health Application Access Policy
IEEE Transactions on Knowledge and Data Engineering
Kernel design for isolation and assurance of physical memory
Proceedings of the 1st workshop on Isolation and integration in embedded systems
Access control requirements for preventing insider threats
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Hi-index | 0.00 |