Delegation of authority using domain-based access rules

[1]  J. Michael Spivey,et al.  The Z notation - a reference manual , 1992, Prentice Hall International Series in Computer Science.

[2]  C.-F. Yu Access control and authorization plan for customer control of network services , 1989, IEEE Global Telecommunications Conference, 1989, and Exhibition. 'Communications Technology for the 1990s and Beyond.

[3]  Mahadev Satyanarayanan,et al.  Integrating security in a large distributed system , 1989, TOCS.

[4]  Stephen T. Vinter,et al.  Extended discretionary access controls , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.

[5]  D. C. Robinson Domains : a uniform approach to distributed system management , 1988 .

[6]  Queens Gate,et al.  Domains: A New Approach to Distributed System Management , 1988 .

[7]  Deborah Estrin Controls for Interorganization Networks , 1987, IEEE Transactions on Software Engineering.

[8]  Roger M. Needham,et al.  Authentication revisited , 1987, OPSR.

[9]  Deborah Estrin Non-Discretionary Controls for Inter-Organization Networks , 1985, 1985 IEEE Symposium on Security and Privacy.

[10]  Carl E. Landwehr,et al.  Formal Models for Computer Security , 1981, CSUR.

[11]  Lawrence Snyder,et al.  Formal Models of Capability-Based Protection Systems , 1981, IEEE Transactions on Computers.

[12]  T. Linden Operating System Structures to Support Security and Reliable Software , 1976, CSUR.