Embedding role-based access control model in object-oriented systems to protect privacy
暂无分享,去创建一个
[1] Roger S. Pressman,et al. Software Engineering: A Practitioner's Approach , 1982 .
[2] Sylvia L. Osborn,et al. Modeling Mandatory Access Control in Role-Based Security Systems , 1995, DBSec.
[3] Sushil Jajodia,et al. Integrating an object-oriented data model with multilevel security , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[4] Dan Thomsen,et al. Role-Based Application Design and Enforcement , 1990, Database Security.
[5] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[6] Andrew C. Myers,et al. Protecting privacy using the decentralized label model , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[7] Ivar Jacobson,et al. The unified modeling language reference manual , 2010 .
[8] D. Richard Kuhn,et al. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems , 1997, RBAC '97.
[9] Ravi S. Sandhu. Role Hierarchies and Constraints for Lattice-Based Access Controls , 1996, ESORICS.
[10] James A. Reeds,et al. Multilevel security in the UNIX tradition , 1992, Softw. Pract. Exp..
[11] Pietro Iglio,et al. A formal model for role-based access control with constraints , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.
[12] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[13] Makoto Takizawa,et al. A purpose-oriented access control model , 1998, Proceedings Twelfth International Conference on Information Networking (ICOIN-12).
[14] Elisa Bertino,et al. Information Flow Control in Object-Oriented Systems , 1997, IEEE Trans. Knowl. Data Eng..
[15] Roberto Gorrieri,et al. The Compositional Security Checker: A Tool for the Verification of Information Flow Security Properties , 1997, IEEE Trans. Software Eng..
[16] Warwick Ford,et al. Secure electronic commerce , 1997 .
[17] Sylvia L. Osborn. Mandatory access control and role-based access control revisited , 1997, RBAC '97.
[18] Chang Nian Zhang,et al. An object-oriented RBAC model for distributed system , 2001, Proceedings Working IEEE/IFIP Conference on Software Architecture.
[19] Gail-Joon Ahn,et al. Role-based authorization constraints specification , 2000, TSEC.
[20] William E. Lorensen,et al. Object-Oriented Modeling and Design , 1991, TOOLS.
[21] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[22] Vijay Varadharajan,et al. A multilevel security model for a distributed object-oriented system , 1990, [1990] Proceedings of the Sixth Annual Computer Security Applications Conference.
[23] Andrew C. Myers,et al. Complete, safe information flow with decentralized labels , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[24] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[25] Mary Ellen Zurko,et al. Separation of duty in role-based environments , 1997, Proceedings 10th Computer Security Foundations Workshop.
[26] Grady Booch,et al. Object-Oriented Analysis and Design with Applications , 1990 .
[27] Elisa Bertino,et al. Exception-based information flow control in object-oriented systems , 1998, TSEC.
[28] Makoto Takizawa,et al. Information flow in a purpose-oriented access control model , 1997, Proceedings 1997 International Conference on Parallel and Distributed Systems.
[29] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[30] LouAnna Notargiacomo,et al. Beyond the pale of MAC and DAC-defining new forms of access control , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[31] Ravi S. Sandhu,et al. Lattice-based access control models , 1993, Computer.
[32] Roger S. Pressman,et al. Software Engineering: A Practitioner's Approach (McGraw-Hill Series in Computer Science) , 2004 .
[33] Geoffrey Smith,et al. Secure information flow in a multi-threaded imperative language , 1998, POPL '98.
[34] Sylvia L. Osborn,et al. Access Rights Administration in Role-Based Security Systems , 1994, DBSec.
[35] Andrew C. Myers,et al. A decentralized model for information flow control , 1997, SOSP.
[36] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[37] Elisa Bertino,et al. Providing flexibility in information flow control for object oriented systems , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[38] Zahir Tari,et al. A Role-Based Access Control for Intranet Security , 1997, IEEE Internet Comput..
[39] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[40] Sylvia L. Osborn,et al. The role graph model and conflict of interest , 1999, TSEC.
[41] Johan Agat,et al. Transforming out timing leaks , 2000, POPL '00.
[42] Grady Booch,et al. Object-oriented analysis and design with applications (2nd ed.) , 1993 .
[43] Andrew C. Myers,et al. Untrusted hosts and confidentiality , 2001, SOSP.
[44] Fred B. Schneider,et al. Enforceable security policies , 2000, TSEC.
[45] David F. Ferraiolo,et al. On the formal definition of separation-of-duty policies and their composition , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[46] Ravi S. Sandhu,et al. Configuring role-based access control to enforce mandatory and discretionary access control policies , 2000, TSEC.
[47] Makoto Takizawa,et al. Information flow control in role-based model for distributed objects , 2001, Proceedings. Eighth International Conference on Parallel and Distributed Systems. ICPADS 2001.