Enforcing enterprise-wide policies over standard client-server interactions
暂无分享,去创建一个
[1] Noah Treuhaft,et al. Recovery Oriented Computing (ROC): Motivation, Definition, Techniques, and Case Studies , 2002 .
[2] Lawrence Snyder. Theft and Conspiracy in the Take-Grant Protection Model , 1981, J. Comput. Syst. Sci..
[3] Naftaly H. Minsky,et al. On Shouting "Fire!": Regulating Decoupled Communication in Distributed Systems , 2003, Middleware.
[4] Jan Vitek,et al. Secure Internet Programming: Security Issues for Mobile and Distributed Objects , 1999 .
[5] Angelos D. Keromytis,et al. Proceedings of the Freenix Track: 2003 Usenix Annual Technical Conference Secure and Flexible Global File Sharing , 2022 .
[6] Naftaly H. Minsky,et al. On the role of roles: from role-based to role-sensitive access control , 2004, SACMAT '04.
[7] Victoria Ungureanu,et al. Formal treatment of certificate revocation under communal access control , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[8] Simon S. Lam,et al. A framework for distributed authorization , 1993, Conference on Computer and Communications Security.
[9] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.
[10] M. Satyanarayanan. Digest of Proceedings , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.
[11] Tatyana Ryutov,et al. Representation and evaluation of security policies for distributed system services , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[12] Günter Karjoth. The Authorization Service of Tivoli Policy Director , 2001, Seventeenth Annual Computer Security Applications Conference.
[13] Naftaly H. Minsky,et al. Controllable delegation: an exercise in law-governed systems , 1989, OOPSLA '89.
[14] Angelos D. Keromytis,et al. WebDAVA: An administrator-free approach to Web file-sharing , 2003, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003..
[15] S. Bellovin. Distributed Firewalls , 1994 .
[16] Moshe Litvin,et al. A Hybrid Authentication Mode for IKE , 2000 .
[17] Mahadev Satyanarayanan. Digest of proceedings seventh IEEE workshop on hot topics in operating systems March 29-30 1999, Rio Rico, AZ , 1999, OPSR.
[18] Margo I. Seltzer,et al. Berkeley DB , 1999, USENIX Annual Technical Conference, FREENIX Track.
[19] Victoria Ungureanu,et al. Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems , 2000, TSEM.
[20] Naftaly H. Minsky,et al. Regulating Work in Digital Enterprises: A Flexible Managerial Framework , 2002, CoopIS/DOA/ODBASE.
[21] Jeffrey O. Kephart,et al. The Vision of Autonomic Computing , 2003, Computer.
[22] B. Clifford Neuman,et al. The specification and enforcement of advanced security policies , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[23] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[24] Vijay Varadharajan,et al. Authorization in enterprise-wide distributed system: a practical design and application , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[25] Magnus Karlsson,et al. Taming aggressive replication in the Pangaea wide-area file system , 2002, OPSR.