A Hierarchical Release Control Policy Framework
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Provisions and Obligations in Policy Management and Security Applications , 2002, VLDB.
[2] J. Lloyd. Foundations of Logic Programming , 1984, Symbolic Computation.
[3] LouAnna Notargiacomo,et al. Beyond the pale of MAC and DAC-defining new forms of access control , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[4] Andrew C. Myers,et al. A decentralized model for information flow control , 1997, SOSP.
[5] Simon N. Foley. A model for secure information flow , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[6] Elisa Bertino,et al. Information Flow Control in Object-Oriented Systems , 1997, IEEE Trans. Knowl. Data Eng..
[7] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[8] Sushil Jajodia,et al. Flexible support for multiple access control policies , 2001, TODS.
[9] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[10] Sushil Jajodia,et al. Policy algebras for access control the predicate case , 2002, CCS '02.
[11] Sabrina De Capitani di Vimercati,et al. A modular approach to composing access control policies , 2000, CCS.
[12] Allen Van Gelder,et al. The Alternating Fixpoint of Logic Programs with Negation , 1993, J. Comput. Syst. Sci..