Protecting Critical Infrastructures While Preserving Each Organization's Autonomy
暂无分享,去创建一个
[1] Jean-Claude Laprie,et al. Modelling Interdependencies Between the Electricity and Information Infrastructures , 2007, SAFECOMP.
[2] Jorge Lobo,et al. An obligation model bridging access control policies and privacy policies , 2008, SACMAT '08.
[3] Roberto Setola,et al. Critical Information Infrastructure Security, Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008. Revised Papers , 2009, Critical Information Infrastructures Security.
[4] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[5] Dennis G. Kafura,et al. First experiences using XACML for access control in distributed systems , 2003, XMLSEC '03.
[6] Rogério de Lemos,et al. Architecting dependable systems , 2003, J. Syst. Softw..
[7] Anas Abou El Kalam,et al. Access Control for Collaborative Systems: A Web Services Based Approach , 2007, IEEE International Conference on Web Services (ICWS 2007).
[8] Yi Deng,et al. A framework for implementing role-based access control using CORBA security service , 1999, RBAC '99.
[9] Joachim Biskup,et al. Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings , 2007, ESORICS.
[10] Elisa Bertino,et al. Secure collaboration in mediator-free environments , 2005, CCS '05.
[11] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[12] David Clark,et al. Safety and Security Analysis of Object-Oriented Models , 2002, SAFECOMP.
[13] Christian Schaefer,et al. A Policy Language for Distributed Usage Control , 2007, ESORICS.
[14] Anas Abou El Kalam,et al. PolyOrBAC: A security framework for Critical Infrastructures , 2009, Int. J. Crit. Infrastructure Prot..
[15] Frédéric Cuppens,et al. Organization based access control , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.
[16] Massoud Amin. North America's Electricity Infrastructure: Are We Ready for More Perfect Storms? , 2003, IEEE Secur. Priv..
[17] Vijayalakshmi Atluri,et al. Modeling and Analysis of Workflows Using Petri Nets , 1998, Journal of Intelligent Information Systems.
[18] Miguel Correia,et al. The CRUTIAL Architecture for Critical Information Infrastructures , 2008, WADS.
[19] Xie Li,et al. Role-based access control system for Web services , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..
[20] Philippe Schnoebelen,et al. Systems and Software Verification, Model-Checking Techniques and Tools , 2001 .
[21] Geert Deconinck,et al. An overlay protection layer against Denial-of-Service attacks , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.
[22] Jorge Lobo,et al. Policy decomposition for collaborative access control , 2008, SACMAT '08.
[23] James P. Peerenboom,et al. Identifying, understanding, and analyzing critical infrastructure interdependencies , 2001 .
[24] Sushil Jajodia,et al. Obligation monitoring in policy management , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[25] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[26] Ian T. Foster,et al. A community authorization service for group collaboration , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[27] Elisa Bertino,et al. The specification and enforcement of authorization constraints in workflow management systems , 1999, TSEC.
[28] Klaus R. Dittrich,et al. An access control mechanism for P2P collaborations , 2008, DaMaP '08.
[29] Andreas Matheus,et al. How to Declare Access Control Policies for XML Structured Information Objects using OASIS' eXtensible Access Control Markup Language (XACML) , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[30] Nora Cuppens-Boulahia,et al. O2O: Virtual Private Organizations to Manage Security Policy Interoperability , 2006, ICISS.
[31] Anas Abou El Kalam,et al. Critical Infrastructures Security Modeling, Enforcement and Runtime Checking , 2008, CRITIS.
[32] Jorge Lobo,et al. Policies for Distributed Systems and Networks , 2001, Lecture Notes in Computer Science.
[33] Sushil Jajodia,et al. Flexible support for multiple access control policies , 2001, TODS.
[34] Geoffrey Smith,et al. Managing security policies in a distributed environment using eXtensible markup language (XML) , 2001, SAC.
[35] Philippe Schnoebelen,et al. Systems and Software Verification , 2001, Springer Berlin Heidelberg.
[36] Rajeev Alur,et al. A Theory of Timed Automata , 1994, Theor. Comput. Sci..