Expressive Policy Analysis with Laws of System Change
暂无分享,去创建一个
Jorge Lobo | Alessandra Russo | Emil C. Lupu | Robert Craven | Morris Sloman | Arosha Bandara | Emil Lupu | Seraphin Calo | Jiefei | Jorge Lobo | S. Calo | A. Russo | A. Bandara | M. Sloman | R. Craven
[1] Jorge Lobo,et al. Expressive policy analysis with enhanced system dynamicity , 2009, ASIACCS '09.
[2] Marek J. Sergot,et al. A logic-based calculus of events , 1989, New Generation Computing.
[3] Sebastian Nanz,et al. The Role of Abduction in Declarative Authorization Policies , 2008, PADL.
[4] Jorge Lobo,et al. Toward a Formal Characterization of Policy Specification & Analysis , 2007 .
[5] Kathi Fisler,et al. Obligations and Their Interaction with Programs , 2007, ESORICS.
[6] Naranker Dulay,et al. Authorisation and Conflict Resolution for Hierarchical Domains , 2007, Eighth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'07).
[7] Ting Yu,et al. On the modeling and analysis of obligations , 2006, CCS '06.
[8] Kathi Fisler,et al. Specifying and Reasoning About Dynamic Access-Control Policies , 2006, IJCAR.
[9] George Pavlou,et al. Policy refinement for DiffServ quality of service management , 2005, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005..
[10] Bert Van Nuffelen. Abductive constraint logic programming: implementation and applications. , 2004 .
[11] Peter Sewell,et al. Cassandra: flexible trust management, applied to electronic health records , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[12] Joseph Y. Halpern,et al. Using first-order logic to reason about policies , 2003, 16th IEEE Computer Security Foundations Workshop, 2003. Proceedings..
[13] Murray Shanahan,et al. Some Alternative Formulations of the Event Calculus , 2002, Computational Logic: Logic Programming and Beyond.
[14] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.
[15] Sushil Jajodia,et al. Flexible support for multiple access control policies , 2001, TODS.
[16] R. Sandhu,et al. The ARBAC97 model for role-based administration of roles , 1999, TSEC.
[17] Mary Ellen Zurko,et al. Separation of duty in role-based environments , 1997, Proceedings 10th Computer Security Foundations Workshop.
[18] Elisa Bertino,et al. A unified framework for enforcing multiple access control policies , 1997, SIGMOD '97.
[19] Sushil Jajodia,et al. A logical language for expressing authorizations , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[20] Jan Chomicki,et al. Efficient checking of temporal integrity constraints using bounded history encoding , 1995, TODS.
[21] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[22] V. Lifschitz,et al. The Stable Model Semantics for Logic Programming , 1988, ICLP/SLP.
[23] R. Goldblatt. Logics of Time and Computation , 1987 .