On the modeling and analysis of obligations
暂无分享,去创建一个
[1] Jeffrey M. Bradshaw,et al. KAoS policy and domain services: toward a description-logic approach to policy representation, deconfliction, and enforcement , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.
[2] Martin Sailer,et al. Monitoring and execution for contract compliance , 2005 .
[3] Timothy W. Finin,et al. A policy language for a pervasive computing environment , 2003, Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks.
[4] Sushil Jajodia,et al. A logical language for expressing authorizations , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[5] Elisa Bertino,et al. On specifying security policies for web documents with an XML-based language , 2001, SACMAT '01.
[6] Sushil Jajodia,et al. Obligation monitoring in policy management , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[7] Elisa Bertino,et al. A framework for contractual resource sharing in coalitions , 2004, Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004..
[8] Tatyana Ryutov,et al. Representation and evaluation of security policies for distributed system services , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[9] Sushil Jajodia,et al. Provisions and Obligations in Policy Rule Management , 2003, Journal of Network and Systems Management.
[10] Elisa Bertino,et al. A logical framework for reasoning on data access control policies , 1999, Proceedings of the 12th IEEE Computer Security Foundations Workshop.
[11] Krysia Broda,et al. Access Control Policy Analysis Using Free Variable Tableaux , 2006 .
[12] Paulo Ferreira,et al. Obligation policies: an enforcement platform , 2005, Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05).
[13] Ross J. Anderson,et al. A security policy model for clinical information systems , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[14] Bradford W. Wade,et al. An authorization mechanism for a relational database system , 1976, TODS.
[15] Joan Feigenbaum,et al. Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.
[16] Ninghui Li,et al. Beyond proof-of-compliance: safety and availability analysis in trust management , 2003, 2003 Symposium on Security and Privacy, 2003..
[17] Krysia Broda,et al. Policy Conflict Analysis Using Free Variable Tableaux for Access Control in Web Services Environments , 2005 .
[18] Christoph Bussler,et al. Policy resolution for workflow management systems , 1994, Proceedings of the Twenty-Eighth Annual Hawaii International Conference on System Sciences.
[19] Ravi S. Sandhu,et al. The schematic protection model: its definition and analysis for acyclic attenuating schemes , 1988, JACM.
[20] Andreas Matheus,et al. How to Declare Access Control Policies for XML Structured Information Objects using OASIS' eXtensible Access Control Markup Language (XACML) , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[21] Jeffrey D. Ullman,et al. Protection in operating systems , 1976, CACM.
[22] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[23] Elisa Bertino,et al. A unified framework for enforcing multiple access control policies , 1997, SIGMOD '97.
[24] Ke Wang,et al. An access control language for web services , 2002, SACMAT '02.
[25] Bradford W. Wade,et al. An authorization mechanism for a relational data base system , 1976, SIGMOD '76.
[26] Sushil Jajodia,et al. Provisions and Obligations in Policy Management and Security Applications , 2002, VLDB.
[27] Michiharu Kudo,et al. XML document security based on provisional authorization , 2000, CCS.