Data Flow Security Analysis for System-of-Systems in a Public Security Incident
暂无分享,去创建一个
Madjid Merabti | Abdullahi Arabo | M. Merabti | Adrian Waller | Oliver Drew | Llewellyn-Jones | Bo Zhou | David | Qi Shi | Rachel Craddock | Glyn Jones
[1] Elisa Bertino,et al. Context-Aware Adaptation of Access-Control Policies , 2008, IEEE Internet Computing.
[2] Ning Zhang,et al. An effective model for composition of secure systems , 1998, J. Syst. Softw..
[3] Jie Xu,et al. Securing instance-level interactions in Web services , 2005, Proceedings Autonomous Decentralized Systems, 2005. ISADS 2005..
[4] Heiko Mantel,et al. Combining Different Proof Techniques for Verifying Information Flow Security , 2006, LOPSTR.
[5] Xukai Zou,et al. Composing Access Control Policies of Distributed Components , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[6] Andreas Schaad,et al. A model-checking approach to analysing organisational controls in a loan origination process , 2006, SACMAT '06.
[7] Deren Chen,et al. Securing role-based distributed collaboration system , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).
[8] Li Gong,et al. The complexity and composability of secure interoperation , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] Mario Kolberg,et al. Feature interactions in services for Internet personal appliances , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).
[10] R. Jalili,et al. Modeling of network security-related behaviours using NVML , 2004, 8th International Multitopic Conference, 2004. Proceedings of INMIC 2004..
[11] Simone Tini,et al. Rule formats for compositional non-interference properties , 2004, J. Log. Algebraic Methods Program..
[12] Pierluigi Ritrovato,et al. Dynamic security perimeters for inter-enterprise service integration , 2007, Future Gener. Comput. Syst..
[13] Morris Sloman,et al. Domain-based access control for distributed computing systems , 1988, Softw. Eng. J..
[14] Rakesh Kumar,et al. Composition trust bindings in pervasive computing service composition , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[15] John McLean. Trustworthy Software: Why we need it, Why we don't have it, How we can get it , 2006, COMPSAC.
[16] Andrea Omicini,et al. An algebraic approach for modelling organisation, roles and contexts in MAS , 2005, Applicable Algebra in Engineering, Communication and Computing.
[17] Deborah Estrin. Inter-organization networks: implications of access control: requirements for interconnection protocol , 1986, SIGCOMM '86.
[18] Philip Robinson,et al. Dynamic virtual organization management for service oriented enterprise applications , 2005, 2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[19] Christoph Ruland,et al. Provision of Secure Policy Enforcement Between Small and Medium Governmental Organizations , 2005, TrustBus.
[20] Joon S. Park,et al. Access control mechanisms for inter-organizational workflow , 2001, SACMAT '01.
[21] Brendan Jennings,et al. Context driven, user-centric access control for smart spaces , 2005 .
[22] Jan Jürjens. Composability of Secrecy , 2001, MMM-ACNS.
[23] Riccardo Focardi,et al. Information flow security in dynamic contexts , 2006, J. Comput. Secur..
[24] T. C. Ting,et al. Information sharing and security in dynamic coalitions , 2002, SACMAT '02.