-
1Academic Journal
Συγγραφείς: Daoudagh S, Lonetti F, Marchetti E
Πηγή: TELERISE 2015-IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity, pp. 8–13, Florence, Italy, 18 May 2015
info:cnr-pdr/source/autori:Daoudagh S.; Lonetti F.; Marchetti E./congresso_nome:TELERISE 2015-IEEE%2FACM 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity/congresso_luogo:Florence, Italy/congresso_data:18 May 2015/anno:2015/pagina_da:8/pagina_a:13/intervallo_pagine:8–13Θεματικοί όροι: Mutation analysis, Testing, 0202 electrical engineering, electronic engineering, information engineering, Testing and debugging, Security and protection. Access controls, Testing and Debugging, 02 engineering and technology, Security and Protection. Access controls, XACML Language
Περιγραφή αρχείου: application/pdf
Σύνδεσμος πρόσβασης: http://ieeexplore.ieee.org/document/7182463/
https://dblp.uni-trier.de/db/conf/icse/telerise2015.html#DaoudaghLM15
https://dl.acm.org/doi/10.5555/2821464.2821469
http://dblp.uni-trier.de/db/conf/icse/telerise2015.html#DaoudaghLM15
https://ieeexplore.ieee.org/document/7182463/ -
2Academic Journal
Συγγραφείς: Bertolino A, Daoudagh S, Lonetti F, Marchetti E
Πηγή: NESSOS-Network of Excellence on Engineering Secure Future Internet Software Services and Systems, pp. 28–33, Luxembourg, 18 March 2013
info:cnr-pdr/source/autori:Bertolino A.; Daoudagh S.; Lonetti F.; Marchetti E./congresso_nome:NESSOS-Network of Excellence on Engineering Secure Future Internet Software Services and Systems/congresso_luogo:Luxembourg/congresso_data:18 March 2013/anno:2013/pagina_da:28/pagina_a:33/intervallo_pagine:28–33Θεματικοί όροι: Policy testing, Mutation analysis, D.2.5 Testing and Debugging, XACML, 0211 other engineering and technologies, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology, D.2 SOFTWARE ENGINEERING, D.2.6 Security and Protection. Access controls
Περιγραφή αρχείου: application/pdf
Σύνδεσμος πρόσβασης: https://ieeexplore.ieee.org/abstract/document/6571605
https://www.computer.org/csdl/proceedings-article/icstw/2013/4993a028/12OmNzSh162
https://dblp.uni-trier.de/db/conf/icst/icstw2013.html#BertolinoDLM13
https://hdl.handle.net/20.500.14243/253139
https://doi.org/10.1109/ICSTW.2013.11 -
3Academic Journal
Συγγραφείς: Matthias Keil, Peter Thiemann
Συνεισφορές: The Pennsylvania State University CiteSeerX Archives
Θεματικοί όροι: ERATING SYSTEMS, Security and Protection—Access controls General Terms Design, Languages, Security, Verification Keywords Access Permission Contracts, JavaScript, Proxies
Περιγραφή αρχείου: application/pdf
-
4Book
Συγγραφείς: Bertolino A, Busch M, Daoudagh S, Lonetti F, Marchetti E
Πηγή: Lecture Notes in Computer Science ISBN: 9783319074511
Engineering Secure Future Internet Services and Systems-Current Research, edited by Maritta Heisel, Wouter Joosen, Javier Lopez, Fabio Martinelli, pp. 266–286, 2014
info:cnr-pdr/source/autori:Bertolino A.; Busch M.; Daoudagh S.; Lonetti F.; Marchetti E./titolo:A toolchain for designing and testing access control policies/titolo_volume:Engineering Secure Future Internet Services and Systems-Current Research/curatori_volume:Maritta Heisel, Wouter Joosen, Javier Lopez, Fabio Martinelli/editore:/anno:2014Θεματικοί όροι: Authorization systems, Access control policies, D.4.6 Security and Protection. Access controls, Security
Περιγραφή αρχείου: application/pdf
Σύνδεσμος πρόσβασης: https://dblp.uni-trier.de/db/series/lncs/lncs8431.html#BertolinoBDLM14
https://doi.org/10.1007/978-3-319-07452-8_11
https://rd.springer.com/chapter/10.1007/978-3-319-07452-8_11
https://link.springer.com/chapter/10.1007%2F978-3-319-07452-8_11
https://link.springer.com/content/pdf/10.1007%2F978-3-319-07452-8_11.pdf
http://link.springer.com/chapter/10.1007/978-3-319-07452-8_11#close
https://doi.org/10.1007/978-3-319-07452-8_11
https://hdl.handle.net/20.500.14243/270908 -
5Academic Journal
Συγγραφείς: Adrienne Porter Felt, Serge Egelman, Ariel Haney, Erika Chin, David Wagner
Συνεισφορές: The Pennsylvania State University CiteSeerX Archives
Θεματικοί όροι: Categories and Subject Descriptors H.5.2 [Information Interfaces and Presentation, User Interfaces, D.4.6 [Software, Security and Protection—Access controls General Terms Human Factors, Security Keywords Android
Περιγραφή αρχείου: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.259.6188; http://cups.cs.cmu.edu/soups/2012/proceedings/a3_Felt.pdf
-
6Academic Journal
Συγγραφείς: Richard Wartell, Vishwath Mohan, Kevin W. Hamlen, Zhiqiang Lin
Συνεισφορές: The Pennsylvania State University CiteSeerX Archives
Θεματικοί όροι: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, D.3.4 [Programming Languages, Processors—Code generation, D.2.4 [Software Engineering, Software/Program Verification—Validation
Περιγραφή αρχείου: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.376.663; http://www.utdallas.edu/~kxh060100/wartell12acsac.pdf
-
7Academic Journal
Συγγραφείς: Zhongyuan Xu, Scott D. Stoller
Συνεισφορές: The Pennsylvania State University CiteSeerX Archives
Θεματικοί όροι: Categories and Subject Descriptors, D.4.6 [Operat- ing Systems, Security and Protection—Access Controls, H.2.8 [Database Management, Database Applications— Data Mining Keywords, role mining, role-based access control
Περιγραφή αρχείου: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.699.2527; http://www3.cs.stonybrook.edu/%7Estoller/papers/sacmat2012.pdf
-
8Academic Journal
Συγγραφείς: Alex X. Liu
Συνεισφορές: The Pennsylvania State University CiteSeerX Archives
Θεματικοί όροι: Categories and Subject Descriptors, C.2.0 [Computer-communication Networks, General—Security and protection (e.g, firewalls, D.4.6 [Operating Systems, Security and Protection—Access controls, D.2.9 [Software Engineering, Management—Software configuration management General Terms, Algorithms, Management, Security Additional Key Words and Phrases, Firewall policy, change-impact analysis, access control ACM Reference Format
Περιγραφή αρχείου: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.310.3535; http://www.cse.msu.edu/~alexliu/publications/ChangeImpact/ChangeImpact_TOIT.pdf
-
9Academic Journal
Συγγραφείς: Jad Naous, Michael Walfish, Antonio Nicolosi, David Mazières, Michael Miller, Arun Seehra
Συνεισφορές: The Pennsylvania State University CiteSeerX Archives
Θεματικοί όροι: Categories and Subject Descriptors, C.2.1 [Computer-Comunication Networks, Network architecture and design, C.2.0 [Computer-Communication Networks, General—Security and protection, C.2.2 [Computer-Communication Networks, Network protocols, D.4.6 [Operating Systems, Security and Protection—Access controls, Authentication, Cryptographic controls, General Terms, Algorithms, Design, Experimentation, Performance, Security Keywords, Path enforcement, consent, NetFPGA, default-off
Περιγραφή αρχείου: application/pdf
-
10Academic Journal
Συγγραφείς: Lujo Bauer, Scott Garriss Google
Συνεισφορές: The Pennsylvania State University CiteSeerX Archives
Θεματικοί όροι: Categories and Subject Descriptors, D.4.6 [Operating Systems, Security and Protection—Access controls, H.2.0 [Database Management, General—Security, integrity, and protection, K.6.5 [Management of Computing and Information Systems, Security and Protection—Authentication General Terms, Experimentation, Human Factors, Security Additional Key Words and Phrases, Access control, policy inference, machine learning ACM Reference Format
Περιγραφή αρχείου: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.300.491; http://www.cs.unc.edu/~reiter/papers/2011/TISSEC1.pdf
-
11Academic Journal
Συγγραφείς: Aleksandar Nanevski, Anindya Banerjee
Συνεισφορές: The Pennsylvania State University CiteSeerX Archives
Θεματικοί όροι: Categories and Subject Descriptors, D.3.1 [Programming Languages, Formal Definitions and Theory— Semantics, D.4.6 [Operating System, Security and Protection—Access Controls, Information Flow Con- trols, Verification, F.3.1 [Logics and Meanings of Programs, Specifying and Verifying and Reasoning about Programs—Assertions, invariants, logics of programs, pre- and post-conditions General Terms, Security, Languages Additional Key Words and Phrases, Information flow, access control, type theory ACM Reference Format
Περιγραφή αρχείου: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.682.492; http://software.imdea.org/%7Ealeks/rhtt/rhtt_toplas.pdf
-
12Academic Journal
Συγγραφείς: Paul Dunphy, Andreas P. Heiner, N. Asokan
Συνεισφορές: The Pennsylvania State University CiteSeerX Archives
Θεματικοί όροι: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access Controls, Authentication, K.6.5 [Management of Computing and Information Systems, Security and Protection—Authentication
Περιγραφή αρχείου: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.363.1255; http://cups.cs.cmu.edu/soups/2010/proceedings/a3_dunphy.pdf
-
13Academic Journal
Συγγραφείς: Xiaopu Ma, Ruixuan Li, Zhengding Lu
Συνεισφορές: The Pennsylvania State University CiteSeerX Archives
Θεματικοί όροι: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access Controls, H.2.8 [Database Management, Database Application—Data Mining General Terms Security, Management Keywords RBAC, role engineering, role mining, weight, similarity
Περιγραφή αρχείου: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.302.7445; http://cs.hust.edu.cn/rxli/publications/2010/sacmat10_rolemining.pdf
-
14Academic Journal
Συγγραφείς: Fei Chen, Alex X. Liu, Jeehyun Hwang, Tao Xie, North Carolina
Συνεισφορές: The Pennsylvania State University CiteSeerX Archives
Θεματικοί όροι: Categories and Subject Descriptors, D.4.6 [Operating Systems, Security and Protection—Access controls General Terms, Algorithms, Performance, Security Additional Key Words and Phrases, Automatic fault fixing, firewall faults, firewall policy ACM Reference Format
Περιγραφή αρχείου: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.261.3145; http://www.cse.msu.edu/%7Ealexliu/publications/FirewallFixingMSU/FirewallFixing_TAAS.pdf
-
15Academic Journal
Συγγραφείς: Brian W. Devries, Gopal Gupta, Kevin W. Hamlen, Scott Moore, Meera Sridhar
Συνεισφορές: The Pennsylvania State University CiteSeerX Archives
Θεματικοί όροι: Categories and Subject Descriptors D.2.4 [Programming Languages, Software/Program Verification, D.4.6 [Operating Systems, Security and Protection—access controls, D.3.2 [Programming Languages, Language Classifications— constraint and logic languages General Terms Languages, Security Keywords ActionScript, Verification, Coinductive Logic Programming, Model Checking, In-lined Reference Monitoring
Περιγραφή αρχείου: application/pdf
-
16Academic Journal
Συγγραφείς: Christian W. Probst, René Rydhof Hansen
Συνεισφορές: The Pennsylvania State University CiteSeerX Archives
Θεματικοί όροι: Categories and Subject Descriptors C.2.4 [Computer-Communication Networks, Distributed Systems, D.4.6 [Operating Systems, Security and Protection—Access controls, H.3.4 [Information Storage and Retrieval, Systems
Περιγραφή αρχείου: application/pdf
-
17Academic Journal
Συγγραφείς: Liang Cai, Sridhar Machiraju, Hao Chen
Συνεισφορές: The Pennsylvania State University CiteSeerX Archives
Θεματικοί όροι: D.4.6 [Operating Systems, Security and Protection—Access controls, Information flow controls, Invasive software General Terms Design, Security, Human Factors Keywords privacy, mobile, sensor, sniffing, microphone
Περιγραφή αρχείου: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.214.5435; http://conferences.sigcomm.org/sigcomm/2009/workshops/mobiheld/papers/p31.pdf
-
18Academic Journal
Συγγραφείς: Adam J. Lee, Ting Yu
Συνεισφορές: The Pennsylvania State University CiteSeerX Archives
Θεματικοί όροι: Categories and Subject Descriptors, C.2.4 [Distributed Systems, Distributed applications, D.4.6 [Operating Systems, Security and Protection—access controls, authentication, K.6.5 [Management of Computing and Information Systems, Security and Protection General Terms, Security Keywords, Credentials, policy, reputation, trust
Περιγραφή αρχείου: application/pdf
-
19Academic Journal
Συγγραφείς: Ram Krishnan, Jianwei Niu
Συνεισφορές: The Pennsylvania State University CiteSeerX Archives
Θεματικοί όροι: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection – Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection –Unauthorized access
Περιγραφή αρχείου: application/pdf
-
20Academic Journal
Συγγραφείς: Ram Krishnan, Jianwei Niu
Συνεισφορές: The Pennsylvania State University CiteSeerX Archives
Θεματικοί όροι: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection – Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection –Unauthorized access
Περιγραφή αρχείου: application/pdf