|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 49 occurrences of 44 keywords
|
|
|
Results
Found 37 publication records. Showing 37 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
125 | Jason Crampton, Wing Leung, Konstantin Beznosov |
The secondary and approximate authorization model and its application to Bell-LaPadula policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 111-120, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Bell-LaPadula model, authorization recycling, access control, SAAM |
96 | Gansen Zhao, David W. Chadwick |
On the Modeling of Bell-LaPadula Security Policies Using RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 17th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, WETICE 2008, Rome, Italy, June 23-25, 2008, Proceedings, pp. 257-262, 2008, IEEE Computer Society, 978-0-7695-3315-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Bell-LaPadula Security Policies, Modelling, RBAC |
78 | Stéphane Onno |
A Federated Physical and Logical Access Control Enforcement Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 683-692, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control federation, logical access control, physical access control, Bell-lapadula |
78 | Mark Moriconi, Xiaolei Qian, Robert A. Riemenschneider, Li Gong |
Secure Software Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 84-93, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
secure software architectures, open architectural standards, competitive success, secure system design, X/Open distributed transaction processing reference architecture, secure access control, Bell-LaPadula model, formal methods, authorisation, security properties, computer industry |
57 | Carl E. Landwehr, Constance L. Heitmeyer, John D. McLean |
A Security Model for Military Message Systems: Retrospective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 174-190, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Storage channels, Security, Verification, confinement, message systems |
57 | Vincent Nicomette, Yves Deswarte |
An Authorization Scheme For Distributed Object Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 21-30, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
multilevel security policy, authorization, delegation, object model, protection, access rights |
49 | Roderick Chapman, Adrian Hilton 0002 |
Enforcing security and safety models with an information flow analysis tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGAda ![In: Proceedings of the 2004 Annual ACM SIGAda International Conference on Ada: The Engineering of Correct and Reliable Software for Real-Time & Distributed Systems using Ada and Related Technologies 2004, Atlanta, GA, USA, November 14-14, 2004, pp. 39-46, 2004, ACM, 1-58113-906-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Bell-LaPadula, Dolev-Yao, SPARK Ada, security, Ada, safety, information flow |
47 | H. C. Chong, K. L. Eddie Law |
Multi-Blockchain Model for Data Sharing with Bell-LaPadula Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Blockchain ![In: IEEE International Conference on Blockchain, Blockchain 2023, Danzhou, China, December 17-21, 2023, pp. 55-61, 2023, IEEE, 979-8-3503-1929-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
47 | Runnan Zhang, Gang Liu 0006, Hongzhaoning Kang, Quan Wang 0006, Yumin Tian, Can Wang |
Improved Bell-LaPadula Model With Break the Glass Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Reliab. ![In: IEEE Trans. Reliab. 70(3), pp. 1232-1241, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Randhir Kumar, Rakesh Tripathi |
Scalable and secure access control policy for healthcare system using blockchain and enhanced Bell-LaPadula model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 12(2), pp. 2321-2338, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Li Yang 0012, Jin Wang 0001, Zhuo Tang, Neal N. Xiong |
Using Conditional Random Fields to Optimize a Self-Adaptive Bell-LaPadula Model in Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Syst. ![In: IEEE Trans. Syst. Man Cybern. Syst. 51(7), pp. 4505-4519, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Maximiliano Cristiá, Gianfranco Rossi |
Automated Proof of Bell-LaPadula Security Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Autom. Reason. ![In: J. Autom. Reason. 65(4), pp. 463-478, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
47 | Maximiliano Cristiá, Gianfranco Rossi |
Automated Proof of Bell-LaPadula Security Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2001.10512, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
47 | Zhuo Tang, Xiaofei Ding, Ying Zhong, Li Yang 0012, Keqin Li 0001 |
A Self-Adaptive Bell-LaPadula Model Based on Model Training With Historical Access Logs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 13(8), pp. 2047-2061, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
47 | Ebru Celikel Cankaya |
Bell-LaPadula Confidentiality Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 71-74, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
47 | Lionel Habib, Mathieu Jaume, Charles Morisset |
A Formal Comparison of the Bell & LaPadula and RBAC Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proccedings of the Fourth International Conference on Information Assurance and Security, IAS 2008, September 8-10, 2008, Napoli, Italy, pp. 3-8, 2008, IEEE Computer Society, 978-0-7695-3324-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Jan Verschuren, René Govaerts, Joos Vandewalle |
Realization of the Bell-LaPadula Security Policy in an OSI-Distributed System using Asymmetric and Symmetric Cryptographic Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 5th IEEE Computer Security Foundations Workshop - CSFW'92, Franconia, New Hampshire, USA, June 16-18, 1992, Proceedings, pp. 168-178, 1992, IEEE Computer Society, 0-8186-2850-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
47 | Ian Sutherland |
Relating Bell-LaPadula-Style Security Models to Information Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: First IEEE Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings, pp. 112-123, 1988, MITRE Corporation Press. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP BibTeX RDF |
|
28 | Shahriyar Mohammadi, Hediy Jahanshahi |
A secure E-tendering system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: 2009 IEEE International Conference on Electro/Information Technology, EIT 2009, Windsor, Ontario, Canada, June 7-9, 2009, pp. 62-67, 2009, IEEE, 978-1-4244-3355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Khair Eddin Sabri, Ridha Khédri, Jason Jaskolka |
Verification of Information Flow in Agent-Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MCETECH ![In: E-Technologies: Innovation in an Open World, 4th International Conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009. Proceedings, pp. 252-266, 2009, Springer, 978-3-642-01186-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Global calculus, Information Algebra, Agent Knowledge, Information Flow, Hoare Logic |
28 | Scott E. Coull, Matthew Green 0001, Susan Hohenberger |
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 501-520, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Jafar Haadi Jafarian, Morteza Amini, Rasool Jalili |
A Context-Aware Mandatory Access Control Model for Multilevel Security Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 27th International Conference, SAFECOMP 2008, Newcastle upon Tyne, UK, September 22-25, 2008, Proceedings, pp. 401-414, 2008, Springer, 978-3-540-87697-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Context-Awareness, Integrity, Confidentiality, Mandatory Access Control |
28 | Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John Andrew Clark |
MLS security policy evolution with genetic programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008, pp. 1571-1578, 2008, ACM, 978-1-60558-130-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
policy inference, genetic programming, security policy, MLS |
28 | Shuangbao Wang 0001, Qing Chen, Michael Behrmann |
Agent-based ubiquitous m-learning portal for K-12 teachers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSTST ![In: CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, Cergy-Pontoise, France, October 28-31, 2008, pp. 525-529, 2008, ACM, 978-1-60558-046-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
vodcast, security, adaptive, intelligent agents, portal, m-Learning |
28 | Indrakshi Ray, Manachai Toahchoodee |
A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 5th International Conference, TrustBus 2008, Turin, Italy, September 4-5, 2008, Proceedings, pp. 48-58, 2008, Springer, 978-3-540-85734-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Matthias Schwan |
An extended model of security policy for multi-applicative smart cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 226-233, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
biometrics, smart cards, security policy, electronic signatures |
28 | Trent Jaeger, Reiner Sailer, Yogesh Sreenivasan |
Managing the risk of covert information flows in virtual machine systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 81-90, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
chinese wall policy, information flow secrecy, covert channels |
28 | Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A. Karger, Grant M. Wagner, Angela Schuett Reninger |
Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 222-230, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Marc Lelarge, Zhen Liu 0001, Anton Riabov |
Automatic Composition of Secure Workflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, Third International Conference, ATC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 322-331, 2006, Springer, 3-540-38619-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Peter Y. A. Ryan |
Shedding Light on Haunted Corners of Information Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
25 Years Communicating Sequential Processes ![In: Communicating Sequential Processes: The First 25 Years, Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004, Revised Invited Papers, pp. 264-264, 2004, Springer, 3-540-25813-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Yixin Jiang, Chuang Lin 0002, Hao Yin, Zhangxi Tan |
Security analysis of mandatory access control model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (6) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 5013-5018, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Edgar R. Weippl, Alexander Schatten, Shuaib Karim, A Min Tjoa |
SemanticLIFE Collaboration: Security Requirements and Solutions - Security Aspects of Semantic Knowledge Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKM ![In: Practical Aspects of Knowledge Management, 5th International Conference, PAKM 2004, Vienna, Austria, December 2-3, 2004, Proceedings, pp. 365-377, 2004, Springer, 3-540-24088-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Hanne Riis Nielson, Flemming Nielson, Mikael Buchholtz |
Security for Mobility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design II, FOSAD 2001/2002 Tutorial Lectures, pp. 207-265, 2002, Springer, 3-540-20955-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Trent Jaeger, Jonathon Tidswell |
Practical safety in flexible access control models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 4(2), pp. 158-190, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
authorization mechanisms, role-based access control, Access control models |
28 | Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll |
Verification of a Formal Security Model for Multiapplicative Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings, pp. 17-36, 2000, Springer, 3-540-41031-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
28 | Vincent Nicomette, Yves Deswarte |
A Multilevel Security Model for Distributed Object Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings, pp. 80-98, 1996, Springer, 3-540-61770-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
28 | Ross J. Anderson |
A Security Policy Model for Clinical Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1996 IEEE Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, USA, pp. 30-43, 1996, IEEE Computer Society, 0-8186-7417-2. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
personal health information protection, medical ethics, privacy threats, restricted user numbers, restricted record numbers, strong notification property enforcement, localized information exposure, private banking, intelligence data management, security of data, data privacy, medical information systems, information flow control, DP management, clinical information systems, security policy model |
Displaying result #1 - #37 of 37 (100 per page; Change: )
|
|