The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Bell-lapadula (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1988-2006 (16) 2007-2018 (15) 2020-2023 (6)
Publication types (Num. hits)
article(7) incollection(1) inproceedings(29)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 49 occurrences of 44 keywords

Results
Found 37 publication records. Showing 37 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
125Jason Crampton, Wing Leung, Konstantin Beznosov The secondary and approximate authorization model and its application to Bell-LaPadula policies. Search on Bibsonomy SACMAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Bell-LaPadula model, authorization recycling, access control, SAAM
96Gansen Zhao, David W. Chadwick On the Modeling of Bell-LaPadula Security Policies Using RBAC. Search on Bibsonomy WETICE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Bell-LaPadula Security Policies, Modelling, RBAC
78Stéphane Onno A Federated Physical and Logical Access Control Enforcement Model. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF access control federation, logical access control, physical access control, Bell-lapadula
78Mark Moriconi, Xiaolei Qian, Robert A. Riemenschneider, Li Gong Secure Software Architectures. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF secure software architectures, open architectural standards, competitive success, secure system design, X/Open distributed transaction processing reference architecture, secure access control, Bell-LaPadula model, formal methods, authorisation, security properties, computer industry
57Carl E. Landwehr, Constance L. Heitmeyer, John D. McLean A Security Model for Military Message Systems: Retrospective. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Storage channels, Security, Verification, confinement, message systems
57Vincent Nicomette, Yves Deswarte An Authorization Scheme For Distributed Object Systems. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF multilevel security policy, authorization, delegation, object model, protection, access rights
49Roderick Chapman, Adrian Hilton 0002 Enforcing security and safety models with an information flow analysis tool. Search on Bibsonomy SIGAda The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Bell-LaPadula, Dolev-Yao, SPARK Ada, security, Ada, safety, information flow
47H. C. Chong, K. L. Eddie Law Multi-Blockchain Model for Data Sharing with Bell-LaPadula Access Control. Search on Bibsonomy Blockchain The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
47Runnan Zhang, Gang Liu 0006, Hongzhaoning Kang, Quan Wang 0006, Yumin Tian, Can Wang Improved Bell-LaPadula Model With Break the Glass Mechanism. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Randhir Kumar, Rakesh Tripathi Scalable and secure access control policy for healthcare system using blockchain and enhanced Bell-LaPadula model. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Li Yang 0012, Jin Wang 0001, Zhuo Tang, Neal N. Xiong Using Conditional Random Fields to Optimize a Self-Adaptive Bell-LaPadula Model in Control Systems. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Syst. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Maximiliano Cristiá, Gianfranco Rossi Automated Proof of Bell-LaPadula Security Properties. Search on Bibsonomy J. Autom. Reason. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
47Maximiliano Cristiá, Gianfranco Rossi Automated Proof of Bell-LaPadula Security Properties. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
47Zhuo Tang, Xiaofei Ding, Ying Zhong, Li Yang 0012, Keqin Li 0001 A Self-Adaptive Bell-LaPadula Model Based on Model Training With Historical Access Logs. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
47Ebru Celikel Cankaya Bell-LaPadula Confidentiality Model. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
47Lionel Habib, Mathieu Jaume, Charles Morisset A Formal Comparison of the Bell & LaPadula and RBAC Models. Search on Bibsonomy IAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
47Jan Verschuren, René Govaerts, Joos Vandewalle Realization of the Bell-LaPadula Security Policy in an OSI-Distributed System using Asymmetric and Symmetric Cryptographic Algorithms. Search on Bibsonomy CSFW The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
47Ian Sutherland Relating Bell-LaPadula-Style Security Models to Information Models. Search on Bibsonomy CSFW The full citation details ... 1988 DBLP  BibTeX  RDF
28Shahriyar Mohammadi, Hediy Jahanshahi A secure E-tendering system. Search on Bibsonomy EIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Khair Eddin Sabri, Ridha Khédri, Jason Jaskolka Verification of Information Flow in Agent-Based Systems. Search on Bibsonomy MCETECH The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Global calculus, Information Algebra, Agent Knowledge, Information Flow, Hoare Logic
28Scott E. Coull, Matthew Green 0001, Susan Hohenberger Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Jafar Haadi Jafarian, Morteza Amini, Rasool Jalili A Context-Aware Mandatory Access Control Model for Multilevel Security Environments. Search on Bibsonomy SAFECOMP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Context-Awareness, Integrity, Confidentiality, Mandatory Access Control
28Yow Tzu Lim, Pau-Chen Cheng, Pankaj Rohatgi, John Andrew Clark MLS security policy evolution with genetic programming. Search on Bibsonomy GECCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF policy inference, genetic programming, security policy, MLS
28Shuangbao Wang 0001, Qing Chen, Michael Behrmann Agent-based ubiquitous m-learning portal for K-12 teachers. Search on Bibsonomy CSTST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF vodcast, security, adaptive, intelligent agents, portal, m-Learning
28Indrakshi Ray, Manachai Toahchoodee A Spatio-temporal Access Control Model Supporting Delegation for Pervasive Computing Applications. Search on Bibsonomy TrustBus The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Matthias Schwan An extended model of security policy for multi-applicative smart cards. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF biometrics, smart cards, security policy, electronic signatures
28Trent Jaeger, Reiner Sailer, Yogesh Sreenivasan Managing the risk of covert information flows in virtual machine systems. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF chinese wall policy, information flow secrecy, covert channels
28Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A. Karger, Grant M. Wagner, Angela Schuett Reninger Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Marc Lelarge, Zhen Liu 0001, Anton Riabov Automatic Composition of Secure Workflows. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Peter Y. A. Ryan Shedding Light on Haunted Corners of Information Security. Search on Bibsonomy 25 Years Communicating Sequential Processes The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Yixin Jiang, Chuang Lin 0002, Hao Yin, Zhangxi Tan Security analysis of mandatory access control model. Search on Bibsonomy SMC (6) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Edgar R. Weippl, Alexander Schatten, Shuaib Karim, A Min Tjoa SemanticLIFE Collaboration: Security Requirements and Solutions - Security Aspects of Semantic Knowledge Management. Search on Bibsonomy PAKM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Hanne Riis Nielson, Flemming Nielson, Mikael Buchholtz Security for Mobility. Search on Bibsonomy FOSAD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28Trent Jaeger, Jonathon Tidswell Practical safety in flexible access control models. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF authorization mechanisms, role-based access control, Access control models
28Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll Verification of a Formal Security Model for Multiapplicative Smart Cards. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
28Vincent Nicomette, Yves Deswarte A Multilevel Security Model for Distributed Object Systems. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
28Ross J. Anderson A Security Policy Model for Clinical Information Systems. Search on Bibsonomy S&P The full citation details ... 1996 DBLP  DOI  BibTeX  RDF personal health information protection, medical ethics, privacy threats, restricted user numbers, restricted record numbers, strong notification property enforcement, localized information exposure, private banking, intelligence data management, security of data, data privacy, medical information systems, information flow control, DP management, clinical information systems, security policy model
Displaying result #1 - #37 of 37 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license