|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 345 occurrences of 237 keywords
|
|
|
Results
Found 657 publication records. Showing 657 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
167 | Bin Liang, Heng Liu, Wenchang Shi, Yanjun Wu |
Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
102 | Sara Motiee, Kirstie Hawkey, Konstantin Beznosov |
Do windows users follow the principle of least privilege?: investigating user account control practices. |
SOUPS |
2010 |
DBLP DOI BibTeX RDF |
least privilege principle, least privilege user account, user account control, usable security |
89 | Hui Song, Sencun Zhu, Wensheng Zhang 0001, Guohong Cao |
Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks. |
ACM Trans. Sens. Networks |
2008 |
DBLP DOI BibTeX RDF |
sensor networks, key management, pairwise key, Least privilege, key revocation |
89 | Wensheng Zhang 0001, Hui Song, Sencun Zhu, Guohong Cao |
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. |
MobiHoc |
2005 |
DBLP DOI BibTeX RDF |
privilege, wireless sensor networks, mobile sinks |
71 | Makoto Hatakeyama, Shigeyoshi Shima |
Privilege federation between different user profiles for service federation. |
Digital Identity Management |
2008 |
DBLP DOI BibTeX RDF |
privilege management, access control, identity federation |
62 | Hyuk-Jang Park, Sung-Bae Cho |
An Effective HMM-Based Intrusion Detection System with Privilege Change Event Modeling. |
PRICAI |
2002 |
DBLP DOI BibTeX RDF |
|
60 | Akshay Krishnamurthy, Adrian Mettler, David A. Wagner 0001 |
Fine-grained privilege separation for web applications. |
WWW |
2010 |
DBLP DOI BibTeX RDF |
object-capabilities, privilege separation, web applications |
60 | Liang Chen, Jason Crampton |
Inter-domain role mapping and least privilege. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
IDRM, RBAC, least privilege |
55 | Gang Yin, Huaimin Wang, Dian-xi Shi, Haiya Gu |
Towards More Controllable and Practical Delegation. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Koen Buyens |
Analyzing Software Architectures for Least Privilege Violations (Het identificeren van schendingen tegen het principe van minst privilege in software architecturen) ; Analyzing Software Architectures for Least Privilege Violations. |
|
2012 |
RDF |
|
51 | Chenggong Lv, Jun Wang 0059, Lu Liu, Weijia You |
The Separation of Duty with Privilege Calculus. |
RSKT |
2008 |
DBLP DOI BibTeX RDF |
|
51 | M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle |
Extended privilege inheritance in RBAC. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
administrative privileges, access control, RBAC |
51 | Dhananjay Bapat, Kevin R. B. Butler, Patrick D. McDaniel |
Towards Automated Privilege Separation. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
51 | Baowen Zhang, William Zhu 0001, Zhi Xue |
Mining Privilege Escalation Paths for Network Vulnerability Analysis. |
FSKD (4) |
2007 |
DBLP DOI BibTeX RDF |
|
49 | David W. Chadwick, Alexander Otenko |
The PERMIS X.509 role based privilege management infrastructure. |
SACMAT |
2002 |
DBLP DOI BibTeX RDF |
Privilege management infrastructure, XML, authorization, RBAC, policies, X.509, attribute certificates |
44 | Wei She, Bhavani Thuraisingham, I-Ling Yen |
Delegation-Based Security Model for Web Services. |
HASE |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin |
Towards a Times-Based Usage Control Model. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
Times-based Usage Control, TUCON, Access Control, Authorization, Usage Control |
44 | Hang Li, Xiyang Liu, Ping Chen |
Octopus Architecture: A New Attempt to Achieve Reliable OS. |
WICSA |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Tao Zhang, Mingzeng Hu, Xiao-chun Yun, Yongzheng Zhang 0002 |
Computer Vulnerability Evaluation Using Fault Tree Analysis. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Amit Purohit, Vishnu Navda, Tzi-cker Chiueh |
Tracing the Root of "Rootable" Processes. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Timothy E. Levin, Cynthia E. Irvine, Clark Weissman, Thuy D. Nguyen |
Analysis of three multilevel security architectures. |
CSAW |
2007 |
DBLP DOI BibTeX RDF |
partitioning kernel, principle of least privilege, architecture, multilevel security, security kernel, separation kernel |
42 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
Achieving DRBAC Authorization in Multi-trust Domains with MAS Architecture and PMI. |
PRIMA |
2007 |
DBLP DOI BibTeX RDF |
Distributed Role Based Access Control, Privilege Management Infrastructure, Multi-Agent Systems, Authentication, Public Key Infrastructure |
42 | Arnon Rosenthal, Edward Sciore |
Abstracting and Refining Authorization in SQL. |
Secure Data Management |
2004 |
DBLP DOI BibTeX RDF |
SQL Authorization, Privilege Inference, Views |
42 | Sung-Bae Cho, Sang-Jun Han |
Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems. |
RAID |
2003 |
DBLP DOI BibTeX RDF |
privilege flow, combining multiple models, hidden Markov model, anomaly detection |
42 | Byoungcheon Lee, Kwangjo Kim |
Self-certified Signatures. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
self-certified signature, self-certified key, multi-certification signature, privilege management infrastructure, digital signature, public key infrastructure |
40 | Koen Buyens, Bart De Win, Wouter Joosen |
Identifying and Resolving Least Privilege Violations in Software Architectures. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Yan Wenfei, Feng Xiaoyu, Zhou Jin |
Use Castle IoC to Implement Privilege Service. |
CSSE (2) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Paul Z. Kolano |
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
multiport protocols, security, grids, Firewalls, high performance networking, network access control |
40 | Michael Yanguo Liu, Issa Traoré |
Measurement Framework for Software Privilege Protection Based on User Interaction Analysis. |
IEEE METRICS |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Gang Yin, Huaimin Wang, Tao Liu, Ming-Feng Chen, Dian-xi Shi |
Trust Management with Safe Privilege Propagation. |
APPT |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Youna Jung, Eenjun Hwang |
A Flexible Privilege Management Scheme for Role Graph Model. |
PARA |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Gail-Joon Ahn, Dongwan Shin, Longhua Zhang |
Role-Based Privilege Management Using Attribute Certificates and Delegation. |
TrustBus |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Richard Au, Ming Yao, Mark Looi |
Privilege Negotiation Agents for Distributed Authorisation on World Wide Web. |
IAT |
2003 |
DBLP DOI BibTeX RDF |
|
38 | Philip W. L. Fong |
Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems. |
IEEE Symposium on Security and Privacy |
2011 |
DBLP DOI BibTeX RDF |
Principle of Privilege Attenuation, completeness of static analysis, access control, soundness, Sybil attacks, social network systems |
38 | Ebrima N. Ceesay, Coimbatore Chandersekaran, William R. Simpson |
An authentication model for delegation, attribution and least privilege. |
PETRA |
2010 |
DBLP DOI BibTeX RDF |
WS-*, security assertion markup language (SAML), authentication, authorization, delegation, public key infrastructure, attribution, credentialing, least privilege |
38 | Kurt Maly, Ajay Gupta 0003, Bjorn Kvande, Irwin B. Levinstein, Ravi Mukkamala, S. Nanjangud, Margrethe H. Olson, Roy Whitney, Rita Chambers |
A privilege management and enforcement system for distributed resource sharing. |
WETICE |
1996 |
DBLP DOI BibTeX RDF |
privilege management, enforcement system, distributed resource sharing, information based world, controlled access, delegated resource management, end user access, World Wide Web based interfaces, DCE based authentication, Distributed Informatics Computing and Collaborative Environments project, Internet, Internet, access control, operating system, authorization, X Windows, distributed environment, unauthorized access, data manipulation |
35 | Wei Bai, Angxuan Cheng, Cailing Wang, Zhisong Pan |
A fast user actual privilege reasoning framework based on privilege dependency graph reduction. |
IET Inf. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
35 | Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura 0005, Masaki Hashimoto |
Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes. |
Int. J. Inf. Sec. |
2021 |
DBLP DOI BibTeX RDF |
|
35 | Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura 0005, Masaki Hashimoto |
Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes. |
DSC |
2018 |
DBLP DOI BibTeX RDF |
|
35 | Ching-Nung Yang, Jung-Kuo Liao, Daoshun Wang |
New privilege-based visual cryptography with arbitrary privilege levels. |
J. Vis. Commun. Image Represent. |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Maxwell N. Krohn, Petros Efstathopoulos, Cliff Frey, M. Frans Kaashoek, Eddie Kohler, David Mazières, Robert Tappan Morris, Michelle Osborne, Steve Vandebogart, David Ziegler |
Make Least Privilege a Right (Not a Privilege). |
HotOS |
2005 |
DBLP BibTeX RDF |
|
33 | Donggang Liu |
Efficient and Distributed Access Control for Sensor Networks. |
DCOSS |
2007 |
DBLP DOI BibTeX RDF |
|
33 | David A. Wagner 0001 |
Object capabilities for security. |
PLAS |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Babak Sadighi Firozabadi, Marek J. Sergot, Olav L. Bandmann |
Using Authority Certificates to Create Management Structures. |
Security Protocols Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Wayne A. Jansen |
Determining Privileges of Mobile Agents. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
31 | Sara Motiee, Kirstie Hawkey, Konstantin Beznosov |
Investigating user account control practices. |
CHI Extended Abstracts |
2010 |
DBLP DOI BibTeX RDF |
user account control, usable security, least privilege |
31 | Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvine |
High Robustness Requirements in a Common Criteria Protection Profile. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
high robustness, common criteria, dynamic configuration, least privilege, separation kernel |
31 | Isaac Agudo, Javier López 0001, José A. Montenegro |
A Representation Model of Trust Relationships with Delegation Extensions. |
iTrust |
2005 |
DBLP DOI BibTeX RDF |
Privilege Management Infrastructure (PMI), Authorization, Delegation, Graph representation, Attribute Certificate |
31 | Markus Lorch, Dennis G. Kafura |
The PRIMA Grid Authorization System. |
J. Grid Comput. |
2004 |
DBLP DOI BibTeX RDF |
privilege management, access control, authorization, Grid security, enforcement |
31 | Winfried E. Kühnhauser |
Root Kits: an operating systems viewpoint. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
error exploitation, error proliferation, kernel abstractions, mandatory and discretionary access control, privilege proliferation, secure program execution, reference monitor, trusted computing base, security domains, secure booting |
31 | Javier López 0001, Antonio Mana, Ernesto Pimentel 0001, José M. Troya, Mariemma Inmaculada Yagüe del Valle |
Access Control Infrastructure for Digital Objects. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
secure content distribution, XML metadata, Privilege Management Infrastructure, Distributed systems security |
31 | Rodolphe Ortalo, Yves Deswarte, Mohamed Kaâniche |
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security. |
IEEE Trans. Software Eng. |
1999 |
DBLP DOI BibTeX RDF |
operational vulnerabilities, privilege graph, quantitative evaluation, Security assessment |
29 | Christoph Sturm, Ela Hunt, Marc H. Scholl |
Distributed Privilege Enforcement in PACS. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Runlian Zhang, Xiaonian Wu, Xiaoshe Dong, Shangyuan Guan |
An Authorization Mechanism Based on Privilege Negotiation Policy in Grid. |
HPCC |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Mehran Ahsant, Jim Basney, S. Lennart Johnsson |
Dynamic, context-aware, least-privilege grid delegation. |
GRID |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Kemal Bicakci, Nazife Baykal |
A New Design of Privilege Management Infrastructure with Binding Signature Semantics. |
EuroPKI |
2004 |
DBLP DOI BibTeX RDF |
binding signature semantics, digital signature, revocation, attribute certificate, PMI |
29 | Erik Rissanen, Babak Sadighi Firozabadi, Marek J. Sergot |
Discretionary Overriding of Access Control in the Privilege Calculus. |
Formal Aspects in Security and Trust |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Dong-Gue Park, You-Ri Lee |
The RBAC Based Privilege Management for Authorization of Wireless Networks. |
WAIM |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Dong-Gue Park, You-Ri Lee |
The ET-RBAC Based Privilege Management Infrastructure for Wireless Networks. |
EC-Web |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Markus Lorch, David Bruce Adams, Dennis G. Kafura, M. S. R. Koneni, A. Rathi, Sumit Shah |
The PRIMA System for Privilege Management, Authorization and Enforcement in Grid Environments. |
GRID |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Ed Dawson, Javier López 0001, José A. Montenegro, Eiji Okamoto |
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Robert K. Cunningham, Craig S. Stevenson |
Accurately Detecting Source Code of Attacks That Increase Privilege. |
Recent Advances in Intrusion Detection |
2001 |
DBLP DOI BibTeX RDF |
Machine Learning, Intrusion Detection, Malicious Code |
29 | Marc Dacier, Yves Deswarte |
Privilege Graph: an Extension to the Typed Access Matrix Model. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
|
22 | Neal H. Walfield, Paul T. Stanton, John Linwood Griffin, Randal C. Burns |
Practical protection for personal storage in the cloud. |
EUROSEC |
2010 |
DBLP DOI BibTeX RDF |
web services, access control, data management, cloud |
22 | Monirul Islam Sharif, Wenke Lee, Weidong Cui, Andrea Lanzi |
Secure in-VM monitoring using hardware virtualization. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
kernel integrity, virtual machines, malware, secure monitoring |
22 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
A-COLD: Access Control of Web OLAP over Multi-data Warehouse. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Lars E. Olson 0001, Carl A. Gunter, William R. Cook, Marianne Winslett |
Implementing Reflective Access Control in SQL. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Yanjiang Yang, Yingjiu Li, Jian Weng 0001, Jianying Zhou 0001, Feng Bao 0001 |
Self-enforcing Private Inference Control. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
self-enforcing, database, Inference control |
22 | Lars E. Olson 0001, Carl A. Gunter, P. Madhusudan |
A formal framework for reflective database access control policies. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
formal safety verification, reflective database access control, transaction datalog, fine-grained access control |
22 | Nan Dun, Kenjiro Taura, Akinori Yonezawa |
GMount: Build your grid file system on the fly. |
GRID |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Jodie P. Boyer, Ragib Hasan, Lars E. Olson 0001, Nikita Borisov, Carl A. Gunter, David Raila |
Improving multi-tier security using redundant authentication. |
CSAW |
2007 |
DBLP DOI BibTeX RDF |
Building Automation Systems, authentication |
22 | M. A. C. Dekker, Sandro Etalle |
Refinement for Administrative Policies. |
Secure Data Management |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Feng Chen 0004, Shaoyun Li, Hongji Yang |
Enforcing Role-Based Access Controls in Software Systems with an Agent Based Service Oriented Approach. |
ICNSC |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Paolina Centonze, Robert J. Flynn, Marco Pistoia |
Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Mark Aiken, Manuel Fähndrich, Chris Hawblitzel, Galen C. Hunt, James R. Larus |
Deconstructing process isolation. |
Memory System Performance and Correctness |
2006 |
DBLP DOI BibTeX RDF |
hardware isolated process (HIP), hardware protection domain, software isolated process (SIP), singularity |
22 | Daisuke Hara, Yasuichi Nakayama |
Secure and High-Performance Web Server System for Shared Hosting Service. |
ICPADS (1) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Shaomin Zhang, Xiaoyan Liang, Baoyi Wang |
Research and Implementation of the AC Cache Mechanism and Its Update Algorithm in Grid. |
SKG |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Xuhui Ao, Naftaly H. Minsky |
Regulated Delegation in Distributed Systems. |
POLICY |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Yen-Cheng Chen, Lo-Yao Yeh |
An Efficient Authentication and Access Control Scheme Using Smart Cards. |
ICPADS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Changqin Huang, Zhiting Zhu, Xianqing Wang, Deren Chen |
Grid Authorization Management Oriented to Large-Scale Collaborative Computing. |
CSCWD (Selected papers) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Suranjan Pramanik, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya |
Security Policies to Mitigate Insider Threat in the Document Control Domain. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Hirotake Abe, Kazuhiko Kato |
Security Policy Descriptions Through the Use of Control Structure of a Target Program. |
ISSS |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Mina Jeong, Jung-Ja Kim, Yonggwan Won |
A Flexible Database Security System Using Multiple Access Control Policies. |
DEXA |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Toshiyuki Maeda, Akinori Yonezawa |
Kernel Mode Linux: Toward an Operating System Protected by a Type Theory. |
ASIAN |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Frédéric Cuppens, Alexandre Miège |
Modelling Contexts in the Or-BAC Model. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Robert P. Goldman |
A Stochastic Model for Intrusions. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Calvin Ko, Timothy Redmond |
Noninterference and Intrusion Detection. |
S&P |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Jean Bacon, Ken Moody, Walt Yao |
Access Control and Trust in the Use of Widely Distributed Services. |
Middleware |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Joffroy Beauquier, Ajoy Kumar Datta, Maria Gradinariu, Frédéric Magniette |
Self-Stabilizing Local Mutual Exclusion and Daemon Refinement. |
DISC |
2000 |
DBLP DOI BibTeX RDF |
Local mutual exclusion, unfair daemon, transformer, self-stabilization |
22 | Matunda Nyanchama, Sylvia L. Osborn |
The Role Graph Model and Conflict of Interest. |
ACM Trans. Inf. Syst. Secur. |
1999 |
DBLP DOI BibTeX RDF |
role graphs, role-based security, conflict of interest |
22 | Nittida Nuansri, Samar Singh, Tharam S. Dillon |
A Process State-Transition Analysis and Its Application to Intrusion Detection. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
22 | Marjan Jurecic, Herbert Bunz |
Exchange of Patient Records - Prototype Implementation of a Security Attributes Service in X.500. |
CCS |
1994 |
DBLP DOI BibTeX RDF |
|
22 | G. Octo Barnett |
History of the development of medical information systems at the Laboratory of Computer Science at Massachusetts General Hospital. |
History of Medical Informatics |
1987 |
DBLP DOI BibTeX RDF |
|
22 | Ronald Fagin |
On an Authorization Mechanism. |
ACM Trans. Database Syst. |
1978 |
DBLP DOI BibTeX RDF |
security, privacy, access control, database, authorization, protection, revocation, proof of correctness |
20 | Yang Zhang 0015, Junliang Chen |
Universal Identity Management Model Based on Anonymous Credentials. |
IEEE SCC |
2010 |
DBLP DOI BibTeX RDF |
Privacy Concerns of Service-Oriented Solutions, Identity Metasystem, Privilege Delegation, Identity Management |
20 | Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith |
TwoKind authentication: protecting private information in untrustworthy environments. |
WPES |
2008 |
DBLP DOI BibTeX RDF |
principle of least privilege, authenticators, passwords |
20 | Lei Xia, Wei Huang, Hao Huang |
A Compositional Multiple Policies Operating System Security Model. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
multiple policy views, integrity assurance, confidentiality assurance, security model, separation of duties, least privilege |
20 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone |
Requirements engineering for trust management: model, methodology, and reasoning. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Agent-oriented software, Trust models for business and organizations, Verification and validation of software, Privilege management, Requirements Engineering, Security Engineering |
20 | Jun Kiniwa |
How to Improve Safety under Convergence Using Stable Storage. |
IEEE Trans. Parallel Distributed Syst. |
2006 |
DBLP DOI BibTeX RDF |
false privilege, vulnerability under convergence, self-stabilization, Mutual exclusion, stable storage |
20 | Prasad Naldurg, Stefan Schwoon, Sriram K. Rajamani, John Lambert |
NETRA: : seeing through access control. |
FMSE |
2006 |
DBLP DOI BibTeX RDF |
privilege escalation, vulnerability reports, static analysis |
Displaying result #1 - #100 of 657 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ >>] |
|