ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
An extended capability architecture to enforce dynamic access control policies
Proceedings 12th Annual Computer Security Applications Conference CSAC-96
◽
10.1109/csac.1996.569688
◽
2002
◽
Author(s):
I-Lung Kao
◽
R. Chow
Keyword(s):
Access Control
◽
Control Policies
◽
Access Control Policies
◽
Dynamic Access Control
Download Full-text
Related Documents
Cited By
References
Dynamic access-control policies on XML encrypted data
ACM Transactions on Information and System Security
◽
10.1145/1284680.1284684
◽
2008
◽
Vol 10
(4)
◽
pp. 1-37
◽
Cited By ~ 2
Author(s):
Luc Bouganim
◽
Francois Dang Ngoc
◽
Philippe Pucheral
Keyword(s):
Access Control
◽
Control Policies
◽
Encrypted Data
◽
Access Control Policies
◽
Dynamic Access Control
Download Full-text
Specifying and Reasoning About Dynamic Access-Control Policies
Automated Reasoning - Lecture Notes in Computer Science
◽
10.1007/11814771_51
◽
2006
◽
pp. 632-646
◽
Cited By ~ 51
Author(s):
Daniel J. Dougherty
◽
Kathi Fisler
◽
Shriram Krishnamurthi
Keyword(s):
Access Control
◽
Control Policies
◽
Access Control Policies
◽
Dynamic Access Control
Download Full-text
Model Checking Agent Knowledge in Dynamic Access Control Policies
Tools and Algorithms for the Construction and Analysis of Systems - Lecture Notes in Computer Science
◽
10.1007/978-3-642-36742-7_31
◽
2013
◽
pp. 448-462
◽
Cited By ~ 3
Author(s):
Masoud Koleini
◽
Eike Ritter
◽
Mark Ryan
Keyword(s):
Model Checking
◽
Access Control
◽
Control Policies
◽
Access Control Policies
◽
Agent Knowledge
◽
Dynamic Access Control
Download Full-text
Dynamic Access Control Policies: Specification and Verification
The Computer Journal
◽
10.1093/comjnl/bxs102
◽
2012
◽
Vol 56
(4)
◽
pp. 440-463
◽
Cited By ~ 8
Author(s):
H. Janicke
◽
A. Cau
◽
F. Siewe
◽
H. Zedan
Keyword(s):
Access Control
◽
Control Policies
◽
Access Control Policies
◽
Specification And Verification
◽
Dynamic Access Control
Download Full-text
Specifying and enforcing constraints in dynamic access control policies
2014 Twelfth Annual International Conference on Privacy, Security and Trust
◽
10.1109/pst.2014.6890951
◽
2014
◽
Cited By ~ 2
Author(s):
Nada Essaouini
◽
Frederic Cuppens
◽
Nora Cuppens-Boulahia
◽
Anas Abou El Kalam
Keyword(s):
Access Control
◽
Control Policies
◽
Access Control Policies
◽
Dynamic Access Control
Download Full-text
On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud
2016 IEEE Symposium on Security and Privacy (SP)
◽
10.1109/sp.2016.54
◽
2016
◽
Cited By ~ 21
Author(s):
William C. Garrison
◽
Adam Shull
◽
Steven Myers
◽
Adam J. Lee
Keyword(s):
Access Control
◽
Control Policies
◽
Access Control Policies
◽
Dynamic Access Control
Download Full-text
A Knowledge-Based Verification Method for Dynamic Access Control Policies
Formal Methods and Software Engineering - Lecture Notes in Computer Science
◽
10.1007/978-3-642-24559-6_18
◽
2011
◽
pp. 243-258
◽
Cited By ~ 7
Author(s):
Masoud Koleini
◽
Mark Ryan
Keyword(s):
Access Control
◽
Control Policies
◽
Verification Method
◽
Knowledge Based
◽
Access Control Policies
◽
Dynamic Access Control
Download Full-text
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems
Lecture Notes in Computer Science - Data and Applications Security and Privacy XXIV
◽
10.1007/978-3-642-13739-6_20
◽
2010
◽
pp. 295-302
◽
Cited By ~ 5
Author(s):
Hasan Qunoo
◽
Mark Ryan
Keyword(s):
Access Control
◽
Collaborative Systems
◽
Control Policies
◽
Web Based
◽
Access Control Policies
◽
Dynamic Access Control
Download Full-text
Conformance Checking of Dynamic Access Control Policies
Formal Methods and Software Engineering - Lecture Notes in Computer Science
◽
10.1007/978-3-642-24559-6_17
◽
2011
◽
pp. 227-242
◽
Cited By ~ 6
Author(s):
David Power
◽
Mark Slaymaker
◽
Andrew Simpson
Keyword(s):
Access Control
◽
Conformance Checking
◽
Control Policies
◽
Access Control Policies
◽
Dynamic Access Control
Download Full-text
On the need for user-defined fine-grained access control policies for social networking applications
10.1145/1461469.1461470
◽
2008
◽
Cited By ~ 15
Author(s):
Andrew Simpson
Keyword(s):
Access Control
◽
Social Networking
◽
Control Policies
◽
Fine Grained
◽
Access Control Policies
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close