Model-Checking Access Control Policies
- 1 January 2004
- conference paper
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableThis publication has 9 references indexed in Scilit:
- Constrained delegationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Model-Checking Access Control PoliciesLecture Notes in Computer Science, 2004
- Access control: principles and solutionsSoftware: Practice and Experience, 2003
- The typed access matrix modelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Access Control and Trust in the Use of Widely Distributed ServicesLecture Notes in Computer Science, 2001
- Role-based access control modelsComputer, 1996
- A calculus for access control in distributed systemsACM Transactions on Programming Languages and Systems, 1993
- Authentication in distributed systemsACM Transactions on Computer Systems, 1992
- On protection in operating systemsPublished by Association for Computing Machinery (ACM) ,1975