Author:
Jagadeesan Radha,Jeffrey Alan,Pitcher Corin,Riely James
Publisher
Springer Berlin Heidelberg
Reference27 articles.
1. Abadi, M., Morrisett, G., Sabelfeld, A.: Language-based security. J. Funct. Program. 15(2), 129 (2005)
2. Amadio, R.M., Cardelli, L.: Subtyping recursive types. ACM TOPLAS 15(4), 575–631 (1993)
3. Barker, S., Stuckey, P.J.: Flexible access control policy specification with constraint logic programming. ACM Trans. Inf. Syst. Secur. 6(4), 501–546 (2003), doi:10.1145/950191.950194
4. Bertino, E., Bonatti, P.A., Ferrari, E.: TRBAC: A temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4(3), 191–233 (2001), doi:10.1145/501978.501979
5. Boebert, W.E., Kain, R.Y.: A practical alternative to hierarchical integrity policies. In: Proceedings of the Eighth National Computer Security Conference (1985)