Author:
Sultana Nik,Becker Moritz Y.,Kohlweiss Markulf
Publisher
Springer Berlin Heidelberg
Reference35 articles.
1. Lampson, B.W.: Protection. Operating Systems Review 8(1), 18–24 (1974)
2. Miller, M., Yee, K.P., Shapiro, J., Inc, C.: Capability Myths Demolished. Technical report, Johns Hopkins University Systems Research Laboratory (2003)
3. Lee, A.J., Winslett, M., Basney, J., Welch, V.: The Traust Authorization Service. ACM Trans. Inf. Syst. Secur. 11(1) (2008)
4. Lecture Notes in Computer Science;M. Blaze,1999
5. di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Psaila, G., Samarati, P.: Integrating trust management and access control in data-intensive Web applications. TWEB 6(2), 6 (2012)