Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/646647.699341guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Flexible Method for Information System Security Policy Specification

Published: 16 September 1998 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2006)Systematic control and management of data integrityProceedings of the eleventh ACM symposium on Access control models and technologies10.1145/1133058.1133074(101-110)Online publication date: 7-Jun-2006
  • (2006)Distributed processing of context-aware authorization in ubiquitous computing environmentsProceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II10.1007/11751588_14(125-134)Online publication date: 8-May-2006
  • (2005)Combining logics for modelling security policiesProceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 3810.5555/1082161.1082197(323-332)Online publication date: 1-Jan-2005
  • Show More Cited By
  1. A Flexible Method for Information System Security Policy Specification

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      ESORICS '98: Proceedings of the 5th European Symposium on Research in Computer Security
      September 1998
      365 pages

      Publisher

      Springer-Verlag

      Berlin, Heidelberg

      Publication History

      Published: 16 September 1998

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 13 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2006)Systematic control and management of data integrityProceedings of the eleventh ACM symposium on Access control models and technologies10.1145/1133058.1133074(101-110)Online publication date: 7-Jun-2006
      • (2006)Distributed processing of context-aware authorization in ubiquitous computing environmentsProceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II10.1007/11751588_14(125-134)Online publication date: 8-May-2006
      • (2005)Combining logics for modelling security policiesProceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 3810.5555/1082161.1082197(323-332)Online publication date: 1-Jan-2005
      • (2005)Applying Semantic Knowledge to Real-Time Update of Access Control PoliciesIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2005.8817:6(844-858)Online publication date: 1-Jun-2005
      • (2005)An approach to understanding policy based on autonomy and voluntary cooperationProceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management10.1007/11568285_9(97-108)Online publication date: 24-Oct-2005
      • (2004)Using uml to visualize role-based access control constraintsProceedings of the ninth ACM symposium on Access control models and technologies10.1145/990036.990054(115-124)Online publication date: 2-Jun-2004
      • (2002)Interactive simulation of security policiesProceedings of the 2002 ACM symposium on Applied computing10.1145/508791.508842(247-252)Online publication date: 11-Mar-2002

      View Options

      View options

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media