Search Results - Nonnumerical Algorithms AND Problems—Complexity of proof procedures General Terms Security*
-
1
Authors: et al.
Contributors: et al.
Subject Terms: and Protection, D.4.6 [Operating Systems, Security and Protection—Access controls, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms, Security, Theory, Languages Additional Key Words and Phrases, access control, trust management, distributed system security, logic
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.4238; http://www.cs.utsa.edu/~winsboro/index_files/Papers/Safety_JACM_AcceptedVersion.pdf
-
2
Authors:
Contributors:
Subject Terms: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory, Languages Keywords Access Control, Separation of Duty, Policy Design
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.5374; http://www.cs.purdue.edu/homes/ninghui/papers/algebra_ccs06.pdf
-
3
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords Access Control, Fault-tolerant, Policy Design
File Description: application/pdf
-
4
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords role-based access control
File Description: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.320.4355; http://www.cs.purdue.edu/homes/ninghui/papers/sod_ccs04.pdf
-
5
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords Access Control, Fault-tolerant, Policy Design
File Description: application/pdf
-
6
Authors:
Contributors:
Subject Terms: Categories and Subject Descriptors, D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protec- tion, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms, Security, Theory Additional Key Words and Phrases, Access control, fault-tolerant, policy design ACM Reference Format
File Description: application/pdf
-
7
Authors: et al.
Source: ACM Transactions on Algorithms; 2006, Vol. 2 Issue 3, p435-472, 38p
Subject Terms: ALGORITHMS, MATHEMATICAL analysis, APPROXIMATION theory, FUNCTIONAL analysis, MATHEMATICS, ALGEBRA
-
8
Authors:
Source: Journal of the ACM; Jul2008, Vol. 55 Issue 3, p1-46, 46p, 2 Diagrams, 3 Charts
-
9
Authors: et al.
Source: Journal of the ACM; Dec2012, Vol. 59 Issue 6, p28-22, 22p
-
10
Authors:
Source: Journal of the ACM; May2014, Vol. 61 Issue 3, p15:1-15:40, 40p
Subject Terms: VIDEO games, GRAPH algorithms, MARKOV processes, GRAPH theory, MATHEMATICAL decomposition
-
11
Source: Journal of the ACM; Jul2011, Vol. 58 Issue 4, p18:1-18:24, 24p
-
12
Authors: et al.
Source: Journal of the ACM; May2014, Vol. 61 Issue 3, p19:1-19:64, 64p
-
13
Authors:
Source: ACM Transactions on Information & System Security (TISSEC); Jun2013, Vol. 16 Issue 1, p1-31, 31p, 6 Diagrams
-
14
Authors:
Source: ACM Transactions on Information & System Security (TISSEC); 2009, Vol. 12 Issue 2, p20:1-20:34, 34p, 4 Diagrams, 4 Charts
-
15
Source: ACM Transactions on Computational Logic; Jan2011, Vol. 12 Issue 2, p9-9:28, 28p
-
16
Authors:
Source: ACM Transactions on Information & System Security (TISSEC); 2011, Vol. 14 Issue 3, p1-24, 24p
Subject Terms: COMPUTER security, ALGORITHMS, STATISTICS, WEBSITES, AGGREGATION (Statistics), INTERNET users
-
17
Authors: et al.
Source: ACM Transactions on Database Systems; Aug2009, Vol. 34 Issue 3, p15:1-15:42, 42p, 3 Diagrams, 2 Charts, 6 Graphs
-
18
Source: ACM Transactions on Information & System Security (TISSEC); 2010, Vol. 13 Issue 4, p40:1-40:35, 35p
-
19
Authors: et al.
Source: ACM Computing Surveys; Jun2007, Vol. 39 Issue 2, p1-27, 27p, 2 Illustrations, 3 Charts
Subject Terms: CRYPTOGRAPHY, DATA encryption, WRITING, COMPUTER security, DIGITAL signatures, DIGITAL watermarking
-
20
Authors:
Source: ACM Transactions on Computational Logic; Jul2007, Vol. 8 Issue 3, p1-53, 53p, 5 Charts, 1 Graph
Nájsť tento článok vo Web of Science
Full Text Finder