Výsledky vyhledávání - Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security
-
1
Autoři:
Přispěvatelé:
Témata: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory, Languages Keywords Access Control, Separation of Duty, Policy Design
Popis souboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.5374; http://www.cs.purdue.edu/homes/ninghui/papers/algebra_ccs06.pdf
-
2
Autoři: a další
Přispěvatelé: a další
Témata: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords Access Control, Fault-tolerant, Policy Design
Popis souboru: application/pdf
-
3
Autoři: a další
Přispěvatelé: a další
Témata: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords role-based access control
Popis souboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.320.4355; http://www.cs.purdue.edu/homes/ninghui/papers/sod_ccs04.pdf
-
4
Autoři: a další
Přispěvatelé: a další
Témata: Categories and Subject Descriptors D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protection, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms Security, Theory Keywords Access Control, Fault-tolerant, Policy Design
Popis souboru: application/pdf
-
5
Autoři: a další
Přispěvatelé: a další
Témata: and Protection, D.4.6 [Operating Systems, Security and Protection—Access controls, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms, Security, Theory, Languages Additional Key Words and Phrases, access control, trust management, distributed system security, logic
Popis souboru: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.119.4238; http://www.cs.utsa.edu/~winsboro/index_files/Papers/Safety_JACM_AcceptedVersion.pdf
-
6
Autoři:
Přispěvatelé:
Témata: Categories and Subject Descriptors, D.4.6 [Operating Systems, Security and Protection—Access controls, K.6.5 [Management of Computing and Information Systems, Security and Protec- tion, F.2.2 [Analysis of Algorithms and Problem Complexity, Nonnumerical Algorithms and Problems—Complexity of proof procedures General Terms, Security, Theory Additional Key Words and Phrases, Access control, fault-tolerant, policy design ACM Reference Format
Popis souboru: application/pdf
-
7
Autoři: a další
Zdroj: ACM Transactions on Algorithms; 2006, Vol. 2 Issue 3, p435-472, 38p
-
8
Autoři:
Zdroj: Journal of the ACM; Jul2008, Vol. 55 Issue 3, p1-46, 46p, 2 Diagrams, 3 Charts
-
9
Autoři: a další
Zdroj: Journal of the ACM; Dec2012, Vol. 59 Issue 6, p28-22, 22p
-
10
Autoři:
Zdroj: Journal of the ACM; May2014, Vol. 61 Issue 3, p15:1-15:40, 40p
-
11
Zdroj: Journal of the ACM; Jul2011, Vol. 58 Issue 4, p18:1-18:24, 24p
-
12
Autoři: a další
Zdroj: Journal of the ACM; May2014, Vol. 61 Issue 3, p19:1-19:64, 64p
-
13
Autoři:
Zdroj: ACM Transactions on Information & System Security (TISSEC); Jun2013, Vol. 16 Issue 1, p1-31, 31p, 6 Diagrams
-
14
Autoři:
Zdroj: ACM Transactions on Information & System Security (TISSEC); 2009, Vol. 12 Issue 2, p20:1-20:34, 34p, 4 Diagrams, 4 Charts
-
15
Zdroj: ACM Transactions on Computational Logic; Jan2011, Vol. 12 Issue 2, p9-9:28, 28p
-
16
Autoři:
Zdroj: ACM Transactions on Information & System Security (TISSEC); 2011, Vol. 14 Issue 3, p1-24, 24p
-
17
Autoři: a další
Zdroj: ACM Transactions on Database Systems; Aug2009, Vol. 34 Issue 3, p15:1-15:42, 42p, 3 Diagrams, 2 Charts, 6 Graphs
-
18
Zdroj: ACM Transactions on Information & System Security (TISSEC); 2010, Vol. 13 Issue 4, p40:1-40:35, 35p
-
19
Autoři: a další
Zdroj: ACM Computing Surveys; Jun2007, Vol. 39 Issue 2, p1-27, 27p, 2 Illustrations, 3 Charts
-
20
Autoři:
Zdroj: ACM Transactions on Computational Logic; Jul2007, Vol. 8 Issue 3, p1-53, 53p, 5 Charts, 1 Graph
Nájsť tento článok vo Web of Science
Full Text Finder