Protection in operating systems
From MaRDI portal
Publication:4092978
Cited in
(26)- Statistical anomaly detection via httpd data analysis
- Specifying Intrusion Detection and Reaction Policies: An Application of Deontic Logic
- Graph transformations for the specification of access control policies
- On the decidability of the safety problem for access control policies
- A Logical Approach to Dynamic Role-Based Access Control
- scientific article; zbMATH DE number 1863561 (Why is no real title available?)
- Bounded memory protocols
- Controlling file access with types
- High level conflict management strategies in advanced access control models
- Logic in Access Control (Tutorial Notes)
- A new method for the detection of protection faults in capability-based protection systems
- On complexity of grammars related to the safety problem
- Safety in grammatical protection systems
- A novel logic-based automatic approach to constructing compliant security policies
- Dynamic role authorization in multiparty conversations
- Safety analysis of the dynamic-typed access matrix model
- Leftist Grammars Are Non-primitive Recursive
- A meta-model of access control in a fibred security language
- Nivat's processing systems: decision problems related to protection and synchronization
- Decidability of safety in graph-based models for access control
- Information flow control in software DB units based on formal verification
- Undecidability of safety for the schematic protection model with cyclic creates
- Component-Based Security Policy Design with Colored Petri Nets
- Policy analysis for administrative role-based access control
- Creation and reflexive rights in grammatical protection systems
- Theft and conspiracy in the Take-Grant protection model
This page was built for publication: Protection in operating systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4092978)