Information Technology Reference
In-Depth Information
6. Ferraiolo, D.F., Sandhu, R.S., Gavrila, S.I., Kuhn, D.R., Chandramouli, R.: Pro-
posed NIST Standard for Role-Based Access Control. ACM Transaction on Infor-
mation and System Security, 4(3) (2001) 224-274
7. Gordon, M.J.C., Melham, T.F.: Introduction to HOL: A Theorem Proving Envi-
ronment for Higher Order Logic. Cambridge University Press, New York (1993)
8. Glasgow, J., MacEwen, G., Panangaden P.: A Logic for Reasoning About Security.
ACM Transactions on Computer Systems, 10(3) (1992) 226-264
9. Howell, J., Kotz, D.: A Formal Semantics for SPKI. Technical Report TR2000-363,
Department of Computer Science, Dartmouth College, Hanover, NH 03755-3510
(2000)
10. International Computer Limited. Higher Order Logic (HOL) Theorem Prover Ver-
sion 4 (Kananaskis-2) http://hol.sourceforge.net (2004)
11. Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in Distributed
Systems: Theory and Practice. ACM Transactions on Computer Systems, 10(4)
(1992) 265-310
12. Older, S., Chin, S.-K.: Building a Rigorous Foundation for Assurance into In-
formation Assurance Education. Proceedings of the 6th National Colloquium for
Information Systems Security Education (2002)
13. Older, S., Chin, S.-K.: Using Outcomes-based Assessment as an Assurance Tool
for Assurance Education. Journal of Information Warfare, 2(3) (2003) 86-100
14. Sandhu, R., Bhamidipati, V., Munawer, Q.: The ARBAC97 Model for Role-Based
Administration of Roles. ACM Transactions on Information and System Security,
2(1) (1999) 105-135
Search WWH ::




Custom Search