Specifying a security policy: a case study
- 23 December 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- A logical analysis of authorized and prohibited information flowsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Solving normative conflicts by merging rolesPublished by Association for Computing Machinery (ACM) ,1995
- Actions and Events in Interval Temporal LogicJournal of Logic and Computation, 1994
- Policy conflict analysis in distributed system managementJournal of Organizational Computing, 1994
- How responsibility modelling leads to security requirementsPublished by Association for Computing Machinery (ACM) ,1993
- Policy hierarchies for distributed systems managementIEEE Journal on Selected Areas in Communications, 1993
- A Logical View of Secure Dependencies*Journal of Computer Security, 1992
- Unwinding and Inference ControlPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1984
- Action Theory and Social SciencePublished by Springer Nature ,1977
- Law and logicTheoria, 1972