Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Vincent C. Hu
@article{DBLP:journals/corr/abs-2303-16688, author = {Antonios Gouglidis and Anna Kagia and Vincent C. Hu}, title = {Model Checking Access Control Policies: {A} Case Study using Google Cloud {IAM}}, journal = {CoRR}, volume = {abs/2303.16688}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2303.16688}, doi = {10.48550/ARXIV.2303.16688}, eprinttype = {arXiv}, eprint = {2303.16688}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2303-16688.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/Hu20, author = {Vincent C. Hu}, editor = {Guojun Wang and Bing Chen and Wei Li and Roberto Di Pietro and Xuefeng Yan and Hao Han}, title = {Apply Quantum Search to the Safety Check for Mono Operational Attribute Based Protection Systems}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - 13th International Conference, SpaCCS 2020, Nanjing, China, December 18-20, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12382}, pages = {173--187}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68851-6\_12}, doi = {10.1007/978-3-030-68851-6\_12}, timestamp = {Fri, 05 Feb 2021 12:16:10 +0100}, biburl = {https://dblp.org/rec/conf/spaccs/Hu20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HuKF18, author = {Vincent C. Hu and D. Richard Kuhn and David F. Ferraiolo}, title = {Access Control for Emerging Distributed Systems}, journal = {Computer}, volume = {51}, number = {10}, pages = {100--103}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.3971347}, doi = {10.1109/MC.2018.3971347}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HuKF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seke/KuhnYKLH18, author = {Rick Kuhn and Dylan Yaga and Raghu Kacker and Jeff Yu Lei and Vincent C. Hu}, editor = {{\'{O}}scar Mort{\'{a}}gua Pereira}, title = {Pseudo-Exhaustive Verification of Rule Based Systems}, booktitle = {The 30th International Conference on Software Engineering and Knowledge Engineering, Hotel Pullman, Redwood City, California, USA, July 1-3, 2018}, pages = {586--585}, publisher = {{KSI} Research Inc. and Knowledge Systems Institute Graduate School}, year = {2018}, url = {https://doi.org/10.18293/SEKE2018-072}, doi = {10.18293/SEKE2018-072}, timestamp = {Sun, 26 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/seke/KuhnYKLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/GouglidisHBH17, author = {Antonios Gouglidis and Vincent C. Hu and Jeremy Busby and David Hutchison}, editor = {Elisa Bertino and Ravi S. Sandhu and Ram Krishnan}, title = {Verification of Resilience Policies that Assist Attribute Based Access Control}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Attribute-Based Access Control, ABAC@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017}, pages = {43--52}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3041048.3041049}, doi = {10.1145/3041048.3041049}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/GouglidisHBH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/LiLH17, author = {Ang Li and Qinghua Li and Vincent C. Hu}, title = {Access Control for Distributed Processing Systems: Use Cases and General Considerations}, booktitle = {3rd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017}, pages = {117--125}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CIC.2017.00026}, doi = {10.1109/CIC.2017.00026}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/LiLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HuK16, author = {Vincent C. Hu and Rick Kuhn}, title = {Access Control Policy Verification}, journal = {Computer}, volume = {49}, number = {12}, pages = {80--83}, year = {2016}, url = {https://doi.org/10.1109/MC.2016.368}, doi = {10.1109/MC.2016.368}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HuK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/FerraioloCKH16, author = {David F. Ferraiolo and Ramaswamy Chandramouli and Rick Kuhn and Vincent C. Hu}, editor = {Elisa Bertino and Ravi S. Sandhu and Ram Krishnan}, title = {Extensible Access Control Markup Language {(XACML)} and Next Generation Access Control {(NGAC)}}, booktitle = {Proceedings of the 2016 {ACM} International Workshop on Attribute Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA, March 11, 2016}, pages = {13--24}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2875491.2875496}, doi = {10.1145/2875491.2875496}, timestamp = {Tue, 09 Feb 2021 08:50:28 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/FerraioloCKH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/AlumbaughLH16, author = {John Calvin Alumbaugh and Qinghua Li and Vincent C. Hu}, title = {Differentiating Non-Isomorphic Graphlets for Graph Analytics}, booktitle = {2nd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016}, pages = {349--356}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIC.2016.053}, doi = {10.1109/CIC.2016.053}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/AlumbaughLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icst/KuhnHFKL16, author = {D. Richard Kuhn and Vincent C. Hu and David F. Ferraiolo and Raghu N. Kacker and Yu Lei}, title = {Pseudo-Exhaustive Testing of Attribute Based Access Control Rules}, booktitle = {Ninth {IEEE} International Conference on Software Testing, Verification and Validation Workshops, {ICST} Workshops 2016, Chicago, IL, USA, April 11-15, 2016}, pages = {51--58}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICSTW.2016.35}, doi = {10.1109/ICSTW.2016.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icst/KuhnHFKL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/HuK16, author = {Vincent C. Hu and D. Richard Kuhn}, title = {General Methods for Access Control Policy Verification (Application Paper)}, booktitle = {17th {IEEE} International Conference on Information Reuse and Integration, {IRI} 2016, Pittsburgh, PA, USA, July 28-30, 2016}, pages = {315--323}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/IRI.2016.49}, doi = {10.1109/IRI.2016.49}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iri/HuK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/HuKF15, author = {Vincent C. Hu and D. Richard Kuhn and David F. Ferraiolo}, title = {Attribute-Based Access Control}, journal = {Computer}, volume = {48}, number = {2}, pages = {85--88}, year = {2015}, url = {https://doi.org/10.1109/MC.2015.33}, doi = {10.1109/MC.2015.33}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/HuKF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/HuFKKL15, author = {Vincent C. Hu and David F. Ferraiolo and D. Richard Kuhn and Raghu N. Kacker and Yu Lei}, title = {Implementing and Managing Policy Rules in Attribute Based Access Control}, booktitle = {2015 {IEEE} International Conference on Information Reuse and Integration, {IRI} 2015, San Francisco, CA, USA, August 13-15, 2015}, pages = {518--525}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/IRI.2015.98}, doi = {10.1109/IRI.2015.98}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iri/HuFKKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/LiLHD15, author = {Ang Li and Qinghua Li and Vincent C. Hu and Jia Di}, editor = {Qinqing Zhang and Jerry Brand and Thomas G. MacDonald and Bharat T. Doshi and Bonnie L. Gorsic}, title = {Evaluating the capability and performance of access control policy verification tools}, booktitle = {34th {IEEE} Military Communications Conference, {MILCOM} 2015, Tampa, FL, USA, October 26-28, 2015}, pages = {366--371}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/MILCOM.2015.7357470}, doi = {10.1109/MILCOM.2015.7357470}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/milcom/LiLHD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/GouglidisMH14, author = {Antonios Gouglidis and Ioannis Mavridis and Vincent C. Hu}, title = {Security policy verification for multi-domains in cloud systems}, journal = {Int. J. Inf. Sec.}, volume = {13}, number = {2}, pages = {97--111}, year = {2014}, url = {https://doi.org/10.1007/s10207-013-0205-x}, doi = {10.1007/S10207-013-0205-X}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/GouglidisMH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/HuGFK14, author = {Vincent C. Hu and Tim Grance and David F. Ferraiolo and D. Richard Kuhn}, editor = {Elisa Bertino and Shu{-}Ching Chen and Karl Aberer and Prashant Krishnamurthy and Murat Kantarcioglu}, title = {An Access Control scheme for Big Data processing}, booktitle = {10th {IEEE} International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2014, Miami, Florida, USA, October 22-25, 2014}, pages = {1--7}, publisher = {{ICST} / {IEEE}}, year = {2014}, url = {https://doi.org/10.4108/icst.collaboratecom.2014.257649}, doi = {10.4108/ICST.COLLABORATECOM.2014.257649}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/HuGFK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/HuS13, author = {Vincent C. Hu and Karen Scarfone}, title = {Real-Time Access Control Rule Fault Detection Using a Simulated Logic Circuit}, booktitle = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013, Washington, DC, USA, 8-14 September, 2013}, pages = {494--501}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SocialCom.2013.76}, doi = {10.1109/SOCIALCOM.2013.76}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/HuS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/GouglidisMH13, author = {Antonios Gouglidis and Ioannis Mavridis and Vincent C. Hu}, title = {Verification of Secure Inter-operation Properties in Multi-domain {RBAC} Systems}, booktitle = {Seventh International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 18-20 June 2013 - Companion Volume}, pages = {35--44}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/SERE-C.2013.25}, doi = {10.1109/SERE-C.2013.25}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/GouglidisMH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/HwangHX12, author = {JeeHyun Hwang and Vincent C. Hu and Tao Xie}, title = {Paradigm in Verification of Access Control}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012 - Companion Volume}, pages = {193}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE-C.2012.14}, doi = {10.1109/SERE-C.2012.14}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/HwangHX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/HuKXH11, author = {Vincent C. Hu and D. Richard Kuhn and Tao Xie and JeeHyun Hwang}, title = {Model Checking for Verification of Mandatory Access Control Models and Properties}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {21}, number = {1}, pages = {103--127}, year = {2011}, url = {https://doi.org/10.1142/S021819401100513X}, doi = {10.1142/S021819401100513X}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/HuKXH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/HuFG10, author = {Vincent C. Hu and David F. Ferraiolo and Serban I. Gavrila}, title = {Specification of attribute relations for access control policies and constraints using Policy Machine}, booktitle = {Sixth International Conference on Information Assurance and Security, {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010}, pages = {32--35}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISIAS.2010.5604043}, doi = {10.1109/ISIAS.2010.5604043}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/HuFG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/HwangXHA10, author = {JeeHyun Hwang and Tao Xie and Vincent C. Hu and Mine Altunay}, editor = {Sara Foresti and Sushil Jajodia}, title = {Mining Likely Properties of Access Control Policies via Association Rule Mining}, booktitle = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP} {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6166}, pages = {193--208}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13739-6\_13}, doi = {10.1007/978-3-642-13739-6\_13}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/HwangXHA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/HwangXHA10, author = {JeeHyun Hwang and Tao Xie and Vincent C. Hu and Mine Altunay}, title = {{ACPT:} {A} Tool for Modeling and Verifying Access Control Policies}, booktitle = {{POLICY} 2010, {IEEE} International Symposium on Policies for Distributed Systems and Networks, Fairfax, VA, USA, 21-23 July 2010}, pages = {40--43}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/POLICY.2010.22}, doi = {10.1109/POLICY.2010.22}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/HwangXHA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/se/HwangMXH10, author = {JeeHyun Hwang and Evan Martin and Tao Xie and Vincent C. Hu}, editor = {Phillip A. Laplante}, title = {Policy-Based Testing}, booktitle = {Encyclopedia of Software Engineering}, pages = {673--683}, publisher = {Taylor {\&} Francis}, year = {2010}, url = {http://www.crcnetbase.com/doi/abs/10.1081/E-ESE-120044237}, doi = {10.1081/E-ESE-120044237}, timestamp = {Wed, 28 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/se/HwangMXH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/HwangXH09, author = {JeeHyun Hwang and Tao Xie and Vincent C. Hu}, title = {Detection of Multiple-Duty-Related Security Leakage in Access Control Policies}, booktitle = {Third {IEEE} International Conference on Secure Software Integration and Reliability Improvement, {SSIRI} 2009, Shanghai, China, July 8-10, 2009}, pages = {65--74}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SSIRI.2009.63}, doi = {10.1109/SSIRI.2009.63}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/HwangXH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/MartinHXH08, author = {Evan Martin and JeeHyun Hwang and Tao Xie and Vincent C. Hu}, title = {Assessing Quality of Policy Properties in Verification of Access Control Policies}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {163--172}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.48}, doi = {10.1109/ACSAC.2008.48}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/MartinHXH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/HuKX08, author = {Vincent C. Hu and D. Richard Kuhn and Tao Xie}, editor = {Cheng{-}Zhong Xu and Minyi Guo}, title = {Property Verification for Generic Access Control Models}, booktitle = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume {II:} Workshops}, pages = {243--250}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/EUC.2008.22}, doi = {10.1109/EUC.2008.22}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/HuKX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccgrid/HuFS07, author = {Vincent C. Hu and David F. Ferraiolo and Karen Scarfone}, title = {Access Control Policy Combinations for the Grid Using the Policy Machine}, booktitle = {Seventh {IEEE} International Symposium on Cluster Computing and the Grid (CCGrid 2007), 14-17 May 2007, Rio de Janeiro, Brazil}, pages = {225--232}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CCGRID.2007.15}, doi = {10.1109/CCGRID.2007.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccgrid/HuFS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/HuMHX07, author = {Vincent C. Hu and Evan Martin and JeeHyun Hwang and Tao Xie}, title = {Conformance Checking of Access Control Policies Specified in {XACML}}, booktitle = {31st Annual International Computer Software and Applications Conference, {COMPSAC} 2007, Beijing, China, July 24-27, 2007. Volume 2}, pages = {275--280}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/COMPSAC.2007.96}, doi = {10.1109/COMPSAC.2007.96}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/HuMHX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoscale/HuSGF07, author = {Vincent C. Hu and Karen Scarfone and Serban I. Gavrila and David F. Ferraiolo}, editor = {Jianzhong Li and Wang{-}Chien Lee and Fabrizio Silvestri}, title = {A trust domain management schema for multiple grid environments}, booktitle = {Proceedings of the 2nf International Conference on Scalable Information Systems, Infoscale 2007, Suzhou, China, June 6-8, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {304}, pages = {17}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.4108/infoscale.2007.223}, doi = {10.4108/INFOSCALE.2007.223}, timestamp = {Wed, 28 Nov 2018 12:57:13 +0100}, biburl = {https://dblp.org/rec/conf/infoscale/HuSGF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sutc/HuKF06, author = {Vincent C. Hu and D. Richard Kuhn and David F. Ferraiolo}, title = {The Computational Complexity of Enforceability Validation for Generic Access Control Rules}, booktitle = {{IEEE} International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing {(SUTC} 2006), 5-7 June 2006, Taichung, Taiwan}, pages = {260--267}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.ieeecomputersociety.org/10.1109/SUTC.2006.131}, doi = {10.1109/SUTC.2006.131}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sutc/HuKF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/FerraioloGHK05, author = {David F. Ferraiolo and Serban I. Gavrila and Vincent C. Hu and D. Richard Kuhn}, editor = {Elena Ferrari and Gail{-}Joon Ahn}, title = {Composing and combining policies under the policy machine}, booktitle = {10th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings}, pages = {11--20}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1063979.1063982}, doi = {10.1145/1063979.1063982}, timestamp = {Tue, 06 Nov 2018 16:57:58 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/FerraioloGHK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/HuFF01, author = {Vincent C. Hu and Deborah A. Frincke and David F. Ferraiolo}, editor = {Vassil N. Alexandrov and Jack J. Dongarra and Benjoe A. Juliano and Ren{\'{e}} S. Renner and Chih Jeng Kenneth Tan}, title = {The Policy Machine for Security Policy Management}, booktitle = {Computational Science - {ICCS} 2001, International Conference, San Francisco, CA, USA, May 28-30, 2001. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {2074}, pages = {494--506}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45718-6\_54}, doi = {10.1007/3-540-45718-6\_54}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/iccS/HuFF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GaliassoBHSFH00, author = {Pablo Galiasso and Oliver Bremer and John Hale and Sujeet Shenoi and David F. Ferraiolo and Vincent C. Hu}, title = {Policy Mediation for Multi-Enterprise Environments}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {100--106}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898863}, doi = {10.1109/ACSAC.2000.898863}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GaliassoBHSFH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.