% Bibliography downloaded from https://researchr.org/downloadbibtex/bibliography/access-control @inproceedings{SatakeKGIIH09, title = {How to approach humans?: strategies for social robots to initiate interaction}, author = {Satoru Satake and Takayuki Kanda and Dylan F. Glas and Michita Imai and Hiroshi Ishiguro and Norihiro Hagita}, year = {2009}, doi = {10.1145/1514095.1514117}, url = {http://doi.acm.org/10.1145/1514095.1514117}, tags = {human-computer interaction, social, systematic-approach}, researchr = {https://researchr.org/publication/SatakeKGIIH09}, cites = {0}, citedby = {0}, pages = {109-116}, booktitle = {Proceedings of the 4th ACM/IEEE International Conference on Human Robot Interaction, HRI 2009, La Jolla, California, USA, March 9-13, 2009}, editor = {Matthias Scheutz and François Michaud and Pamela J. Hinds and Brian Scassellati}, publisher = {ACM}, isbn = {978-1-60558-404-1}, } @inproceedings{MouelhiFBT08, title = {A Model-Based Framework for Security Policy Specification, Deployment and Testing}, author = {Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry and Yves Le Traon}, year = {2008}, doi = {10.1007/978-3-540-87875-9_38}, url = {http://dx.doi.org/10.1007/978-3-540-87875-9_38}, tags = {empirical, programming languages, object-oriented programming, rule-based, Java, deployment, meta programming, application framework, generic programming, case study, model checking, meta-model, modeling language, modeling, language modeling, testing, language design, security policy specification, object-role modeling, security, aspect oriented programming, consistency, programming, subject-oriented programming, access control policies, Meta-Environment, access control, MDE, design, process modeling, role-based access control, systematic-approach, feature-oriented programming, meta-objects}, researchr = {https://researchr.org/publication/MouelhiFBT08}, cites = {0}, citedby = {0}, pages = {537-552}, booktitle = {Model Driven Engineering Languages and Systems, 11th International Conference, MoDELS 2008, Toulouse, France, September 28 - October 3, 2008. Proceedings}, editor = {Krzysztof Czarnecki and Ileana Ober and Jean-Michel Bruel and Axel Uhl and Markus Völter}, volume = {5301}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-540-87874-2}, } @inproceedings{OliveiraWKK07, title = {Weaving rewrite-based access control policies}, author = {Anderson Santana de Oliveira and Eric Ke Wang and Claude Kirchner and Hélène Kirchner}, year = {2007}, doi = {10.1145/1314436.1314446}, url = {http://doi.acm.org/10.1145/1314436.1314446}, tags = {rule-based, weaving, graph-rewriting, access control policies, access control, rewriting, role-based access control}, researchr = {https://researchr.org/publication/OliveiraWKK07}, cites = {0}, citedby = {0}, pages = {71-80}, booktitle = {Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007}, editor = {Peng Ning and Vijay Atluri and Virgil D. Gligor and Heiko Mantel}, publisher = {ACM}, isbn = {978-1-59593-887-9}, } @inproceedings{ChongM04, title = {Security policies for downgrading}, author = {Stephen Chong and Andrew C. Myers}, year = {2004}, doi = {10.1145/1030083.1030110}, url = {http://doi.acm.org/10.1145/1030083.1030110}, tags = {control systems, data-flow language, type system, data-flow, C++, security, security policies}, researchr = {https://researchr.org/publication/ChongM04}, cites = {0}, citedby = {0}, pages = {198-209}, booktitle = {Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washingtion, DC, USA, October 25-29, 2004}, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick Drew McDaniel}, publisher = {ACM}, isbn = {1-58113-961-6}, } @inproceedings{HansonBKSW07, title = {Data-Purpose Algebra: Modeling Data Usage Policies}, author = {Chris Hanson and Tim Berners-Lee and Lalana Kagal and Gerald Jay Sussman and Daniel J. Weitzner}, year = {2007}, doi = {10.1109/POLICY.2007.14}, url = {http://doi.ieeecomputersociety.org/10.1109/POLICY.2007.14}, tags = {contracts, meta-model, modeling, data-flow, algebra, Meta-Environment, systematic-approach}, researchr = {https://researchr.org/publication/HansonBKSW07}, cites = {0}, citedby = {0}, pages = {173-177}, booktitle = {8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy}, publisher = {IEEE Computer Society}, } @article{KirchnerKO09, title = {Analysis of Rewrite-Based Access Control Policies}, author = {Claude Kirchner and Hélène Kirchner and Anderson Santana de Oliveira}, year = {2009}, doi = {10.1016/j.entcs.2009.02.072}, url = {http://dx.doi.org/10.1016/j.entcs.2009.02.072}, tags = {rule-based, analysis, graph-rewriting, access control policies, access control, rewriting, role-based access control}, researchr = {https://researchr.org/publication/KirchnerKO09}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {234}, pages = {55-75}, } @inproceedings{DoughertyKKO07, title = {Modular Access Control Via Strategic Rewriting}, author = {Daniel J. Dougherty and Claude Kirchner and Hélène Kirchner and Anderson Santana de Oliveira}, year = {2007}, doi = {10.1007/978-3-540-74835-9_38}, url = {http://dx.doi.org/10.1007/978-3-540-74835-9_38}, tags = {graph-rewriting, access control, rewriting}, researchr = {https://researchr.org/publication/DoughertyKKO07}, cites = {0}, citedby = {0}, pages = {578-593}, booktitle = {Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}, editor = {Joachim Biskup and Javier Lopez}, volume = {4734}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-540-74834-2}, } @article{Oliveira07:0, title = {Rewriting-Based Access Control Policies}, author = {Anderson Santana de Oliveira}, year = {2007}, doi = {10.1016/j.entcs.2007.02.055}, url = {http://dx.doi.org/10.1016/j.entcs.2007.02.055}, tags = {rule-based, graph-rewriting, access control policies, access control, rewriting, role-based access control}, researchr = {https://researchr.org/publication/Oliveira07%3A0}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {171}, number = {4}, pages = {59-72}, } @article{Lopriore02, title = {Access Control Mechanisms in a Distributed, Persistent Memory System}, author = {Lanfranco Lopriore}, year = {2002}, url = {http://computer.org/tpds/td2002/l1066abs.htm}, tags = {control systems, persistent, access control}, researchr = {https://researchr.org/publication/Lopriore02}, cites = {0}, citedby = {0}, journal = {IEEE Trans. Parallel Distrib. Syst.}, volume = {13}, number = {10}, pages = {1066-1083}, } @article{MoreiraO04, title = {Simulating Algebraic Specification Genericity on Languages with Initial Semantics}, author = {Anamaria Martins Moreira and Anderson Santana de Oliveira}, year = {2004}, doi = {10.1016/j.entcs.2004.04.009}, url = {http://dx.doi.org/10.1016/j.entcs.2004.04.009}, tags = {semantics, algebraic specification, algebra, access control}, researchr = {https://researchr.org/publication/MoreiraO04}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {95}, pages = {131-148}, } @inproceedings{GroenewegenV08, title = {Declarative Access Control for {WebDSL}: Combining Language Integration and Separation of Concerns}, author = {Danny M. Groenewegen and Eelco Visser}, year = {2008}, doi = {10.1109/ICWE.2008.15}, url = {http://dx.doi.org/10.1109/ICWE.2008.15}, tags = {WebDSL, semantics, rule-based, separation of concerns, transformation language, action semantics, language design, weaving, rules, web applications, DSL, abstraction, access control policies, access control, aspect weaving, design, role-based access control, systematic-approach, transformation, domain-specific language}, researchr = {https://researchr.org/publication/GroenewegenV08}, cites = {26}, citedby = {7}, pages = {175-188}, booktitle = {Proceedings of the Eighth International Conference on Web Engineering, ICWE 2008, 14-18 July 2008, Yorktown Heights, New York, USA}, editor = {Daniel Schwabe and Francisco Curbera and Paul Dantzig}, publisher = {IEEE}, isbn = {978-0-7695-3261-5}, } @article{JurdakBL05:0, title = {U-MAC: a proactive and adaptive UWB medium access control protocol}, author = {Raja Jurdak and Pierre Baldi and Cristina Videira Lopes}, year = {2005}, doi = {10.1002/wcm.312}, url = {http://dx.doi.org/10.1002/wcm.312}, tags = {protocol, access control}, researchr = {https://researchr.org/publication/JurdakBL05%3A0}, cites = {0}, citedby = {0}, journal = {Wireless Communications and Mobile Computing}, volume = {5}, number = {5}, pages = {551-566}, } @inproceedings{ChongLMQVZZ07, title = {Secure web application via automatic partitioning}, author = {Stephen Chong and Jed Liu and Andrew C. Myers and Xin Qi and K. Vikram and Lantian Zheng and Xin Zheng}, year = {2007}, doi = {10.1145/1294261.1294265}, url = {http://doi.acm.org/10.1145/1294261.1294265}, tags = {program partitioning, JavaScript, Java, functional programming, data-flow programming, data-flow, C++, security, compiler, web applications, partitioning, systematic-approach}, researchr = {https://researchr.org/publication/ChongLMQVZZ07}, cites = {33}, citedby = {0}, pages = {31-44}, booktitle = {Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, SOSP 2007, Stevenson, Washington, USA, October 14-17, 2007}, editor = {Thomas C. Bressoud and M. Frans Kaashoek}, publisher = {ACM}, isbn = {978-1-59593-591-5}, } @article{CirsteaMO09, title = {Rewrite Based Specification of Access Control Policies}, author = {Horatiu Cirstea and Pierre-Etienne Moreau and Anderson Santana de Oliveira}, year = {2009}, doi = {10.1016/j.entcs.2009.02.071}, url = {http://dx.doi.org/10.1016/j.entcs.2009.02.071}, tags = {rule-based, graph-rewriting, access control policies, access control, rewriting, role-based access control}, researchr = {https://researchr.org/publication/CirsteaMO09}, cites = {0}, citedby = {0}, journal = {Electronic Notes in Theoretical Computer Science}, volume = {234}, pages = {37-54}, } @article{JurdakLB04:0, title = {A survey, classification and comparative analysis of medium access control protocols for ad hoc networks}, author = {Raja Jurdak and Cristina Videira Lopes and Pierre Baldi}, year = {2004}, url = {http://dl.comsoc.org/cocoon/comsoc/servlets/OntologySearch?query=&node=TOC1496&render=false&type=1}, tags = {classification, protocol, analysis, survey, access control}, researchr = {https://researchr.org/publication/JurdakLB04%3A0}, cites = {0}, citedby = {0}, journal = {IEEE Communications Surveys and Tutorials}, volume = {6}, number = {1-4}, pages = {2-16}, }