% Bibliography downloaded from https://researchr.org/downloadbibtex/bibliography/access-control/compact @inproceedings{SatakeKGIIH09, title = {How to approach humans?: strategies for social robots to initiate interaction}, author = {Satoru Satake and Takayuki Kanda and Dylan F. Glas and Michita Imai and Hiroshi Ishiguro and Norihiro Hagita}, year = {2009}, doi = {10.1145/1514095.1514117}, url = {http://doi.acm.org/10.1145/1514095.1514117}, tags = {human-computer interaction, social, systematic-approach}, researchr = {https://researchr.org/publication/SatakeKGIIH09}, cites = {0}, citedby = {0}, pages = {109-116}, booktitle = {hri}, } @inproceedings{MouelhiFBT08, title = {A Model-Based Framework for Security Policy Specification, Deployment and Testing}, author = {Tejeddine Mouelhi and Franck Fleurey and Benoit Baudry and Yves Le Traon}, year = {2008}, doi = {10.1007/978-3-540-87875-9_38}, url = {http://dx.doi.org/10.1007/978-3-540-87875-9_38}, tags = {empirical, programming languages, object-oriented programming, rule-based, Java, deployment, meta programming, application framework, generic programming, case study, model checking, meta-model, modeling language, modeling, language modeling, testing, language design, security policy specification, object-role modeling, security, aspect oriented programming, consistency, programming, subject-oriented programming, access control policies, Meta-Environment, access control, MDE, design, process modeling, role-based access control, systematic-approach, feature-oriented programming, meta-objects}, researchr = {https://researchr.org/publication/MouelhiFBT08}, cites = {0}, citedby = {0}, pages = {537-552}, booktitle = {MoDELS}, } @inproceedings{OliveiraWKK07, title = {Weaving rewrite-based access control policies}, author = {Anderson Santana de Oliveira and Eric Ke Wang and Claude Kirchner and Hélène Kirchner}, year = {2007}, doi = {10.1145/1314436.1314446}, url = {http://doi.acm.org/10.1145/1314436.1314446}, tags = {rule-based, weaving, graph-rewriting, access control policies, access control, rewriting, role-based access control}, researchr = {https://researchr.org/publication/OliveiraWKK07}, cites = {0}, citedby = {0}, pages = {71-80}, booktitle = {ccs}, } @inproceedings{ChongM04, title = {Security policies for downgrading}, author = {Stephen Chong and Andrew C. Myers}, year = {2004}, doi = {10.1145/1030083.1030110}, url = {http://doi.acm.org/10.1145/1030083.1030110}, tags = {control systems, data-flow language, type system, data-flow, C++, security, security policies}, researchr = {https://researchr.org/publication/ChongM04}, cites = {0}, citedby = {0}, pages = {198-209}, booktitle = {ccs}, } @inproceedings{HansonBKSW07, title = {Data-Purpose Algebra: Modeling Data Usage Policies}, author = {Chris Hanson and Tim Berners-Lee and Lalana Kagal and Gerald Jay Sussman and Daniel J. Weitzner}, year = {2007}, doi = {10.1109/POLICY.2007.14}, url = {http://doi.ieeecomputersociety.org/10.1109/POLICY.2007.14}, tags = {contracts, meta-model, modeling, data-flow, algebra, Meta-Environment, systematic-approach}, researchr = {https://researchr.org/publication/HansonBKSW07}, cites = {0}, citedby = {0}, pages = {173-177}, booktitle = {policy}, } @article{KirchnerKO09, title = {Analysis of Rewrite-Based Access Control Policies}, author = {Claude Kirchner and Hélène Kirchner and Anderson Santana de Oliveira}, year = {2009}, doi = {10.1016/j.entcs.2009.02.072}, url = {http://dx.doi.org/10.1016/j.entcs.2009.02.072}, tags = {rule-based, analysis, graph-rewriting, access control policies, access control, rewriting, role-based access control}, researchr = {https://researchr.org/publication/KirchnerKO09}, cites = {0}, citedby = {0}, journal = {ENTCS}, volume = {234}, pages = {55-75}, } @inproceedings{DoughertyKKO07, title = {Modular Access Control Via Strategic Rewriting}, author = {Daniel J. Dougherty and Claude Kirchner and Hélène Kirchner and Anderson Santana de Oliveira}, year = {2007}, doi = {10.1007/978-3-540-74835-9_38}, url = {http://dx.doi.org/10.1007/978-3-540-74835-9_38}, tags = {graph-rewriting, access control, rewriting}, researchr = {https://researchr.org/publication/DoughertyKKO07}, cites = {0}, citedby = {0}, pages = {578-593}, booktitle = {esorics}, } @article{Oliveira07:0, title = {Rewriting-Based Access Control Policies}, author = {Anderson Santana de Oliveira}, year = {2007}, doi = {10.1016/j.entcs.2007.02.055}, url = {http://dx.doi.org/10.1016/j.entcs.2007.02.055}, tags = {rule-based, graph-rewriting, access control policies, access control, rewriting, role-based access control}, researchr = {https://researchr.org/publication/Oliveira07%3A0}, cites = {0}, citedby = {0}, journal = {ENTCS}, volume = {171}, number = {4}, pages = {59-72}, } @article{Lopriore02, title = {Access Control Mechanisms in a Distributed, Persistent Memory System}, author = {Lanfranco Lopriore}, year = {2002}, url = {http://computer.org/tpds/td2002/l1066abs.htm}, tags = {control systems, persistent, access control}, researchr = {https://researchr.org/publication/Lopriore02}, cites = {0}, citedby = {0}, journal = {tpds}, volume = {13}, number = {10}, pages = {1066-1083}, } @article{MoreiraO04, title = {Simulating Algebraic Specification Genericity on Languages with Initial Semantics}, author = {Anamaria Martins Moreira and Anderson Santana de Oliveira}, year = {2004}, doi = {10.1016/j.entcs.2004.04.009}, url = {http://dx.doi.org/10.1016/j.entcs.2004.04.009}, tags = {semantics, algebraic specification, algebra, access control}, researchr = {https://researchr.org/publication/MoreiraO04}, cites = {0}, citedby = {0}, journal = {ENTCS}, volume = {95}, pages = {131-148}, } @inproceedings{GroenewegenV08, title = {Declarative Access Control for {WebDSL}: Combining Language Integration and Separation of Concerns}, author = {Danny M. Groenewegen and Eelco Visser}, year = {2008}, doi = {10.1109/ICWE.2008.15}, url = {http://dx.doi.org/10.1109/ICWE.2008.15}, tags = {WebDSL, semantics, rule-based, separation of concerns, transformation language, action semantics, language design, weaving, rules, web applications, DSL, abstraction, access control policies, access control, aspect weaving, design, role-based access control, systematic-approach, transformation, domain-specific language}, researchr = {https://researchr.org/publication/GroenewegenV08}, cites = {26}, citedby = {7}, pages = {175-188}, booktitle = {ICWE}, } @article{JurdakBL05:0, title = {U-MAC: a proactive and adaptive UWB medium access control protocol}, author = {Raja Jurdak and Pierre Baldi and Cristina Videira Lopes}, year = {2005}, doi = {10.1002/wcm.312}, url = {http://dx.doi.org/10.1002/wcm.312}, tags = {protocol, access control}, researchr = {https://researchr.org/publication/JurdakBL05%3A0}, cites = {0}, citedby = {0}, journal = {wicomm}, volume = {5}, number = {5}, pages = {551-566}, } @inproceedings{ChongLMQVZZ07, title = {Secure web application via automatic partitioning}, author = {Stephen Chong and Jed Liu and Andrew C. Myers and Xin Qi and K. Vikram and Lantian Zheng and Xin Zheng}, year = {2007}, doi = {10.1145/1294261.1294265}, url = {http://doi.acm.org/10.1145/1294261.1294265}, tags = {program partitioning, JavaScript, Java, functional programming, data-flow programming, data-flow, C++, security, compiler, web applications, partitioning, systematic-approach}, researchr = {https://researchr.org/publication/ChongLMQVZZ07}, cites = {33}, citedby = {0}, pages = {31-44}, booktitle = {sosp}, } @article{CirsteaMO09, title = {Rewrite Based Specification of Access Control Policies}, author = {Horatiu Cirstea and Pierre-Etienne Moreau and Anderson Santana de Oliveira}, year = {2009}, doi = {10.1016/j.entcs.2009.02.071}, url = {http://dx.doi.org/10.1016/j.entcs.2009.02.071}, tags = {rule-based, graph-rewriting, access control policies, access control, rewriting, role-based access control}, researchr = {https://researchr.org/publication/CirsteaMO09}, cites = {0}, citedby = {0}, journal = {ENTCS}, volume = {234}, pages = {37-54}, } @article{JurdakLB04:0, title = {A survey, classification and comparative analysis of medium access control protocols for ad hoc networks}, author = {Raja Jurdak and Cristina Videira Lopes and Pierre Baldi}, year = {2004}, url = {http://dl.comsoc.org/cocoon/comsoc/servlets/OntologySearch?query=&node=TOC1496&render=false&type=1}, tags = {classification, protocol, analysis, survey, access control}, researchr = {https://researchr.org/publication/JurdakLB04%3A0}, cites = {0}, citedby = {0}, journal = {comsur}, volume = {6}, number = {1-4}, pages = {2-16}, }