Publications

Export 7 results:
Author [ Title(Asc)] Type Year
Filters: Keyword is Access control  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
S
Alexander DS, Arbaugh WA, Keromytis AD, Muir S, Smith JM.  2000.  Secure quality of service handling: SQoSH. IEEE Communications Magazine. 38(4):106-112.
Alexander S, Arbaugh WA, Keromytis AD, Smith JM.  1998.  Safety and security of programmable network infrastructures. IEEE Communications Magazine. 36(10):84-92.
R
Nayak A K, Reimers A, Feamster N, Clark R.  2009.  Resonance: dynamic access control for enterprise networks. Proceedings of the 1st ACM workshop on Research on enterprise networking. :11-18.
M
Swamy N, Hicks MW, Tse S, Zdancewic S.  2006.  Managing policy updates in security-typed languages. 19th IEEE Computer Security Foundations Workshop, 2006. :13pp.-216-13pp.-216.
F
Swamy N, Corcoran BJ, Hicks MW.  2008.  Fable: A Language for Enforcing User-defined Security Policies. IEEE Symposium on Security and Privacy, 2008. SP 2008. :369-383.
D
Feamster N, Nayak A, Kim H, Clark R, Mundada Y, Ramachandran A, bin Tariq M.  2010.  Decoupling policy from configuration in campus and enterprise networks. Local and Metropolitan Area Networks (LANMAN), 2010 17th IEEE Workshop on. :1-6.
C
Mundur P, Sood AK, Simon R.  2005.  Class-based access control for distributed video-on-demand systems. IEEE Transactions on Circuits and Systems for Video Technology. 15(7):844-853.