The Limes Security Model for Information Flow Control, accepted at FARES Workshop of the Sixth International Conference on Availability, Reliability and Security, 2011. ,
The Chinese Wall security policy, Proceedings. 1989 IEEE Symposium on Security and Privacy, pp.206-214, 1989. ,
DOI : 10.1109/SECPRI.1989.36295
Chinese wall security policy-an aggressive model, [1989 Proceedings] Fifth Annual Computer Security Applications Conference, pp.286-293, 1989. ,
DOI : 10.1109/CSAC.1989.81064
Secure Computer Systems: Mathematical Foundations, MITRE Corporation, 1973. ,
A Comparison of Commercial and Military Computer Security Policies, 1987 IEEE Symposium on Security and Privacy, pp.184-194, 1987. ,
DOI : 10.1109/SP.1987.10001
A new Access Control model based on the Chinese Wall Security Policy Model, Proceedings of the ISSA 2005 New Knowledge Today Conference, Information Security South Africa (ISSA), pp.1-10, 2005. ,
The Tao of E-Business Services, IBM developerWorks, 2000. ,
Principals and Agents: The Structure of Business, 1985. ,
An Agent-Oriented Programming Model for SOA & Web Services, 2007 5th IEEE International Conference on Industrial Informatics, 2007. ,
DOI : 10.1109/INDIN.2007.4384922
Implementing the Chinese Wall Security Model in Workflow Management Systems, International Symposium on Parallel and Distributed Processing with Applications, pp.574-581, 2010. ,
DOI : 10.1109/ISPA.2010.41
Implementing Conflict of Interest Assertions for Web Services Matchmaking Process, IEEE International Conference on E-Commerce Technology (CEC'03), 2003. ,
Security Model of Service Oriented Computational Grids, Annual IEEE, pp.15-17, 2006. ,
Information flow control in cloud computing, Proceedings of the 6th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing, 2010. ,
DOI : 10.4108/icst.trustcol.2010.1