메뉴 건너뛰기




Volumn 44, Issue 2, 2001, Pages 38-44

Security models for web-based applications

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0000206310     PISSN: 00010782     EISSN: None     Source Type: Journal    
DOI: 10.1145/359205.359224     Document Type: Article
Times cited : (176)

References (11)
  • 1
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Feb.
    • Bertino, E., Ferrari, E., and Atluri, V. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Info. Syst. Security 2, 1 (Feb. 1999), 65-104.
    • (1999) ACM Trans. Info. Syst. Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 2
    • 84968461696 scopus 로고    scopus 로고
    • Protecting information on the Web
    • Nov.
    • Bertino, E., Pagani, E., Rossi, G.P., and Samarati, P. Protecting information on the Web. Commun. ACM 43, 11 (Nov. 2000), 189-199.
    • (2000) Commun. ACM , vol.43 , Issue.11 , pp. 189-199
    • Bertino, E.1    Pagani, E.2    Rossi, G.P.3    Samarati, P.4
  • 3
    • 0002422823 scopus 로고    scopus 로고
    • A role-based access control model and reference implementation within a corporate intranet
    • Feb.
    • Ferraiolo, D.F., Barkley, J.F., and Kuhn, D.R. A role-based access control model and reference implementation within a corporate intranet. ACM Trans. Info. Syst. Security 2, 1 (Feb. 1999), 34-64.
    • (1999) ACM Trans. Info. Syst. Security , vol.2 , Issue.1 , pp. 34-64
    • Ferraiolo, D.F.1    Barkley, J.F.2    Kuhn, D.R.3
  • 5
    • 0016984825 scopus 로고
    • Protection in operating systems
    • Oct.
    • Harrison, M.H., Ruzzo, W.L., and Ullman, J.D. Protection in operating systems. Commun. ACM 19, 8 (Oct. 1976), 461-471.
    • (1976) Commun. ACM , vol.19 , Issue.8 , pp. 461-471
    • Harrison, M.H.1    Ruzzo, W.L.2    Ullman, J.D.3
  • 8
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • Sandhu, R. Lattice-based access control models. IEEE Computer 26, 11 (1993).
    • (1993) IEEE Computer , vol.26 , Issue.11
    • Sandhu, R.1
  • 9
    • 0031232270 scopus 로고    scopus 로고
    • A role-based access control for intranet security
    • Sept.-Oct.
    • Tari, Z. and Chan, S. A role-based access control for intranet security. IEEE Intemet Computing (Sept.-Oct. 1997), 24-34.
    • (1997) IEEE Intemet Computing , pp. 24-34
    • Tari, Z.1    Chan, S.2
  • 10
    • 0002841051 scopus 로고    scopus 로고
    • Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management
    • Lake Tahoe, CA, Aug.
    • Thomas, R.K. and Sandhu, R.S. Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. In Proceedings of the IFIP WG11.3 Workshop on Database Security (Lake Tahoe, CA, Aug. 1997).
    • (1997) Proceedings of the IFIP WG11.3 Workshop on Database Security
    • Thomas, R.K.1    Sandhu, R.S.2
  • 11
    • 0033361961 scopus 로고    scopus 로고
    • Using public-key infrastructure for security and risk management
    • Sept.
    • Wing, P. and O'Higgins, B. Using public-key infrastructure for security and risk management. IEEE Communications Magazine, (Sept. 1999), 71-73.
    • (1999) IEEE Communications Magazine , pp. 71-73
    • Wing, P.1    O'Higgins, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.