메뉴 건너뛰기




Volumn 5, Issue 1, 2002, Pages 62-94

An Authorization Model for Temporal and Derived Data: Securing Information Portals

Author keywords

Access Control; Authorization Administration; Derived Data; Security; Temporal Data

Indexed keywords


EID: 0008724838     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/504909.504912     Document Type: Article
Times cited : (42)

References (36)
  • 2
    • 0031355379 scopus 로고    scopus 로고
    • Enforcing mandatory and discretionary security in workflow management systems
    • Atluri, V. and Huang, W.-K. 1997. Enforcing mandatory and discretionary security in workflow management systems. J. Comput. Sec. 5, 4, 303-339.
    • (1997) J. Comput. Sec. , vol.5 , pp. 303-339
    • Atluri, V.1    Huang, W.-K.2
  • 4
    • 0031382313 scopus 로고    scopus 로고
    • A Flexible Model Supporting the Specification and Enforcement of Role-Based Authorizations in Workflow Management Systems
    • (Nov.)
    • Bertino, E., Ferrari, E., and Atluri, V. 1997. A Flexible Model Supporting the Specification and Enforcement of Role-Based Authorizations in Workflow Management Systems. In Proceedings of the Second ACM Workshop on Role-Based Access Control (Nov.), 1-12.
    • (1997) Proceedings of the Second ACM Workshop on Role-Based Access Control , pp. 1-12
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 8
    • 0032153903 scopus 로고    scopus 로고
    • An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning
    • Bertino, E., Bettini, C., Ferrari, E., and Samarati, P. 1998. An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. ACM Trans. Database Sys. 23, 3, 231-285.
    • (1998) ACM Trans. Database Sys. , vol.23 , pp. 231-285
    • Bertino, E.1    Bettini, C.2    Ferrari, E.3    Samarati, P.4
  • 10
    • 0023266943 scopus 로고
    • A Comparison of Commercial and Military Computer Security Policies
    • (Oakland, Calif., April)
    • Clark, D. D. and Wilson, D. R. 1987. A Comparison of Commercial and Military Computer Security Policies. In Proceedings of the IEEE Symposium on Security and Privacy (Oakland, Calif., April), 184-194.
    • (1987) Proceedings of the IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 11
    • 0022327942 scopus 로고
    • On an Algebra for Historical Relational Databases: Two Views
    • (May)
    • Clifford, J. and Tansel, A. U. 1985. On an Algebra for Historical Relational Databases: Two Views. In Proceedings of ACM SIGMOD (May), 247-265.
    • (1985) Proceedings of ACM SIGMOD , pp. 247-265
    • Clifford, J.1    Tansel, A.U.2
  • 12
    • 0031357551 scopus 로고    scopus 로고
    • Authorization Specification and Enforcement in Federated Database Systems
    • di Vimercati, S. D. C. and Samarati, P. 1997. Authorization Specification and Enforcement in Federated Database Systems. J. Comput. Sec. 5, 2, 155-188.
    • (1997) J. Comput. Sec. 5 , vol.5 , Issue.2 , pp. 155-188
    • di Vimercati, S.D.C.1    Samarati, P.2
  • 13
    • 0042009016 scopus 로고
    • Pardes-A Data-Driven Oriented Active Database Model
    • (March)
    • Etzion, O. 1993. Pardes-A Data-Driven Oriented Active Database Model. ACM SIGMOD Rec. 22, 1 (March), 7-14.
    • (1993) ACM SIGMOD Rec. , vol.22 , Issue.1 , pp. 7-14
    • Etzion, O.1
  • 15
    • 0002770949 scopus 로고    scopus 로고
    • Semantic Interoperability in Information Services: Experiencing with Coopware
    • Gal, A. 1999. Semantic Interoperability in Information Services: Experiencing with Coopware. ACM SIGMOD Rec. 28, 1, 68-75.
    • (1999) ACM SIGMOD Rec. , vol.28 , Issue.1 , pp. 68-75
    • Gal, A.1
  • 17
    • 84947933762 scopus 로고    scopus 로고
    • Tale-A Temporal Active Language and Execution Model
    • P. Constantopoulos, J. Mylopoulos, and Y. Vassiliou, Eds., Springer-Verlag, New York
    • Gal, A., Etzion, O., and Segev, A. 1996. Tale-A Temporal Active Language and Execution Model. In Advanced Information Systems Engineering, P. Constantopoulos, J. Mylopoulos, and Y. Vassiliou, Eds., Springer-Verlag, New York, 60-81.
    • (1996) Advanced Information Systems Engineering , pp. 60-81
    • Gal, A.1    Etzion, O.2    Segev, A.3
  • 19
    • 0007932097 scopus 로고
    • An Approach for Building Secure Database Federations
    • (Santiago de Chile, Chile), J. Bocca, M. Jarke, and C. Zaniolo, Eds., Morgan Kaufmann, San Mateo, Calif
    • Jonscher, D. and Dittrich, K. 1994. An Approach for Building Secure Database Federations. In Proceedings of the Twentieth International Conference on Very Large Data Bases (VLDB'94) (Santiago de Chile, Chile), J. Bocca, M. Jarke, and C. Zaniolo, Eds., Morgan Kaufmann, San Mateo, Calif., 24-35.
    • (1994) Proceedings of the Twentieth International Conference on Very Large Data Bases (VLDB'94) , pp. 24-35
    • Jonscher, D.1    Dittrich, K.2
  • 21
    • 0026119329 scopus 로고
    • A Model of Authorization for Next-Generation Database Systems
    • (March)
    • Rabitti, F., Bertino, E., Kim, W., and Woelk, D. 1991. A Model of Authorization for Next-Generation Database Systems. ACM Trans. Database Syst. 16, 1 (March), 88-131.
    • (1991) ACM Trans. Database Syst. , vol.16 , Issue.1 , pp. 88-131
    • Rabitti, F.1    Bertino, E.2    Kim, W.3    Woelk, D.4
  • 23
    • 0038561120 scopus 로고    scopus 로고
    • First Class Views: A Key to User-Centered Computing
    • Rosenthal, A. and Sciore, E. 1999. First Class Views: A Key to User-Centered Computing. SIGMOD Rec. 28, 3, 22-28.
    • (1999) SIGMOD Rec. , vol.28 , Issue.3 , pp. 22-28
    • Rosenthal, A.1    Sciore, E.2
  • 26
    • 0030216932 scopus 로고    scopus 로고
    • An Authorization Model for a Distributed Hypertext System
    • Samarati, P., Bertino, E., and Jajodia, S. 1996. An Authorization Model for a Distributed Hypertext System. IEEE Trans. Knowl. Data Eng. 8, 4, 555-562.
    • (1996) IEEE Trans. Knowl. Data Eng. , vol.8 , pp. 555-562
    • Samarati, P.1    Bertino, E.2    Jajodia, S.3
  • 28
    • 0003342146 scopus 로고
    • Separation of Duties in Computerized Information Systems
    • S. Jajodia and C. Landwehr, Eds., North Holland, Amsterdam, The Netherlands
    • Sandhu, R. S. 1991. Separation of Duties in Computerized Information Systems. In Database Security, IV: Status and Prospects, S. Jajodia and C. Landwehr, Eds., North Holland, Amsterdam, The Netherlands, 179-189.
    • (1991) Database Security, IV: Status and Prospects , pp. 179-189
    • Sandhu, R.S.1
  • 29
    • 0030086382 scopus 로고    scopus 로고
    • Role-Based Access Control Models
    • (Feb.)
    • Sandhu, R. S. et al. 1996. Role-Based Access Control Models. IEEE Computer 29, 2 (Feb.), 38-47.
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.S.1
  • 31
    • 1842458587 scopus 로고
    • The Impact of Inheritance on Security in Object-Oriented Database Systems
    • Carl E. Landwehr, Ed., North-Holland, Amsterdam, The Netherlands
    • Spooner, D. L. 1989. The Impact of Inheritance on Security in Object-Oriented Database Systems. In Database Security, II: Status and Prospects, Carl E. Landwehr, Ed., North-Holland, Amsterdam, The Netherlands, 141-160.
    • (1989) Database Security, II: Status and Prospects , pp. 141-160
    • Spooner, D.L.1
  • 32
    • 0002813889 scopus 로고
    • Pragmatics of Access Control in Mermaid
    • (Sept.) Special Issue on Federated Database Systems
    • Templeton, M., Lund, E., and Ward, P. 1987. Pragmatics of Access Control in Mermaid. Data Eng. 10, 3 (Sept.), 33-38. Special Issue on Federated Database Systems.
    • (1987) Data Eng. , vol.10 , pp. 33-38
    • Templeton, M.1    Lund, E.2    Ward, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.