메뉴 건너뛰기




Volumn 15, Issue 2, 1997, Pages 154-194

Access control for large collections

Author keywords

C.2.4 Computer Communication Networks : Distributed Systems distributed applications; D.2.0 Software Engineering : General protection mechanisms; D.4.6 Operating Systems : Security and Protection; Distributed databases

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; DISTRIBUTED DATABASE SYSTEMS; SECURITY OF DATA;

EID: 0031118725     PISSN: 10468188     EISSN: None     Source Type: Journal    
DOI: 10.1145/248625.248652     Document Type: Article
Times cited : (27)

References (44)
  • 2
    • 0003400251 scopus 로고
    • MIRTRE Corp., Bedford, Mass. Also available as NTIS AD-A023588. National Technical Information Service, Springfield, Va.
    • BELL, D.E. AND LAPADULA, L. J. 1975. Secure computer system: Unified exposition and multics interpretation. MIRTRE Corp., Bedford, Mass. Also available as NTIS AD-A023588. National Technical Information Service, Springfield, Va. (1976).
    • (1975) Secure Computer System: Unified Exposition and Multics Interpretation
    • Bell, D.E.1    Lapadula, L.J.2
  • 3
    • 84976697238 scopus 로고
    • The GemStone object database management system
    • BUTTERWORTH, P., OTIS, A., AND STEIN, J. 1991. The GemStone object database management system. Commun. ACM 34, 10 (Oct.), 50-63.
    • (1991) Commun. ACM , vol.34 , Issue.10 OCT. , pp. 50-63
    • Butterworth, P.1    Otis, A.2    Stein, J.3
  • 4
    • 0011588485 scopus 로고
    • Trusted products evaluation
    • CHOKHANI, S. 1992. Trusted products evaluation. Commun. ACM 35, 7 (July), 64-76.
    • (1992) Commun. ACM , vol.35 , Issue.7 JULY , pp. 64-76
    • Chokhani, S.1
  • 6
    • 84976862627 scopus 로고
    • 2 system
    • 2 system. Commun. ACM 34, 10 (Oct.), 34-49.
    • (1991) Commun. ACM , vol.34 , Issue.10 OCT. , pp. 34-49
    • Deux, O.1
  • 7
    • 0003969633 scopus 로고
    • DOD 5200.28 STD, National Computer Security Center, U.S. Department of Defense, Washington, D.C.
    • DEPARTMENT OF DEFENSE. 1985. Trusted computer system evaluation criteria. DOD 5200.28 STD, National Computer Security Center, U.S. Department of Defense, Washington, D.C.
    • (1985) Trusted Computer System Evaluation Criteria
  • 9
    • 0018008817 scopus 로고
    • On an authorization mechanism
    • FAGIN, R. 1978. On an authorization mechanism. ACM Trans. Database Sys. 3, 3, 310-375.
    • (1978) ACM Trans. Database Sys. , vol.3 , Issue.3 , pp. 310-375
    • Fagin, R.1
  • 12
    • 0040272023 scopus 로고
    • A flexible and efficient database authorization facility
    • IBM, San Jose, Calif.
    • GAGLIARDI, R., LAPIS, G., AND LINDSAY, B. G. 1989. A flexible and efficient database authorization facility. IBM Res. Rep. RJ 6826, IBM, San Jose, Calif.
    • (1989) IBM Res. Rep. RJ 6826
    • Gagliardi, R.1    Lapis, G.2    Lindsay, B.G.3
  • 13
    • 0017918928 scopus 로고
    • Administrative control of computing service
    • GLADNEY, H. M. 1978. Administrative control of computing service. IBM Syst. J. 17, 151.
    • (1978) IBM Syst. J. , vol.17 , pp. 151
    • Gladney, H.M.1
  • 14
    • 0027206975 scopus 로고
    • A storage subsystem for image and records management
    • GLADNEY, H. M. 1993. A storage subsystem for image and records management. IBM Syst. J. 32, 3, 512-540.
    • (1993) IBM Syst. J. , vol.32 , Issue.3 , pp. 512-540
    • Gladney, H.M.1
  • 15
    • 18044386279 scopus 로고
    • Condition tests in data server access control
    • IBM, San Jose, Calif.
    • GLADNEY, H. M. 1994. Condition tests in data server access control. IBM Res. Rep. RJ 9244, IBM, San Jose, Calif.
    • (1994) IBM Res. Rep. RJ 9244
    • Gladney, H.M.1
  • 16
    • 0016452014 scopus 로고
    • An access control mechanism for computer resources
    • GLADNEY, H. M., WORLEY, E. L., AND MYERS, J. J. 1975. An access control mechanism for computer resources. IBM Syst. J. 14, 212.
    • (1975) IBM Syst. J. , vol.14 , pp. 212
    • Gladney, H.M.1    Worley, E.L.2    Myers, J.J.3
  • 18
    • 84976657250 scopus 로고
    • An authorization mechanism for a relational database system
    • GRIFFITHS, P. P. AND WADE, B. 1976. An authorization mechanism for a relational database system. ACM Trans. Database Syst. 1, 3, 242-255.
    • (1976) ACM Trans. Database Syst. , vol.1 , Issue.3 , pp. 242-255
    • Griffiths, P.P.1    Wade, B.2
  • 24
    • 18044384928 scopus 로고
    • ISO/IEC JTC 1/SC 21/WG 1 N6947 Second CD 10181-3. International Standards Organization, Geneva, Switzerland
    • ISO. 1992. Information retrieval, transfer and management for OSI: Access control framework. ISO/IEC JTC 1/SC 21/WG 1 N6947 Second CD 10181-3. International Standards Organization, Geneva, Switzerland.
    • (1992) Information Retrieval, Transfer and Management for OSI: Access Control Framework
  • 25
    • 18044392297 scopus 로고
    • Security and management services in open networks and distributed systems
    • IBM, San Jose, Calif.
    • JANSON, P. 1992. Security and management services in open networks and distributed systems. IBM Res. Rep. RZ 2274, IBM, San Jose, Calif.
    • (1992) IBM Res. Rep. RZ 2274
    • Janson, P.1
  • 26
    • 0022103668 scopus 로고
    • Authentication and discretionary access control in computer networks
    • KARGER, P. A. 1985. Authentication and discretionary access control in computer networks. Comput. Networks ISDN Syst. 10, 1, 27-37.
    • (1985) Comput. Networks ISDN Syst. , vol.10 , Issue.1 , pp. 27-37
    • Karger, P.A.1
  • 27
    • 1642330512 scopus 로고
    • The evolution of the Kerberos authentication service
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • KOHL, J. T. 1991. The evolution of the Kerberos authentication service. In Proceedings of the EurOpen Conference, Unix Open Systems in Perspective. IEEE Computer Society Press, Los Alamitos, Calif., 295-313.
    • (1991) Proceedings of the EurOpen Conference, Unix Open Systems in Perspective , pp. 295-313
    • Kohl, J.T.1
  • 28
    • 18044368775 scopus 로고
    • OSF's distributed computing environment
    • KUMAR, R. 1991. OSF's distributed computing environment. IBM AIXpert 2, 22-29.
    • (1991) IBM AIXpert , vol.2 , pp. 22-29
    • Kumar, R.1
  • 29
    • 84976841617 scopus 로고
    • The ObjectStore database system
    • LAMB, C., LANDIS, G., ORENSTIEN, J., AND WEINREB, D. 1991. The ObjectStore database system. Commun. ACM 34, 10 (Oct.), 50-63.
    • (1991) Commun. ACM , vol.34 , Issue.10 OCT. , pp. 50-63
    • Lamb, C.1    Landis, G.2    Orenstien, J.3    Weinreb, D.4
  • 30
    • 0039015629 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • LAMPSON, B., ABADI, M., BURROWS, M., AND WOBBER, W. E. 1991. Authentication in distributed systems: Theory and practice. Oper. Syst. Rev. 25, 5, 165-182.
    • (1991) Oper. Syst. Rev. , vol.25 , Issue.5 , pp. 165-182
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, W.E.4
  • 31
    • 84976834054 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • LAMPSON, B., ABADI, M., BURROWS, M., AND WOBBER, W. E. 1992. Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst. 10, 4 (Nov.), 265-308.
    • (1992) ACM Trans. Comput. Syst. , vol.10 , Issue.4 NOV. , pp. 265-308
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, W.E.4
  • 32
    • 18044366296 scopus 로고
    • An overview of the OSF DCE distributed file system
    • LEBOWITZ, G. 1992. An overview of the OSF DCE distributed file system. IBM AIXpert 3, (Feb.), 55-64.
    • (1992) IBM AIXpert , vol.3 , Issue.FEB. , pp. 55-64
    • Lebowitz, G.1
  • 34
    • 18044364929 scopus 로고
    • Authorization systems with grantor-controlled propagation of privileges
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • LEISS, E. 1983. Authorization systems with grantor-controlled propagation of privileges. In Proceedings of Spring COMPCON '83. IEEE Computer Society Press, Los Alamitos, Calif.
    • (1983) Proceedings of Spring COMPCON '83
    • Leiss, E.1
  • 36
    • 84950950931 scopus 로고
    • Extensions to Starburst: Objects, types, functions, and rules
    • LOHMAN, G. M., LINDSAY, B., PIRAHESH, H., AND SCHIEFER, K. B. 1991. Extensions to Starburst: Objects, types, functions, and rules. Commun. ACM 34, 10 (Oct.), 94-109.
    • (1991) Commun. ACM , vol.34 , Issue.10 OCT. , pp. 94-109
    • Lohman, G.M.1    Lindsay, B.2    Pirahesh, H.3    Schiefer, K.B.4
  • 37
    • 0023965320 scopus 로고
    • The source of authority for commercial access control
    • MOFFETT, J. D. AND SLOMAN, M. S. 1988. The source of authority for commercial access control. Computer 21, 2 (Feb.), 59-69.
    • (1988) Computer , vol.21 , Issue.2 FEB. , pp. 59-69
    • Moffett, J.D.1    Sloman, M.S.2
  • 39
    • 0026119329 scopus 로고
    • A model of authorization for next-generation database systems
    • RABITTI, F., BERTINO, B., KIM, K., AND WOELK, D. 1991. A model of authorization for next-generation database systems. ACM Trans. Database Syst. 16, 1, 88-131.
    • (1991) ACM Trans. Database Syst. , vol.16 , Issue.1 , pp. 88-131
    • Rabitti, F.1    Bertino, B.2    Kim, K.3    Woelk, D.4
  • 40
    • 18044397054 scopus 로고
    • CACL: Efficient fine-grained protection for objects
    • IBM, San Jose, Calif.
    • RICHARDSON, J., SCHWARZ, P., AND CABRERA, L.-F. 1992. CACL: Efficient fine-grained protection for objects. IBM Res. Rep. RJ 8894, IBM, San Jose, Calif.
    • (1992) IBM Res. Rep. RJ 8894
    • Richardson, J.1    Schwarz, P.2    Cabrera, L.-F.3
  • 41
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • SALTZER, J. H. AND SCHROEDER, M. D. 1975. The protection of information in computer systems. Proc. IEEE 63, 9, 1278-1308.
    • (1975) Proc. IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 42
    • 84976790810 scopus 로고
    • Database systems: Achievements and opportunities
    • SILBERSCHAT, A., STONEBRAKER, M., AND ULLMAN, M., Eds. 1991. Database systems: Achievements and opportunities. Commun. ACM 34, 10 (Oct.), 110-120.
    • (1991) Commun. ACM , vol.34 , Issue.10 OCT. , pp. 110-120
    • Silberschat, A.1    Stonebraker, M.2    Ullman, M.3
  • 43
    • 84976723207 scopus 로고
    • The PostGres next generation database management system
    • STONEBRAKER, M. AND KEMNITZ, G. 1991. The PostGres next generation database management system. Commun. ACM 34, 10 (Oct.), 78-92.
    • (1991) Commun. ACM , vol.34 , Issue.10 OCT. , pp. 78-92
    • Stonebraker, M.1    Kemnitz, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.