메뉴 건너뛰기




Volumn 24, Issue 1, 1997, Pages 69-96

Security in Cyberspace: A knowledge-base approach

Author keywords

Active knowledge bases; Cyberspace; Object oriented databases; Security and database systems

Indexed keywords

COMPUTER NETWORKS; DATABASE SYSTEMS; INFORMATION TECHNOLOGY; KNOWLEDGE BASED SYSTEMS; OBJECT ORIENTED PROGRAMMING;

EID: 0031258807     PISSN: 0169023X     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0169-023X(97)00002-5     Document Type: Article
Times cited : (4)

References (29)
  • 1
    • 84954412448 scopus 로고
    • Ueps - A second generation electronic wallet
    • R.J. Anderson, Ueps - a second generation electronic wallet, in Computer Security - ESORICS 92 (1992) pp. 411-418.
    • (1992) Computer Security - ESORICS , vol.92 , pp. 411-418
    • Anderson, R.J.1
  • 2
    • 0028532579 scopus 로고
    • Why cryptosystems fail
    • November
    • R.J. Anderson, Why cryptosystems fail, Communications of the ACM, 37(11) (November 1994) 32-40.
    • (1994) Communications of the ACM , vol.37 , Issue.11 , pp. 32-40
    • Anderson, R.J.1
  • 4
    • 0028498680 scopus 로고
    • Security technologies
    • September/October
    • T.A. Brooks and M.M. Kaplan, Security technologies, AT&T Technical Journal 73(5) (September/October 1994) 4-8.
    • (1994) AT&T Technical Journal , vol.73 , Issue.5 , pp. 4-8
    • Brooks, T.A.1    Kaplan, M.M.2
  • 5
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • October
    • D. Chaum, Security without identification: Transaction systems to make big brother obsolete, Comm. of the ACM 28(10) (October, 1985) 1030-1044.
    • (1985) Comm. of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 6
    • 0027005999 scopus 로고
    • Achieving electronic privacy
    • August
    • D. Chaum, Achieving electronic privacy, Scientific American (August, 1992) pp. 96-101.
    • (1992) Scientific American , pp. 96-101
    • Chaum, D.1
  • 10
    • 0004816371 scopus 로고
    • A guide tour through mokum 2.0
    • Vrije Universiteit Amsterdam, Faculteit der Wiskunde en Informatica
    • F. Dehne and R.P. van de Riet, A guide tour through Mokum 2.0, Technical report (Vrije Universiteit Amsterdam, Faculteit der Wiskunde en Informatica, 1994).
    • (1994) Technical Report
    • Dehne, F.1    Van De Riet, R.P.2
  • 11
    • 0028404874 scopus 로고
    • A model for evaluation and administration of security in object-oriented databases
    • April
    • E.B. Fernandez, E. Gudes and H. Song, A model for evaluation and administration of security in object-oriented databases, IEEE Trans. on Knowledge and Data Engineering, 6(2) (April, 1994) 275-292.
    • (1994) IEEE Trans. on Knowledge and Data Engineering , vol.6 , Issue.2 , pp. 275-292
    • Fernandez, E.B.1    Gudes, E.2    Song, H.3
  • 13
    • 0028533155 scopus 로고
    • Securing cyberspace
    • November
    • Ravi Ganesan and Ravi Sandhu, Securing Cyberspace, Communication of the ACM, 37(11) (November 1994) 28-65.
    • (1994) Communication of the ACM , vol.37 , Issue.11 , pp. 28-65
    • Ganesan, R.1    Sandhu, R.2
  • 14
    • 30244558413 scopus 로고
    • Information security issues in mobile computing
    • H.P. Eloff and S.H. von Solms (eds.) Chapman & Hall
    • T. Hardjono and J. Seberry, Information security issues in mobile computing, Information Security - the Next Decade, in H.P. Eloff and S.H. von Solms (eds.) (Chapman & Hall, 1995) pp. 289-304.
    • (1995) Information Security - the Next Decade , pp. 289-304
    • Hardjono, T.1    Seberry, J.2
  • 16
    • 30244571050 scopus 로고
    • A context authentication service for role based access control in distribution system (CARDS)
    • H.P. Eloff and S.H. von Solms (eds.) Chapman & Hall
    • R. Holbein and S. Teufel, A context authentication service for role based access control in distribution system (CARDS), Information Security - the next Decade, in H.P. Eloff and S.H. von Solms (eds.) (Chapman & Hall, 1995) pp. 289-304.
    • (1995) Information Security - the Next Decade , pp. 289-304
    • Holbein, R.1    Teufel, S.2
  • 17
    • 30244530285 scopus 로고
    • Security in group applications, lotus notes as a case study
    • H.P. Eloff and S.H. von Solms (eds.) Chapman & Hall
    • A. Hutchinson, Security in group applications, Lotus notes as a case study, Information Security - the Next Decade, in H.P. Eloff and S.H. von Solms (eds.) (Chapman & Hall, 1995) pp. 289-304.
    • (1995) Information Security - the Next Decade , pp. 289-304
    • Hutchinson, A.1
  • 21
    • 85033100017 scopus 로고
    • Vrije University, Amsterdam, March
    • A. Junk, Security and man-machine aspects in Cyberspace - an object-oriented approach, Masters Thesis (Vrije University, 1995); also, Report IR-383 (Vrije University, Amsterdam, March, 1995).
    • (1995) Report IR-383
  • 22
    • 85033104256 scopus 로고
    • COST certificate management system: Structure, functions and protocols
    • San Diego February
    • N. Kapidzic and A. Davidson, COST certificate management system: Structure, functions and protocols, Proc. Internet Security Conference, San Diego (February, 1995).
    • (1995) Proc. Internet Security Conference
    • Kapidzic, N.1    Davidson, A.2
  • 24
    • 30244458321 scopus 로고
    • Functional and operational security system for open distributed environments
    • H.P. Eloff and S.H. von Solms (eds.) Chapman & Hall
    • S. Muftic, Functional and operational security system for open distributed environments, Information Security - the Next Decade, in H.P. Eloff and S.H. von Solms (eds.) (Chapman & Hall, 1995) p. 289-304.
    • (1995) Information Security - the Next Decade , pp. 289-304
    • Muftic, S.1
  • 26
    • 0009957301 scopus 로고
    • The integration of security and integrity constraints in Mokum
    • J. Biskup, M. Morgenstern and C.E. Landwehr (eds.) IFIP, North-Holland
    • R.P. van de Riet and J. Beukering, The integration of security and integrity constraints in Mokum, in J. Biskup, M. Morgenstern and C.E. Landwehr (eds.) Database Security, VIII Status and Prospects (IFIP, North-Holland, 1994) pp. 223-246.
    • (1994) Database Security, Viii Status and Prospects , vol.8 , pp. 223-246
    • Van De Riet, R.P.1    Beukering, J.2
  • 27
    • 30244538110 scopus 로고
    • Distributed object system security
    • H.P. Eloff and S.H. von Solms (eds.) Chapman & Hall
    • V. Varadharajan, Distributed object system security, Information Security - the Next Decade, in H.P. Eloff and S.H. von Solms (eds.) (Chapman & Hall, 1995) pp. 305-321.
    • (1995) Information Security - the Next Decade , pp. 305-321
    • Varadharajan, V.1
  • 29
    • 0038562461 scopus 로고    scopus 로고
    • Linguistic tools for modelling alter egos in cyberspace: Who is responsible?
    • October
    • R.P. van de Riet and J.F.M. Burg, Linguistic tools for modelling alter egos in cyberspace: Who is responsible? Journal of Universal Computer Science (October 1996).
    • (1996) Journal of Universal Computer Science
    • Van De Riet, R.P.1    Burg, J.F.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.