메뉴 건너뛰기




Volumn 23, Issue 3, 1998, Pages 231-285

An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning

Author keywords

Access control; H.2.7 Information Systems : Database Administration security, integrity, and protection; Periodic authorization; Security; Temporal constraints; Time management

Indexed keywords

ALGORITHMS; COMPUTER SOFTWARE; DATA PRIVACY; LOGIC PROGRAMMING; PUBLIC POLICY; SOCIETIES AND INSTITUTIONS; CONSTRAINT THEORY; DATA ACQUISITION; DATA STRUCTURES; SECURITY OF DATA;

EID: 0032153903     PISSN: 03625915     EISSN: None     Source Type: Journal    
DOI: 10.1145/293910.293151     Document Type: Article
Times cited : (181)

References (24)
  • 5
    • 0031170715 scopus 로고    scopus 로고
    • Decentralized administration for a temporal access control model
    • BERTINO, E., BETTINI, C., FERRARI, E., AND SAMARATI, P. 1997. Decentralized administration for a temporal access control model. Inf. Syst. 22, 4, 223-248.
    • (1997) Inf. Syst. , vol.22 , Issue.4 , pp. 223-248
    • Bertino, E.1    Bettini, C.2    Ferrari, E.3    Samarati, P.4
  • 11
    • 71149116148 scopus 로고
    • The well-founded semantics for general logic programs
    • July
    • GELDER, A. V., ROSS, K., AND SCHLIPF, J. S. 1991. The well-founded semantics for general logic programs. J. ACM 38, 3 (July), 620-650.
    • (1991) J. ACM , vol.38 , Issue.3 , pp. 620-650
    • Gelder, A.V.1    Ross, K.2    Schlipf, J.S.3
  • 13
  • 17
    • 0344079650 scopus 로고    scopus 로고
    • Well-founded views in constraint databases: Incremental materialization and maintenance
    • University of Maryland
    • LU, J., LUDASCHER, B., SCHU, J., AND SUBRAHMANIAN, V. 1996. Well-founded views in constraint databases: Incremental materialization and maintenance. Tech. Rep., University of Maryland.
    • (1996) Tech. Rep.
    • Lu, J.1    Ludascher, B.2    Schu, J.3    Subrahmanian, V.4
  • 20
    • 0027906169 scopus 로고
    • A closed form evaluation for Datalog queries with integer (gap)-order constraints
    • REVESZ, P. 1993. A closed form evaluation for Datalog queries with integer (gap)-order constraints. Theor. Comput. Sci. 116, 1, 117-149.
    • (1993) Theor. Comput. Sci. , vol.116 , Issue.1 , pp. 117-149
    • Revesz, P.1
  • 22
    • 0001636850 scopus 로고
    • Kerberos: An authentication service for open network systems
    • Dallas, TX, Winter 1988
    • STEINER, J. G., NEUMAN, C., AND SCHILLER, J. I. 1988. Kerberos: An authentication service for open network systems. In USENIX Conference Proceedings (Dallas, TX, Winter 1988), 191-202.
    • (1988) USENIX Conference Proceedings , pp. 191-202
    • Steiner, J.G.1    Neuman, C.2    Schiller, J.I.3
  • 24
    • 84974750564 scopus 로고
    • Authorizations in distributed systems: A new approach
    • WOO, T. AND LAM, S. 1993. Authorizations in distributed systems: A new approach. J. Comput. Sec. 2, 2&3, 107-136.
    • (1993) J. Comput. Sec. , vol.2 , Issue.2-3 , pp. 107-136
    • Woo, T.1    Lam, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.