메뉴 건너뛰기




Volumn 23, Issue 17, 2000, Pages 1584-1593

Application of security policy to role-based access control and the common data security architecture

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; DATA PRIVACY; INFORMATION MANAGEMENT;

EID: 0034318674     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0140-3664(00)00244-9     Document Type: Article
Times cited : (15)

References (19)
  • 3
    • 0029423138 scopus 로고
    • Implementing role based access control using object technology
    • J. Barkley, Implementing role based access control using object technology, First ACM/NIST Workshop on Role-Based Access Control, 1995 (http://hissa.ncsl.nist.gov/rbac/rbacot/titlewkshp.html).
    • (1995) First ACM/NIST Workshop on Role-Based Access Control
    • Barkley, J.1
  • 7
    • 0001843009 scopus 로고    scopus 로고
    • REFEREE: Trust management for web applications
    • (http://www.w3.org/PICS/TrustMgt/doc/referee-WWW6.html)
    • Chu Y., Feigenbaum J., LaMacchia B., Resnick P., Strauss M. REFEREE: trust management for web applications. Journal of World Wide Web. 2:1997;127-139. (http://www.w3.org/PICS/TrustMgt/doc/referee-WWW6.html).
    • (1997) Journal of World Wide Web , vol.2 , pp. 127-139
    • Chu, Y.1    Feigenbaum, J.2    LaMacchia, B.3    Resnick, P.4    Strauss, M.5
  • 15
    • 84947756793 scopus 로고    scopus 로고
    • Reasoning about security: A logic and a decision method for role based access control
    • in: Proceedings of the International Joint Conference on Qualitative and Quantitative Practical Reasoning (ECSQARU/FAPR-97)
    • F. Massacci, Reasoning about security: a logic and a decision method for role based access control, in: Proceedings of the International Joint Conference on Qualitative and Quantitative Practical Reasoning (ECSQARU/FAPR-97), Lecture Notes in Artificial Intelligence, vol 1244, 1997, pp. 421-435.
    • (1997) Lecture Notes in Artificial Intelligence , vol.1244 , pp. 421-435
    • Massacci, F.1
  • 18
    • 0028726831 scopus 로고
    • Policy driven management for distributed systems
    • Sloman M. Policy driven management for distributed systems. Journal of Network and Systems Management. 2:(4):1994;333-360.
    • (1994) Journal of Network and Systems Management , vol.2 , Issue.4 , pp. 333-360
    • Sloman, M.1
  • 19
    • 0031338080 scopus 로고    scopus 로고
    • Using digital credentials on the world-wide web
    • (http://drl.cs.uiuc.edu/pubs/jcs97.ps)
    • Winslett M., Ching N., Jones V., Slepchin I. Using digital credentials on the world-wide web. Journal of Computer Security. 5:(3):1997;255-267. (http://drl.cs.uiuc.edu/pubs/jcs97.ps).
    • (1997) Journal of Computer Security , vol.5 , Issue.3 , pp. 255-267
    • Winslett, M.1    Ching, N.2    Jones, V.3    Slepchin, I.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.