메뉴 건너뛰기




Volumn , Issue , 2001, Pages 171-181

A model of OASIS role-based access control and its support for active security

Author keywords

Certificates; OASIS; Policy; RBAC; Role based access control; Service level agreements

Indexed keywords

CONSTRAINT THEORY; DATABASE SYSTEMS; OBJECT ORIENTED PROGRAMMING; PARAMETER ESTIMATION;

EID: 0035790651     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/373256.373294     Document Type: Conference Paper
Times cited : (60)

References (24)
  • 6
    • 0031382313 scopus 로고    scopus 로고
    • A flexible model for the specification and enforcement of authorization constraints in workflow management system
    • Fairfax, Virginia, November
    • E. Bertino, E. Ferrari, and V. Alturi. A flexible model for the specification and enforcement of authorization constraints in workflow management system. In Second ACM Workshop on Role-Based Access Control, pages 1-12, Fairfax, Virginia, November 1997.
    • (1997) Second ACM Workshop on Role-Based Access Control , pp. 1-12
    • Bertino, E.1    Ferrari, E.2    Alturi, V.3
  • 8
    • 0002422823 scopus 로고    scopus 로고
    • A role-based access control model and reference implementation within a corporate intranet
    • Feb
    • D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn. A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security, 2(1):34-64, Feb 1999.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.1 , pp. 34-64
    • Ferraiolo, D.F.1    Barkley, J.F.2    Kuhn, D.R.3
  • 9
    • 0031365182 scopus 로고    scopus 로고
    • Role templates for content-based access control
    • Fairfax, Virginia, November
    • L. Giuri and P. Iglio. Role templates for content-based access control. In Second ACM Workshop on Role-Based Access Control, pages 153-159, Fairfax, Virginia, November 1997.
    • (1997) Second ACM Workshop on Role-Based Access Control , pp. 153-159
    • Giuri, L.1    Iglio, P.2
  • 12
    • 84944075856 scopus 로고    scopus 로고
    • An architecture for distributed OASIS services
    • New York, NY, April
    • J. Hine, W. Yao, J. Bacon, and K. Moody. An architecture for distributed OASIS services. In Middleware 2000, pages 104-120, New York, NY, April 2000.
    • (2000) Middleware 2000 , pp. 104-120
    • Hine, J.1    Yao, W.2    Bacon, J.3    Moody, K.4
  • 13
    • 0031346670 scopus 로고    scopus 로고
    • Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems
    • Fairfax, Virginia, November. ACM
    • D. R. Kuhn. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. In Second ACM Workshop on Role-Based Access Control, pages 23-30, Fairfax, Virginia, November 1997. ACM.
    • (1997) Second ACM Workshop on Role-Based Access Control , pp. 23-30
    • Kuhn, D.R.1
  • 14
    • 0013241517 scopus 로고    scopus 로고
    • Control principles and access right inheritance through role hierarchies
    • Fairfax, Virginia, October
    • J. D. Moffett. Control principles and access right inheritance through role hierarchies. In Third ACM Workshop on Role-Based Access Control, pages 63-69, Fairfax, Virginia, October 1998.
    • (1998) Third ACM Workshop on Role-Based Access Control , pp. 63-69
    • Moffett, J.D.1
  • 15
  • 16
    • 0010573970 scopus 로고
    • Access rights administration in rote-based security systems
    • J. Biskup, M. Morgernstern, and C. Landwehr, editors
    • M. Nyanchama and S. Osborn. Access rights administration in rote-based security systems. In J. Biskup, M. Morgernstern, and C. Landwehr, editors, Database Security VIII: Status and Prospects, 1995.
    • (1995) Database Security VIII: Status and Prospects
    • Nyanchama, M.1    Osborn, S.2
  • 18
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • J. Saltzer and M. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, September 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 21
    • 0030644642 scopus 로고    scopus 로고
    • Separation of duty in role-based environments
    • Rockport, Massachusetts, June
    • R. T. Simon and M. E. Zurko. Separation of duty in role-based environments. In 10th IEEE Computer Security Foundations Workshop, pages 183-194, Rockport, Massachusetts, June 1997.
    • (1997) 10th IEEE Computer Security Foundations Workshop , pp. 183-194
    • Simon, R.T.1    Zurko, M.E.2
  • 22
    • 0031387996 scopus 로고    scopus 로고
    • Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments
    • Fairfax, Virginia, November
    • R. K. Thomas. Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments. In Second ACM Workshop on Role-Based Access Control, pages 13-19, Fairfax, Virginia, November 1997.
    • (1997) Second ACM Workshop on Role-Based Access Control , pp. 13-19
    • Thomas, R.K.1
  • 23
    • 0002841051 scopus 로고    scopus 로고
    • Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management
    • Lake Tahoe, California, August
    • R. K. Thomas and R. S. Sandhu. Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. In IFIP WG 11.3 Workshop on Database Security, Lake Tahoe, California, August 1997.
    • (1997) IFIP WG 11.3 Workshop on Database Security
    • Thomas, R.K.1    Sandhu, R.S.2
  • 24
    • 0032620331 scopus 로고    scopus 로고
    • Team-and-role-based organizational context and access control for cooperative hypermedia environments
    • February
    • W. Wang. Team-and-role-based organizational context and access control for cooperative hypermedia environments. In ACM Hypertext'99, February 1999.
    • (1999) ACM Hypertext'99
    • Wang, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.