메뉴 건너뛰기




Volumn 10, Issue 5, 2002, Pages 225-236

Information flow analysis on role-based access control model

Author keywords

Access control; Information systems; Object oriented computing; Security

Indexed keywords

ALGORITHMS; AUTONOMOUS AGENTS; COMPUTER SIMULATION; DISTRIBUTED COMPUTER SYSTEMS; ELECTRONIC COMMERCE; INFORMATION DISSEMINATION; OBJECT ORIENTED PROGRAMMING; SECURITY OF DATA;

EID: 0036434226     PISSN: 09685227     EISSN: None     Source Type: Journal    
DOI: 10.1108/09685220210446579     Document Type: Article
Times cited : (15)

References (18)
  • 2
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Denning, D.E. (1976), "A lattice model of secure information flow", Communications of the ACM, Vol. 19, No. 5, pp. 236-43.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 3
    • 0017517624 scopus 로고    scopus 로고
    • Certification of programs for secure information flow
    • Dennning, D.E. and Denning, P.J. (1997), "Certification of programs for secure information flow", Communications of the ACM, Vol. 20, No. 7, pp. 504-13.
    • (1997) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Dennning, D.E.1    Denning, P.J.2
  • 5
    • 0025065897 scopus 로고
    • Integrating an object-oriented data model with multilevel security
    • IEEE Computer Society Press, Piscataway, NJ
    • Jajodia, S. and Kogan, B. "Integrating an object-oriented data model with multilevel security", Proceedings of 1990 Symposium on Res. in Security and Privacy, IEEE Computer Society Press, Piscataway, NJ, pp. 76-85.
    • (1990) Proceedings of 1990 Symposium on Res. in Security and Privacy , pp. 76-85
    • Jajodia, S.1    Kogan, B.2
  • 6
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Lampson, B.W. (1973) "A note on the confinement problem", Communications of ACM, Vol. 16 No. 10, pp. 613-5.
    • (1973) Communications of ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 8
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • Osborn, S., Sandhu, R. and Munawer (2000) "Configuring role-based access control to enforce mandatory and discretionary access control policies", ACM Transactions on Information and System Security, Vol. 3 No. 2, pp. 85-106.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer3
  • 9
    • 0034545418 scopus 로고    scopus 로고
    • Information flow in inference for free
    • New York, NY
    • Potter, F. and conchon, S. (2000) "Information flow in inference for free", ICFP00, ACM, New York, NY, pp. 46-57.
    • (2000) ICFP00, ACM , pp. 46-57
    • Potter, F.1    Conchon, S.2
  • 10
    • 50249183308 scopus 로고    scopus 로고
    • Role hierarchies and constraints for lattice, based access control
    • Springer Verlag, Lecture Notes 1146
    • Sandhu, R. (1996c) "Role hierarchies and constraints for lattice, based access control", Computer Security-ESORICS 96, Springer Verlag, Lecture Notes 1146, pp. 65-79.
    • (1996) Computer Security-ESORICS 96 , pp. 65-79
    • Sandhu, R.1
  • 16
    • 85010799770 scopus 로고    scopus 로고
    • UML Resource Center (n.dd.), United Modeling Language, UML Resource Center
    • UML Resource Center (n.dd.), United Modeling Language, UML Resource Center, available at: www.rational.com/UML/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.