메뉴 건너뛰기




Volumn 43, Issue 3, 2002, Pages 281-292

Wrappers - A mechanism to support state-based authorisation in Web applications

Author keywords

Access control; Application security; State based authorisation; Web security; Wrappers

Indexed keywords

COMPUTER APPLICATIONS; COMPUTER SOFTWARE; CONTEXT SENSITIVE GRAMMARS; SEMANTICS; WORLD WIDE WEB;

EID: 0036887432     PISSN: 0169023X     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0169-023X(02)00129-5     Document Type: Conference Paper
Times cited : (3)

References (16)
  • 1
    • 0002539153 scopus 로고    scopus 로고
    • An extended petri net model for supporting workflow in a multilevel secure environment
    • P. Samarati, R.S. Sandhu (Eds.), Chapman and Hall, London
    • Atluri V., Huang W.K. An extended petri net model for supporting workflow in a multilevel secure environment. Samarati P., Sandhu R.S. Database Security X: Status and Prospects. 1997;240-258 Chapman and Hall, London.
    • (1997) Database Security X: Status and Prospects , pp. 240-258
    • Atluri, V.1    Huang, W.K.2
  • 2
    • 0028016985 scopus 로고
    • About the enforcement of state dependent security specifications
    • T.F. Keefe, C.E. Landwehr (Eds.), Elsevier, Amsterdam
    • Biskup J., Eckert C. About the enforcement of state dependent security specifications. Keefe T.F., Landwehr C.E. Database Security VII: Status and Prospects. 1994;3-17 Elsevier, Amsterdam.
    • (1994) Database Security VII: Status and Prospects , pp. 3-17
    • Biskup, J.1    Eckert, C.2
  • 6
    • 84949751564 scopus 로고    scopus 로고
    • Security for mobile agents: Authentication and state appraisal
    • 4th European Symp. on Research in Computer Security
    • W.M. Farmer, J.D. Guttman, V. Swurp, Security for mobile agents: Authentication and state appraisal, in: 4th European Symp. on Research in Computer Security, LNCS vol.1146, 1997, pp. 118-130.
    • (1997) LNCS , vol.1146 , pp. 118-130
    • Farmer, W.M.1    Guttman, J.D.2    Swurp, V.3
  • 7
    • 0033329699 scopus 로고    scopus 로고
    • Modelling, specifying and implementing workflow security in cyberspace
    • Gudes E., Olivier M.S., van de Riet R.P., Modelling, specifying and implementing workflow security in cyberspace. Journal of Computer Security. 7(4):1999;287-315.
    • (1999) Journal of Computer Security , vol.7 , Issue.4 , pp. 287-315
    • Gudes, E.1    Olivier, M.S.2    Van de Riet, R.P.3
  • 15
    • 0010574338 scopus 로고    scopus 로고
    • Designing security agents for the DOK federated system
    • T.Y. Lin, S. Qian (Eds.), Chapman and Hall, London
    • Tari Z. Designing security agents for the DOK federated system. Lin T.Y., Qian S. Database Security XI: Status and Prospects. 1998;35-59 Chapman and Hall, London.
    • (1998) Database Security XI: Status and Prospects , pp. 35-59
    • Tari, Z.1
  • 16
    • 0002851150 scopus 로고    scopus 로고
    • Web implementation of a security mediator for medical databases
    • T.Y. Lin, S. Qian (Eds.), Chapman and Hall, London
    • Wiederhold G., Billelo M., Donahue C. Web implementation of a security mediator for medical databases. Lin T.Y., Qian S. Database Security XI: Status and Prospects. 1998;60-67 Chapman and Hall, London.
    • (1998) Database Security XI: Status and Prospects , pp. 60-67
    • Wiederhold, G.1    Billelo, M.2    Donahue, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.