메뉴 건너뛰기




Volumn , Issue , 2003, Pages 302-306

An approach to secure information flow on object oriented role-based access control model

Author keywords

Confinement Problem; Information Flow Analysis; MAC; Message Filtering Algorithm; Object Oriented Role based Access Control Model (ORBAC)

Indexed keywords

ALGORITHMS; INFORMATION ANALYSIS; PROBLEM SOLVING;

EID: 0037661197     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/952532.952594     Document Type: Conference Paper
Times cited : (2)

References (13)
  • 4
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • S.Osbom, R. Sandhu and Munawer, "Configuring Role-based Access Control to enforce Mandatory and discretionary Access Control policies." ACM Transaction on Information and System Security, Vol 3, no. 2, 2000, pp85-106.
    • (2000) ACM Transaction on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osbom, S.1    Sandhu, R.2    Munawer3
  • 5
    • 50249183308 scopus 로고    scopus 로고
    • Role hierarchies and constraints for lattice based access control
    • computer Security-ESORICS 96, Springer Verlag
    • R. Sandhu, "Role Hierarchies and Constraints for Lattice based access control". In computer Security-ESORICS 96, Springer Verlag, 1996, Lecture Notes 1146, pp65-79.
    • (1996) Lecture Notes , vol.1146 , pp. 65-79
    • Sandhu, R.1
  • 7
    • 71449117058 scopus 로고    scopus 로고
    • An object-oriented RBAC model for distributed systems
    • 2001 IEEE/IFIP Conference on software architecture, Netherland, August
    • Chang. N. Zhang and Cungang Yang, "An Object-oriented RBAC Model for Distributed Systems", 2001 IEEE/IFIP Conference on software architecture, WICSA 2001, Netherland, August 2001, pp24-32.
    • (2001) WICSA 2001 , pp. 24-32
    • Zhang, C.N.1    Yang, C.2
  • 8
    • 0036851073 scopus 로고    scopus 로고
    • Designing of a complete model of object oriented role-based access control system for distributed networks
    • accepted and will be published in Nov.
    • Chang. N. Zhang and Cungang Yang, "Designing of a Complete Model of Object Oriented Role-based Access Control System for Distributed Networks", Journal of Information Science and Engineering (JISE), accepted and will be published in Nov. 2002.
    • (2002) Journal of Information Science and Engineering (JISE)
    • Zhang, C.N.1    Yang, C.2
  • 9
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. E. Denning, "A lattice Model of Secure information flow." Communication of the ACM, 19(5), May 1976, pp236-243.
    • (1976) Communication of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 10
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • Uly
    • D. E. Denning and P. J. Denning, "Certification of programs for secure information flow." Communication of ACM, 20(7), Uly, 1977, pp504-513.
    • (1977) Communication of ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 11
    • 0034545418 scopus 로고    scopus 로고
    • Information flow in inference for free
    • ACM
    • Potter, F. and Conchon, "Information flow in inference for free," ICFPOO, ACM, 2000, pp46-57.
    • (2000) ICFPOO , pp. 46-57
    • Potter, F.1    Conchon2
  • 12
    • 0034835461 scopus 로고    scopus 로고
    • A new type system for secure information flow
    • Cape Breton, Nova Scotia, June 2001. IEEE
    • Smith, G., "A new type system for secure information flow", In Proc. 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, June 2001. IEEE, 2001, pp115-125.
    • (2001) Proc. 14th IEEE Computer Security Foundations Workshop , pp. 115-125
    • Smith, G.1
  • 13
    • 0025065897 scopus 로고
    • Integrating an object-oriented data model with multilevel security
    • Oakland, CA, May
    • Jajodia, S. and Kogan B. "Integrating an object-oriented data model with multilevel security," Proc. IEEE Symp. on Sucurity and Privacy, Oakland, CA, May 1990.
    • (1990) Proc. IEEE Symp. on Sucurity and Privacy
    • Jajodia, S.1    Kogan, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.