메뉴 건너뛰기




Volumn 43, Issue 3, 2003, Pages 40-49

Integrating object oriented role-based access control model with mandatory access control principles

Author keywords

Confinement Problem; DAC; Information Flow Analysis; MAC; Message Filtering Algorithm; Object Oriented Role based Access Control Model (ORBAC); RBAC

Indexed keywords

ROLE BASED ACCESS CONTROL (RBAC);

EID: 0037903723     PISSN: 08874417     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (3)

References (21)
  • 1
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • Lampson, B.W. "A Note on the Confinement Problem," Communications of ACM, 16:10, 1973, pp. 613-615.
    • (1973) Communications of ACM , vol.16 , Issue.10 , pp. 613-615
    • Lampson, B.W.1
  • 2
    • 0017517624 scopus 로고
    • Certification of programs for secure information flow
    • July
    • Denning, D.E. and P.J. Denning. "Certification of Programs for Secure Information Flow," Communications of ACM, 20:7, July 1977, pp. 504-513.
    • (1977) Communications of ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 3
    • 0025065897 scopus 로고
    • Integrating an object-oriented data model with multilevel security
    • IEEE Computer Society Press, May
    • Jajodia, S. and B. Kogan. "Integrating an Object-oriented Data Model with Multilevel Security." In Proc. 1990 Symposium on Research in Security & Privacy, IEEE Computer Society Press, May 1990, pp. 76-85.
    • (1990) Proc. 1990 Symposium on Research in Security & Privacy , pp. 76-85
    • Jajodia, S.1    Kogan, B.2
  • 7
    • 0031341651 scopus 로고    scopus 로고
    • The ARBAC97 model for role-based administration of roles: Preliminary description and outline
    • Fairfax, Virginia, November
    • Sandhu, R. and V. Bhamidipati. "The ARBAC97 Model for Role-based Administration of Roles: Preliminary Description and Outline," Second ACM Workshop on Role-based Access Control, Fairfax, Virginia, November 1997, pp. 41-54.
    • (1997) Second ACM Workshop on Role-based Access Control , pp. 41-54
    • Sandhu, R.1    Bhamidipati, V.2
  • 8
    • 0031379041 scopus 로고    scopus 로고
    • A role-based access control model for protection domain derivation and management
    • Fairfax, Virginia, November
    • Jaeger, T. and Federquegiraud. "A Role-based Access Control Model for Protection Domain Derivation and Management," Second ACM Workshop on Role-based Access Control, Fairfax, Virginia, November 1997, pp. 95-108.
    • (1997) Second ACM Workshop on Role-based Access Control , pp. 95-108
    • Jaeger, T.1    Federquegiraud2
  • 10
    • 71449117058 scopus 로고    scopus 로고
    • An object-oriented RBAC model for distributed systems
    • WICSA 2001, The Netherlands, August
    • Zhang, C.N. and C. Yang. "An Object-oriented RBAC Model for Distributed Systems," 2001 IEEE/IFIP Conference on Software Architecture, WICSA 2001, The Netherlands, August 2001, pp. 24-32.
    • (2001) 2001 IEEE/IFIP Conference on Software Architecture , pp. 24-32
    • Zhang, C.N.1    Yang, C.2
  • 12
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • Osborn, S., R. Sandhu and Munawer. "Configuring Role-based Access Control to Enforce Mandatory and Discretionary Access Control Policies," ACM Transaction on Information and System Security, 3:2, 2000, pp. 85-106.
    • (2000) ACM Transaction on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer3
  • 13
    • 50249183308 scopus 로고    scopus 로고
    • Role hierarchies and constraints for lattice-based access control
    • Computer Security-ESORICS, 96, Springer-Verlag
    • Sandhu, R. "Role Hierarchies and Constraints for Lattice-based Access Control," Computer Security-ESORICS, 96. Springer-Verlag, 1996, Lecture Notes 1146, pp. 65-79.
    • (1996) Lecture Notes , vol.1146 , pp. 65-79
    • Sandhu, R.1
  • 15
    • 84876661880 scopus 로고    scopus 로고
    • UML Resource Center
    • United Modeling Language. UML Resource Center, http:// www.rational.com.
    • United Modeling Language
  • 16
    • 0036851073 scopus 로고    scopus 로고
    • Designing of a complete model of object-oriented role-based access control system for distributed networks
    • accepted and will be published in September
    • Zhang, C.N. and C. Yang. "Designing of a Complete Model of Object-oriented Role-based Access Control System for Distributed Networks," Journal of Information Science and Engineering (JISE), accepted and will be published in September 2002.
    • (2002) Journal of Information Science and Engineering (JISE)
    • Zhang, C.N.1    Yang, C.2
  • 17
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • Denning, D.E. "A Lattice Model of Secure Information Flow," Communication of the ACM, 19:5, May 1976, pp. 236-243.
    • (1976) Communication of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 18
    • 84870374862 scopus 로고    scopus 로고
    • Information flow in inference for free
    • Potter, F. and S. Conchon. "Information Flow in Inference for Free," ICFP00, ACM, 2000, pp. 45-57.
    • (2000) ICFP00, ACM , pp. 45-57
    • Potter, F.1    Conchon, S.2
  • 19
    • 0034835461 scopus 로고    scopus 로고
    • A new type system for secure information flow
    • Cape Breton, Nova Scotia, June 2001, IEEE
    • Smith, G. "A New Type System for Secure Information Flow," Proc. 14th IEEE Computer Security Foundations Workshop, Cape Breton, Nova Scotia, June 2001, IEEE, 2001, pp. 115-125.
    • (2001) Proc. 14th IEEE Computer Security Foundations Workshop , pp. 115-125
    • Smith, G.1
  • 21
    • 0025065897 scopus 로고
    • Integrating an object-oriented data model with multilevel security
    • Oakland, CA, May
    • Jajodia, S. and B. Kogan. "Integrating an Object-oriented Data Model with Multilevel Security," Proc. IEEE Symp. On Security and Privacy, Oakland, CA, May 1990.
    • (1990) Proc. IEEE Symp. On Security and Privacy
    • Jajodia, S.1    Kogan, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.