메뉴 건너뛰기




Volumn 6, Issue 1, 2003, Pages 128-171

Delegation logic: A logic-based approach to distributed authorization

Author keywords

Access control; Delegation Logic; Distributed system security; Logic programs; Trust management

Indexed keywords

ACCESS CONTROL; DISTRIBUTED SYSTEM SECURITY; TRUST MANAGEMENT;

EID: 0041524661     PISSN: 10949224     EISSN: None     Source Type: Journal    
DOI: 10.1145/605434.605438     Document Type: Article
Times cited : (294)

References (42)
  • 1
    • 0031637195 scopus 로고    scopus 로고
    • On SDSI's linked local name spaces
    • ABADI. M. 1998. On SDSI's linked local name spaces. J. Comput. Secu. 6, 1/2 (Jan./Feb.), 3-21.
    • (1998) J. Comput. Secu. , vol.6 , Issue.1-2 JAN.-FEB. , pp. 3-21
    • Abadi, M.1
  • 3
    • 0031641091 scopus 로고    scopus 로고
    • On the structure of delegation networks
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • AURA, T. 1998. On the structure of delegation networks. In Proceedings of the IEEE Computer Security Foundations Workshop (CSFW-11) (June). IEEE Computer Society Press, Los Alamitos, Calif., pp. 14-26.
    • (1998) Proceedings of the IEEE Computer Security Foundations Workshop (CSFW-11) , Issue.JUNE , pp. 14-26
    • Aura, T.1
  • 4
    • 19244381332 scopus 로고
    • Logic programming and knowledge representation
    • BARAL C. AND GELFOND, M. 1994. Logic programming and knowledge representation. J. Logic Prog. 19/20 (May/July), 73-148.
    • (1994) J. Logic Prog. , Issue.19-20 MAY-JULY , pp. 73-148
    • Baral, C.1    Gelfond, M.2
  • 6
    • 0003226048 scopus 로고    scopus 로고
    • The keynote trust-management system, version 2
    • September 1999
    • BLAZE, M., FEIGENBAUM J., IOANNIDIS J., AND KEROMYTIS, A. D. 1999a. The KeyNote trust-management system, version 2. IETP RFC 2704, September 1999.
    • (1999) IETP RFC , vol.2704
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.D.4
  • 7
    • 84982899264 scopus 로고    scopus 로고
    • The role of trust management in distributed systems
    • Lecture Notes in Computer Science, . Springer, Berlin
    • BLAZE, M., FEIGENBAUM, J., IOANNIDIS, J., AND KEROMYTIS, A. D. 1999b. The role of trust management in distributed systems. In Secure Internet Programming, Lecture Notes in Computer Science, 1603. Springer, Berlin, pp. 185-210.
    • (1999) Secure Internet Programming , vol.1603 , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.D.4
  • 10
    • 3142653138 scopus 로고
    • Consultation Committee, International Telephone and Telegraph, International Telecommunications Union, Geneva
    • CCITT. 1989. Recommendation X.509: The Directory-Authentication Framework. Consultation Committee, International Telephone and Telegraph, International Telecommunications Union, Geneva.
    • (1989) Recommendation X.509: The Directory-authentication Framework
  • 11
    • 0029695436 scopus 로고    scopus 로고
    • Tabled evaluation with delaying for general logic programs
    • CHEN W. AND WARREN, D. S. 1996. Tabled evaluation with delaying for general logic programs. J. ACM 43, 1 (Jan.), 20-74.
    • (1996) J. ACM , vol.43 , Issue.1 JAN. , pp. 20-74
    • Chen, W.1    Warren, D.S.2
  • 14
    • 0036083264 scopus 로고    scopus 로고
    • Binder, a logic-based security language
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • DETREVILLE, J. 2002. Binder, a logic-based security language. In Proceedings of the IEEE Symposium on Security and Privacy (May). IEEE Computer Society Press, Los Alamitos, Calif., pp. 105-113.
    • (2002) Proceedings of the IEEE Symposium on Security and Privacy , Issue.MAY , pp. 105-113
    • Detreville, J.1
  • 17
    • 84862379039 scopus 로고    scopus 로고
    • Post to cypherpunks mailing list. May1996
    • FINNEY, H. 1996. Transitive trust and MLM. Post to cypherpunks mailing list, archived at http://www.inet-one.com/cypherpunks/dir.1996.05.02-1996.05.08/ msg00415.html.May1996.
    • (1996) Transitive Trust and MLM
    • Finney, H.1
  • 18
    • 0035067717 scopus 로고    scopus 로고
    • A logic for SDSI's linked local named spaces
    • HALPERN J. AND VAN DER MEYDEN, R. 2001. A logic for SDSI's linked local named spaces. J. Comput. Secu. 9, 1/2 (Feb./May), 47-74.
    • (2001) J. Comput. Secu. , vol.9 , Issue.1-2 FEB.-MAY , pp. 47-74
    • Halpern, J.1    Van Der Meyden, R.2
  • 19
    • 0033724294 scopus 로고    scopus 로고
    • Access control meets public key infrastructure, or: Assigning roles to strangers
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • HERZBERG, A., MASS, Y., MIHAELI, J., NAOR, D., AND RAVID, Y. 2000. Access control meets public key infrastructure, or: Assigning roles to strangers. In Proceedings of the IEEE Symposium on Security and Privacy (May). IEEE Computer Society Press, Los Alamitos, Calif., pp. 2-14.
    • (2000) Proceedings of the IEEE Symposium on Security and Privacy , Issue.MAY , pp. 2-14
    • Herzberg, A.1    Mass, Y.2    Mihaeli, J.3    Naor, D.4    Ravid, Y.5
  • 23
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A trust management system with certified evaluation
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • JIM, T. 2001. SD3: A trust management system with certified evaluation. In Proceedings of the IEEE Symposium on Security and Privacy (May). IEEE Computer Society Press, Los Alamitos, Calif., pp. 106-115.
    • (2001) Proceedings of the IEEE Symposium on Security and Privacy , Issue.MAY , pp. 106-115
    • Jim, T.1
  • 24
    • 0040268965 scopus 로고
    • Internet privacy enhanced mail
    • KENT, S. T. 1993. Internet privacy enhanced mail. Comm. ACM. 36, 8 (Aug.), 48-60.
    • (1993) Comm. ACM , vol.36 , Issue.8 AUG. , pp. 48-60
    • Kent, S.T.1
  • 25
    • 84976834054 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • LAMPSON, B., ABADI, M., BURROWS, M., AND WOBBER, E. 1992. Authentication in distributed systems: theory and practice. ACM Trans. Comput. Systems 10, 4 (Nov.), 265-310.
    • (1992) ACM Trans. Comput. Systems , vol.10 , Issue.4 NOV. , pp. 265-310
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 26
    • 18844373775 scopus 로고    scopus 로고
    • A P3P preference exchange language 1.0 (APPEL1.0)
    • April 2002
    • LANGHEINRTCH, M. 2002. A P3P Preference Exchange Language 1.0 (APPEL1.0). W3C Working Draft, April 2002.
    • (2002) W3C Working Draft
    • Langheinrtch, M.1
  • 30
    • 0032671779 scopus 로고    scopus 로고
    • A logic-based knowledge representation for authorization with delegation
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • LI, N., FEIGENBAUM, J., AND GROSOF, B. N. 1999. A logic-based knowledge representation for authorization with delegation (extended abstract). In Proceedings of the IEEE Computer Security Foundations Workshop (CSFW-12) (June). IEEE Computer Society Press, Los Alamitos, Calif., pp. 162-174.
    • (1999) Proceedings of the IEEE Computer Security Foundations Workshop (CSFW-12) , Issue.JUNE , pp. 162-174
    • Li, N.1    Feigenbaum, J.2    Grosof, B.N.3
  • 31
    • 0033718059 scopus 로고    scopus 로고
    • A practically implementable and tractable delegation logic
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • LI, N., GROSOF, B. N., AND FEIGENBAUM, J. 2000. A practically implementable and tractable Delegation Logic. In Proceedings of the IEEE Symposium on Security and Privacy (May). IEEE Computer Society Press, Los Alamitos, Calif., pp. 27-42..
    • (2000) Proceedings of the IEEE Symposium on Security and Privacy , Issue.MAY , pp. 27-42
    • Li, N.1    Grosof, B.N.2    Feigenbaum, J.3
  • 32
    • 0036085965 scopus 로고    scopus 로고
    • Design of a role-based trust management framework
    • EEEE Computer Society Press, Los Alamitos, Calif.
    • LI, N., MITCHELL, J. C., AND WINSBOROUGH, W. H. 2002. Design of a role-based trust management framework. In Proceedings of the IEEE Symposium on Security and Privacy (May). EEEE Computer Society Press, Los Alamitos, Calif., pp. 114-130.
    • (2002) Proceedings of the IEEE Symposium on Security and Privacy , Issue.MAY , pp. 114-130
    • Li, N.1    Mitchell, J.C.2    Winsborough, W.H.3
  • 33
    • 0035751908 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • To appear. Extended abstract appeared in Proceedings of the ACM Conference on Computer and Communications Security (Nov, 2001). ACM Press, New York, NY
    • LI, N., WINSBOROUGH, W. H., AND MITCHELL, J. C. 2003. Distributed credential chain discovery in trust management. J. Comput. Secu. To appear. Extended abstract appeared in Proceedings of the ACM Conference on Computer and Communications Security (Nov, 2001). ACM Press, New York, NY, pp. 156-165.
    • (2003) J. Comput. Secu. , pp. 156-165
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 35
    • 2942654159 scopus 로고    scopus 로고
    • The platform for privacy preferences 1.0 (P3P1.0) specification
    • April
    • MARCHIORI, M. 2002. The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. W3C Recommendation. April.
    • (2002) W3C Recommendation
    • Marchiori, M.1
  • 36
    • 84947294004 scopus 로고    scopus 로고
    • Modelling a public-key infrastructure
    • Lecture Notes in Computer Science. Springer, Berlin
    • MAUHER, U. 1997. Modelling a public-key infrastructure. In Proceedings of the European Symposium on Research in Computer Security. Lecture Notes in Computer Science, 1146. Springer, Berlin, pp. 325-350.
    • (1997) Proceedings of the European Symposium on Research in Computer Security , vol.1146 , pp. 325-350
    • Mauher, U.1
  • 37
    • 0345065437 scopus 로고
    • Types and the intended meaning of logic programs
    • F. Pfenning, editor, . The MIT Press, Cambridge, Mass.
    • NAISH, L. 1992. Types and the intended meaning of logic programs. In F. Pfenning, editor, Types in Logic Programming. The MIT Press, Cambridge, Mass., pp. 189-216.
    • (1992) Types in Logic Programming , pp. 189-216
    • Naish, L.1
  • 38
    • 0003519508 scopus 로고    scopus 로고
    • BATCS monographs on Theoretical Computer Science. Springer Berlin
    • PADAWITZ, P. 1998. Computing in Horn Clause Theories. BATCS monographs on Theoretical Computer Science, vol. 16. Springer Berlin.
    • (1998) Computing in Horn Clause Theories , vol.16
    • Padawitz, P.1
  • 39
    • 0004084951 scopus 로고
    • Logic Programming Series. The MIT Press, Cambridge, Mass
    • PFENNING, F. ED. 1992. Types in Logic Programming, Logic Programming Series. The MIT Press, Cambridge, Mass.
    • (1992) Types in Logic Programming
    • Pfenning, F.1
  • 41
    • 0034835799 scopus 로고    scopus 로고
    • Understanding trust management systems
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • WEEKS, S. 2001. Understanding trust management systems. In Proceedings of the IEEE Symposium on Security and Privacy (May). IEEE Computer Society Press, Los Alamitos, Calif., pp 94-105.
    • (2001) Proceedings of the IEEE Symposium on Security and Privacy , Issue.MAY , pp. 94-105
    • Weeks, S.1
  • 42
    • 84862379769 scopus 로고    scopus 로고
    • THE XSB RESEARCH GROUP. 2002. The XSB programming system, http://xsb.sourceforge.net/.
    • (2002) The XSB Programming System


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.