메뉴 건너뛰기




Volumn 6, Issue 1, 2003, Pages 71-127

A logical framework for reasoning about access control models

Author keywords

Access control framework; Access control models analysis; Logic programming

Indexed keywords

ACCESS CONTROL MODELS; DATABASE ADMINISTRATION; MODEL SPECIFICATION;

EID: 0041524664     PISSN: 10949224     EISSN: None     Source Type: Journal    
DOI: 10.1145/605434.605437     Document Type: Article
Times cited : (143)

References (43)
  • 1
    • 0036510173 scopus 로고    scopus 로고
    • A content-based authorization model for digital libraries
    • ADAM, N., ATLURT, V., BERTINO, B., AND FERRARI, E. 2002. A Content-Based Authorization Model for Digital Libraries. IEEE Trans. Knowl. Data Eng. 14, 2 (March/April), 296-315.
    • (2002) IEEE Trans. Knowl. Data Eng. , vol.14 , Issue.2 MARCH-APRIL , pp. 296-315
    • Adam, N.1    Atlurt, V.2    Bertino, B.3    Ferrari, E.4
  • 2
    • 84862389354 scopus 로고    scopus 로고
    • AGG. See http://tfs.cs.tu-berlin.de/agg/docu.html.
  • 4
    • 0033685030 scopus 로고    scopus 로고
    • A petri net based safety analysis of workflow authorization models
    • ATLURI, V. AND HUANG, W. 2000. A Petri Net Based Safety Analysis of Workflow Authorization Models. J. Comput. Secu. 8, 2&3.
    • (2000) J. Comput. Secu. , vol.8 , Issue.2-3
    • Atluri, V.1    Huang, W.2
  • 5
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and multics interpretation
    • Hanscom Air Force Base, Bedford, MA
    • BELL, D. AND PADULA, L. L. 1975. Secure Computer Systems: Unified Exposition and Multics Interpretation. Tech. Rep. ESD-TR-75-306, Hanscom Air Force Base, Bedford, MA.
    • (1975) Tech. Rep. , vol.ESD-TR-75-306
    • Bell, D.1    Padula, L.L.2
  • 6
    • 0032153903 scopus 로고    scopus 로고
    • An access control mechanism supporting periodicity constraints and temporal reasoning
    • BERTINO, E., BETTINI, C., FERRARI, E., AND SAMARATI, P. 1998. An Access Control Mechanism Supporting Periodicity Constraints and Temporal Reasoning. ACM Trans. Database Syst. 23, 3, 231-285.
    • (1998) ACM Trans. Database Syst. , vol.23 , Issue.3 , pp. 231-285
    • Bertino, E.1    Bettini, C.2    Ferrari, E.3    Samarati, P.4
  • 9
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow managenent systems
    • BERTINO, E., FERRARI, E., AND ATLURI, V. 1999. The Specification and Enforcement of Authorization Constraints in Workflow Managenent Systems. ACM Trans. Inform. Syst. Secu. 2, 1, 65-104.
    • (1999) ACM Trans. Inform. Syst. Secu. , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 12
    • 84862389352 scopus 로고    scopus 로고
    • CORAL
    • CORAL. See ftp.cs.wisc.edu/coral/.
  • 13
    • 84862378032 scopus 로고    scopus 로고
    • ECLiPSe
    • ECLiPSe. See http://www-icparc.doc.ic.ac.uk/eclipse/.
  • 15
    • 0028404874 scopus 로고
    • A model for evaluation and administration of security in object-oriented databases
    • FERNANDEZ, E., GUDES, E., AND SONG, H. 1994. A Model for Evaluation and Administration of Security in Object-Oriented Databases. IEEE Trans. Knowl. Data Eng. 6, 275-292.
    • (1994) IEEE Trans. Knowl. Data Eng. , vol.6 , pp. 275-292
    • Fernandez, E.1    Gudes, E.2    Song, H.3
  • 19
    • 0026905476 scopus 로고
    • COMPLEX: An object-oriented logic programming system
    • GRECO, S., LEONE, N., AND RULLO, P. 1992. COMPLEX: An Object-Oriented Logic Programming System. IEEE Trans. Knowl. Data Eng. 4, 72-87.
    • (1992) IEEE Trans. Knowl. Data Eng. , vol.4 , pp. 72-87
    • Greco, S.1    Leone, N.2    Rullo, P.3
  • 21
    • 85006937063 scopus 로고    scopus 로고
    • Practical safety in flexible access control models
    • JAEGER, T. AND TIDSWELL, J. 2001. Practical Safety in Flexible Access Control Models. ACM Trans. Inform. Syst. Secu. 4, 2 (May), 158-190.
    • (2001) ACM Trans. Inform. Syst. Secu. , vol.4 , Issue.2 MAY , pp. 158-190
    • Jaeger, T.1    Tidswell, J.2
  • 29
    • 0026119329 scopus 로고
    • A model of authorization for next-generation database systems
    • RABITTI, F., BERTINO, E., KIM, W., AND WOELK, D. 1991. A Model of Authorization for Next-Generation Database Systems. ACM Trans. Database Syst. 16, 1 (March), 88-131.
    • (1991) ACM Trans. Database Syst. , vol.16 , Issue.1 MARCH , pp. 88-131
    • Rabitti, F.1    Bertino, E.2    Kim, W.3    Woelk, D.4
  • 31
    • 0030216932 scopus 로고    scopus 로고
    • An authorization model for a distributed hypertext system
    • SAMARATI, P., BERTINO, E., AND JAJODIA, S. 1996. An Authorization Model for a Distributed Hypertext System. IEEE Trans. Knowl. Data Eng. 8, 4 (August), 555-562.
    • (1996) IEEE Trans. Knowl. Data Eng. , vol.8 , Issue.4 AUGUST , pp. 555-562
    • Samarati, P.1    Bertino, E.2    Jajodia, S.3
  • 32
    • 84974744165 scopus 로고
    • Expressive power of the schematic protection model
    • SANDHU, R. 1992a. Expressive Power of the Schematic Protection Model. J. Comput. Secu. 1, 1.
    • (1992) J. Comput. Secu. , vol.1 , Issue.1
    • Sandhu, R.1
  • 34
    • 50249183308 scopus 로고    scopus 로고
    • Role hierarchies and constraints for lattice-based access controls
    • E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Number 1146 in Lecture Notes in Computer Science. Rome, Italy
    • SANDHU, R. 1996. Role Hierarchies and Constraints for Lattice-based Access Controls. In Computer Security - Esorics'96, E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Number 1146 in Lecture Notes in Computer Science. Rome, Italy, 65-79.
    • (1996) Computer Security - Esorics'96 , pp. 65-79
    • Sandhu, R.1
  • 35
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • SANDHU, R., COYNE, E., FEINSTEIN, H., AND YOUMAN, C. 1996. Role-Based Access Control Models. IEEE Comput. 29, 2 (February), 38-47.
    • (1996) IEEE Comput. , vol.29 , Issue.2 FEBRUARY , pp. 38-47
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Youman, C.4
  • 39
    • 84862373075 scopus 로고    scopus 로고
    • STRAWBERRY PROLOG. See http://www.dobrev.coin/index.html.
    • Strawberry Prolog
  • 40
    • 0002841051 scopus 로고    scopus 로고
    • Task-based authorization controls (TBAC): Models for active and enterprise-oriented authorization management
    • Lake Tahoe (CA)
    • THOMAS, R. AND SANDHU, R. 1997. Task-Based Authorization Controls (TBAC): Models for Active and Enterprise-Oriented Authorization Management. In Proceedings of the 11th IFIP Working Conference on Database Security. Lake Tahoe (CA), 136-151.
    • (1997) Proceedings of the 11th IFIP Working Conference on Database Security , pp. 136-151
    • Thomas, R.1    Sandhu, R.2
  • 43
    • 84862378031 scopus 로고    scopus 로고
    • XSB
    • XSB. See http://xsb.sourceforge.net/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.