메뉴 건너뛰기




Volumn , Issue , 2003, Pages 80-89

On context in authorization policy

Author keywords

Authorization; Context; Distributed systems; Policy; Policy oriented programming; Security requirements

Indexed keywords

ALGORITHMS; COMPUTER PROGRAMMING; DISTRIBUTED COMPUTER SYSTEMS; INFORMATION MANAGEMENT; SEMANTICS; USER INTERFACES; XML;

EID: 0242456739     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/775418.775422     Document Type: Conference Paper
Times cited : (53)

References (30)
  • 1
    • 84865788031 scopus 로고    scopus 로고
    • A model of OASIS role-based access control and its support for active security
    • November
    • Jean Bacon, Ken Moody, and Walt Yao. A Model of OASIS Role-Based Access Control and its Support for Active Security. ACM Transactions on Information and System Security, 5(4):492-540, November 2002.
    • (2002) ACM Transactions on Information and System Security , vol.5 , Issue.4 , pp. 492-540
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 2
    • 0003400257 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • Technical Report M74-244, MITRE Corperation, Bedford, MA
    • D. Bell and L. LaPadula. Secure Computer Systems: Mathematical Foundations and Model. Technical Report M74-244, MITRE Corperation, Bedford, MA, 1973.
    • (1973)
    • Bell, D.1    LaPadula, L.2
  • 3
    • 0032203011 scopus 로고    scopus 로고
    • Coyote: A system for constructing fine-grain configurable communication services
    • November
    • Nina T. Bhatti, Matti A. Hiltunen, Richard D. Schlichting, and Wanda Chiu. Coyote: A System for Constructing Fine-Grain Configurable Communication Services. ACM Transactions on Computer Systems, 16(4):321-366, November 1998.
    • (1998) ACM Transactions on Computer Systems , vol.16 , Issue.4 , pp. 321-366
    • Bhatti, N.T.1    Hiltunen, M.A.2    Schlichting, R.D.3    Chiu, W.4
  • 5
    • 84982899264 scopus 로고    scopus 로고
    • The role of trust management in distributed systems security
    • Springer-Verlag Lecture Notes in Computer Science State-of-the-Art series; New York, NY
    • M. Blaze, J. Feigenbaum, John Ioannidis, and A. Keromytis. The Role of Trust Management in Distributed Systems Security. In Secure Internet Programming: Issues in Distributed and Mobile Object Systems, volume 1603, pages 185-210. Springer-Verlag Lecture Notes in Computer Science State-of-the-Art series, 1999. New York, NY.
    • (1999) Secure Internet Programming: Issues in Distributed and Mobile Object Systems , vol.1603 , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.4
  • 7
    • 0004078695 scopus 로고    scopus 로고
    • The keynote trust management system - Version 2
    • Internet Engineering Task Force, September; RFC 2704
    • M. Blaze, J. Feigbaum, J. Ioannidis, and K. Keromytis. The KeyNote Trust Management System - Version 2. Internet Engineering Task Force, September 1999. RFC 2704.
    • (1999)
    • Blaze, M.1    Feigbaum, J.2    Ioannidis, J.3    Keromytis, K.4
  • 12
    • 0242655795 scopus 로고    scopus 로고
    • Personal communication, December
    • John Ioannidis. Personal communication, December 2002.
    • (2002)
    • Ioannidis, J.1
  • 15
    • 4243223201 scopus 로고    scopus 로고
    • Antigone secure group communication system
    • NASA Tech Briefs; (to appear)
    • P. McDaniel and A. Prakash. Antigone Secure Group Communication System. NASA Tech Briefs, 2001. (to appear).
    • (2001)
    • McDaniel, P.1    Prakash, A.2
  • 16
    • 0036086451 scopus 로고    scopus 로고
    • Methods and limitations of security policy reconciliation
    • IEEE, MAY 2002. Oakland, California
    • P. McDaniel and A. Prakash. Methods and Limitations of Security Policy Reconciliation. In 2002 IEEE Symposium on Security and Privacy, pages 73-87. IEEE, MAY 2002. Oakland, California.
    • 2002 IEEE Symposium on Security and Privacy , pp. 73-87
    • McDaniel, P.1    Prakash, A.2
  • 19
    • 0004144799 scopus 로고    scopus 로고
    • Policy core information model - Version 1 specification
    • Internet Engineering Task Force, February; RFC 3060
    • B. Moore, E. Elleson, J. Strassner, and A. Westerinen. Policy Core Information Model - Version 1 Specification. Internet Engineering Task Force, February 2001. RFC 3060.
    • (2001)
    • Moore, B.1    Elleson, E.2    Strassner, J.3    Westerinen, A.4
  • 22
    • 84962274513 scopus 로고    scopus 로고
    • Representation and evaluation of security policies for distributed system services
    • Hilton Head, South Carolina, January; DARPA
    • R. Ryutov and C. Neuman. Representation and Evaluation of Security Policies for Distributed System Services. In Proceedings of DARPA Information Survivability Conference and Exposition, pages 172-183, Hilton Head, South Carolina, January 2000. DARPA.
    • (2000) Proceedings of DARPA Information Survivability Conference and Exposition , pp. 172-183
    • Ryutov, R.1    Neuman, C.2
  • 23
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • Ravi S. Sandhu. Lattice-based access control models. IEEE Computer, 26(11):9-19, 1993.
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 25
    • 0028513932 scopus 로고
    • Access control: Principles and practice
    • Ravi S. Sandhu and Pierrangela Samarati. Access Control: Principles and Practice. IEEE Communications Magazine, 32(9):40-48, 1994.
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.S.1    Samarati, P.2
  • 27
    • 0002635155 scopus 로고
    • CORBA: Integrating diverse applications within distributed heterogeneous environments
    • February
    • Steve Vinoski. CORBA: Integrating Diverse Applications Within Distributed Heterogeneous Environments. IEEE Communications Magazine, 14(2), February 1994.
    • (1994) IEEE Communications Magazine , vol.14 , Issue.2
    • Vinoski, S.1
  • 29
    • 0004030103 scopus 로고
    • Lightweight directory access protocol
    • Internet Engineering Task Force, March; RFC 1777
    • W. Yeong, T. Howes, and S. Kille. Lightweight Directory Access Protocol. Internet Engineering Task Force, March 1995. RFC 1777.
    • (1995)
    • Yeong, W.1    Howes, T.2    Kille, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.