메뉴 건너뛰기




Volumn , Issue , 2002, Pages 23-30

An access control language for web services

Author keywords

Access control; Web services

Indexed keywords

CLIENT SERVER COMPUTER SYSTEMS; DATABASE SYSTEMS; HTTP; SECURITY OF DATA; WORLD WIDE WEB;

EID: 0242540392     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/507711.507715     Document Type: Conference Paper
Times cited : (45)

References (28)
  • 3
    • 0003400251 scopus 로고
    • Secure computer system: Unified exposition and multics interpretation
    • Technical Report MTR-1997, MITRE, Bedford, MA
    • D. Bell and L. LaPadula. Secure Computer System: Unified Exposition and Multics Interpretation. Technical Report MTR-1997, MITRE, Bedford, MA, 1975.
    • (1975)
    • Bell, D.1    LaPadula, L.2
  • 5
    • 0003400255 scopus 로고
    • Integrity constraints for secure computer systems
    • Technical Report ESD-TR76-372, USAF Electronic System Division, Bedford, Massachusetts, April
    • K. J. Biba, Integrity Constraints for Secure Computer Systems. Technical Report ESD-TR76-372, USAF Electronic System Division, Bedford, Massachusetts, April 1977.
    • (1977)
    • Biba, K.J.1
  • 6
    • 0242697705 scopus 로고
    • How to write a setuid program
    • Jan./Feb.
    • M. Bishop, How to Write a Setuid Program. ;login: The USENIX Association Newsletter, 12(1)5-11, Jan./Feb. 1987.
    • (1987) The USENIX Association Newsletter , vol.12 , Issue.1 , pp. 5-11
    • Bishop, M.1
  • 9
    • 0242445300 scopus 로고    scopus 로고
    • CNet. Microsoft plugs Hotmail security hole; August
    • CNet. Microsoft plugs Hotmail security hole. http://news.cnet.com/news/0-1003-200-6941020.html August 2001.
    • (2001)
  • 12
    • 0016543936 scopus 로고
    • Guarded commands, nondeterminacy and formal derivation of programs
    • Aug
    • E.W. Dijkstra. Guarded Commands, Nondeterminacy and Formal Derivation of Programs. Communication of the ACM, vol. 18, num. 8, 453-457, Aug 1975.
    • (1975) Communication of the ACM , vol.18 , Issue.8 , pp. 453-457
    • Dijkstra, E.W.1
  • 17
    • 0242697708 scopus 로고    scopus 로고
    • Web Growth Summary; December
    • M. Gray, Web Growth Summary. http://www.mit.edu/people.mkgray/net/ December 1997.
    • (1997)
    • Gray, M.1
  • 19
    • 0003533519 scopus 로고    scopus 로고
    • HTTP state management mechanism
    • Request for Comments RFC-2965, Internet Engineering Task Force, October
    • D. Kristol, L. Montulli. HTTP State Management Mechanism. Request for Comments RFC-2965, Internet Engineering Task Force, October 2000
    • (2000)
    • Kristol, D.1    Montulli, L.2
  • 22
    • 0003799504 scopus 로고
    • The temporal logic of reactive and concurrent systems
    • Springer-Verlag: Heidelberg, Germany
    • Z. Manna and A. Pnueli. The Temporal Logic of Reactive and Concurrent Systems. Springer-Verlag: Heidelberg, Germany, 1992.
    • (1992)
    • Manna, Z.1    Pnueli, A.2
  • 23
    • 0242697709 scopus 로고    scopus 로고
    • OpenACS Documentation; December
    • OpenACS Documentation. http://www.openacs.org/ December 2001.
    • (2001)
  • 25
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • November
    • R. S. Sandhu. Lattice-based Access Control Models. IEEE Computer, 26(11): 9-19, November 1993.
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 26
    • 0003970441 scopus 로고    scopus 로고
    • Enforceable security policies
    • TR 98-1664, Dept. of Computer Science, Cornell Univ., Ithaca, NY
    • F. B. Schneider. Enforceable Security Policies. TR 98-1664, Dept. of Computer Science, Cornell Univ., Ithaca, NY, 1998.
    • (1998)
    • Schneider, F.B.1
  • 28
    • 0242528861 scopus 로고    scopus 로고
    • Whitehat, Inc. Secure Web Programming; December
    • Whitehat, Inc. Secure Web Programming, http://www.whitehatsec.com/ December 2001.
    • (2001)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.