메뉴 건너뛰기




Volumn , Issue , 2003, Pages 196-203

Static verification of security requirements in role based CSCW systems

Author keywords

Finite state based model checking; Methodology for access control policy design; Role based access control; Security policy specification

Indexed keywords

CONSTRAINT THEORY; DATA ACQUISITION; KNOWLEDGE BASED SYSTEMS; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 0242709308     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/775412.775438     Document Type: Conference Paper
Times cited : (61)

References (28)
  • 1
    • 84865788031 scopus 로고    scopus 로고
    • A model of OASIS role-based access control and its support for active security
    • November
    • J. Bacon, K. Moody, and W. Yao. A Model of OASIS Role-Based Access Control and its Support for Active Security. ACM Transactions on Information and System Security (TISSEC), 5(4):492 - 540, November 2002.
    • (2002) ACM Transactions on Information and System Security (TISSEC) , vol.5 , Issue.4 , pp. 492-540
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 2
    • 0031382313 scopus 로고    scopus 로고
    • A flexible model supporting the specification and enforcement of role-based authorizations in workflow management systems
    • E. Bertino, E. Ferrari, and V. Atluri. A Flexible Model Supporting the Specification and Enforcement of Role-based Authorizations in Workflow Management Systems. In ACM Workshop on Role-based Access Control, pages 1-12, 1997.
    • (1997) ACM Workshop on Role-Based Access Control , pp. 1-12
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 7
    • 0036039907 scopus 로고    scopus 로고
    • Verification support for workflow design with UML activity graphs
    • R. Eshuis and R. Wieringa. Verification Support for Workflow Design with UML Activity Graphs. In Proc. of ICSE'2002, pages 166 - 176, 2002.
    • (2002) Proc. of ICSE'2002 , pp. 166-176
    • Eshuis, R.1    Wieringa, R.2
  • 8
    • 0028678368 scopus 로고
    • Specifying security for computer supported collaborative computing
    • S. Foley and J. Jacob. Specifying Security for Computer Supported Collaborative Computing. Journal of Computer Security, 3(4):233-253, 1995.
    • (1995) Journal of Computer Security , vol.3 , Issue.4 , pp. 233-253
    • Foley, S.1    Jacob, J.2
  • 13
    • 0031382488 scopus 로고    scopus 로고
    • Reconciling role-based management and role-based access control
    • E. C. Lupu and M. Sloman. Reconciling Role-Based Management and Role-Based Access Control. In ACM Workshop on Role-based Access Control, pages 135-141, 1997.
    • (1997) ACM Workshop on Role-Based Access Control , pp. 135-141
    • Lupu, E.C.1    Sloman, M.2
  • 15
    • 0242655680 scopus 로고    scopus 로고
    • Enterprise-wide workflow management based on state and activity charts
    • in: A. Dogac, L. Kalinichenko, T. Ozsu, A. Sheth (Eds.):. Springer Verlag
    • P. Muth, D. Wodtke, J. Weissenfels, G. Weikum, and A. Kotz Dittrich. Enterprise-wide Workflow Management based on State and Activity Charts, Workflow Management Systems and Interoperability in: A. Dogac, L. Kalinichenko, T. Ozsu, A. Sheth (Eds.):. Springer Verlag, 1998.
    • (1998) Workflow Management Systems and Interoperability
    • Muth, P.1    Wodtke, D.2    Weissenfels, J.3    Weikum, G.4    Kotz Dittrich, A.5
  • 19
    • 0017723679 scopus 로고
    • Towards autonomous descriptions of synchronization modules
    • P. Roberts and J.-P. Verjus. Towards Autonomous Descriptions of Synchronization Modules. In Proc. of IFIP Congress, pages 981-986, 1977.
    • (1977) Proc. of IFIP Congress , pp. 981-986
    • Roberts, P.1    Verjus, J.-P.2
  • 22
  • 23
    • 0019548112 scopus 로고
    • Formal models of capability-based protection systems
    • March
    • L. Snyder. Formal Models of Capability-Based Protection Systems. IEEE Transactions on Computers, C-30(3):172 - 181, March 1981.
    • (1981) IEEE Transactions on Computers , vol.C-30 , Issue.3 , pp. 172-181
    • Snyder, L.1
  • 24
    • 0031387996 scopus 로고    scopus 로고
    • Team-based Access Control (TMAC): A primitive for applying role-based access controls in collaborative environments
    • R. K. Thomas. Team-based Access Control (TMAC): A Primitive for Applying Role-based Access Controls in Collaborative Environments. In ACM Workshop on Role-based Access Control, pages 13 - 19, 1997.
    • (1997) ACM Workshop on Role-Based Access Control , pp. 13-19
    • Thomas, R.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.