메뉴 건너뛰기




Volumn , Issue , 2002, Pages 87-96

Information sharing and security in dynamic coalitions

Author keywords

Access control; Distributed systems; Dynamic coalitions; Information security

Indexed keywords

CLIENT SERVER COMPUTER SYSTEMS; COMMAND AND CONTROL SYSTEMS; COMPUTER VIRUSES; COMPUTER WORMS; DISTRIBUTED DATABASE SYSTEMS; MILITARY DATA PROCESSING;

EID: 0242709333     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/507711.507726     Document Type: Conference Paper
Times cited : (66)

References (40)
  • 1
    • 4243739157 scopus 로고    scopus 로고
    • Advanced concept technology demonstration, management plan
    • NATO Interoperability from; PEO C3S HTIO, Fort Monmoth, NJ
    • NATO Interoperability from "Advanced Concept Technology Demonstration, Management Plan," PEO C3S HTIO, Fort Monmoth, NJ. 1999.
    • (1999)
  • 2
    • 0242445274 scopus 로고    scopus 로고
    • ABCS ITDS
    • MITRE Corporation presentation, NJ, Oct.
    • P. Barr, "ABCS ITDS", MITRE Corporation presentation, NJ, Oct. 1998.
    • (1998)
    • Barr, P.1
  • 3
    • 0003400257 scopus 로고
    • Secure computer systems: Mathematical foundations model
    • M74-244, Mitre Corporation, Bedford, Massachusetts
    • D. Bell and L. LaPadula, "Secure Computer Systems: Mathematical Foundations Model." M74-244, Mitre Corporation, Bedford, Massachusetts, 1975.
    • (1975)
    • Bell, D.1    LaPadula, L.2
  • 4
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Feb.
    • E. Bertino, E. Ferrari, and V. Atluri, "The Specification and Enforcement of Authorization Constraints in Workflow Management Systems", ACM Trans. Info. Syst. Security, Vol. 2, No. 1, Feb. 1999.
    • (1999) ACM Trans. Info. Syst. Security , vol.2 , Issue.1
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 6
    • 0242613518 scopus 로고    scopus 로고
    • Army battle command system
    • Sept./Oct.
    • S. Boutelle and C. Pizzutelli, "Army Battle Command System," Army RD&A, Sept./Oct. 1998.
    • (1998) Army RD&A
    • Boutelle, S.1    Pizzutelli, C.2
  • 7
    • 24544472638 scopus 로고    scopus 로고
    • Command, control, communications, and computers interoperability for coalition warfare, advanced concept technology demonstration, management plan
    • Prepared by PEO C3S HTIO; Ver. 1.2
    • Prepared by PEO C3S HTIO, "Command, Control, Communications, and Computers Interoperability for Coalition Warfare, Advanced Concept Technology Demonstration, Management Plan," Ver. 1.2, 1999.
    • (1999)
  • 8
    • 0242445275 scopus 로고    scopus 로고
    • XML-MTF, a military XML vocabulary
    • The MITRE Corporation
    • M. Cokus, "XML-MTF, A Military XML Vocabulary," The MITRE Corporation, 2001.
    • (2001)
    • Cokus, M.1
  • 9
    • 0242613516 scopus 로고    scopus 로고
    • 2000 project summary, flexible coalition policies for secure information sharing
    • DARPA ITO Sponsored Research, Spring, Kohout, Yates; Verdian-PSR
    • DARPA ITO Sponsored Research, Spring, Kohout, Yates, "2000 Project Summary, Flexible Coalition Policies for Secure Information Sharing," Verdian-PSR, 2000.
    • (2000)
  • 10
    • 4243922486 scopus 로고    scopus 로고
    • Integrated security services for dynamic coalition management
    • DARPA ACT Program March
    • J. Baras, V. Gligor, and R. Poovendran, "Integrated Security Services for Dynamic Coalition Management," DARPA ACT Program March 2001.
    • (2001)
    • Baras, J.1    Gligor, V.2    Poovendran, R.3
  • 11
    • 0031361985 scopus 로고    scopus 로고
    • Towards a definitive paradigm for security in object-oriented systems and applications
    • S. Demurjian and T.C. Ting, "Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications," Journal of Computer Security, Vol. 5, No. 4, 1997.
    • (1997) Journal of Computer Security , vol.5 , Issue.4
    • Demurjian, S.1    Ting, T.C.2
  • 13
    • 0003969635 scopus 로고
    • Department of defense trusted computer systems evaluation criteria
    • Department of Defense Directive 5200.28-STD; December 1985, Authorized by DoD Directive 5200.28, Dec.
    • Department of Defense Directive 5200.28-STD, "Department of Defense Trusted Computer Systems Evaluation Criteria," December 1985, Authorized by DoD Directive 5200.28, Dec. 1972.
    • (1972)
  • 14
    • 0008691175 scopus 로고
    • Security requirements for automated information systems (AIS)
    • Department of Defense Directive 5200.28; March
    • Department of Defense Directive 5200.28, "Security Requirements for Automated Information Systems (AIS)," March 1988.
    • (1988)
  • 15
    • 24544454299 scopus 로고    scopus 로고
    • Data standardization procedures
    • Department of Defense Directive 8320.1-M-1, Department of Defense; March 1996
    • Department of Defense Directive 8320.1-M-1, Department of Defense, "Data Standardization Procedures," March 1996. 1996. http://jcs.mil/htdocs/teinfo/software/8320.html
    • (1996)
  • 16
    • 24544447706 scopus 로고
    • National security information
    • Executive Order 12356; The White House, Apr.
    • R. Reagan, Executive Order 12356, "National Security Information," The White House, Apr. 1982.
    • (1982)
    • Reagan, R.1
  • 17
    • 0242445284 scopus 로고    scopus 로고
    • The role control center: An implementation of role-based access control on identity-based systems
    • NIST White Paper
    • D. Ferrailo, "The Role Control Center: An Implementation of Role-Based Access Control on Identity-Based Systems," NIST White Paper, 2000.
    • (2000)
    • Ferrailo, D.1
  • 19
    • 24544463961 scopus 로고    scopus 로고
    • Global command and control center
    • Joint Operational Support Center; DISA
    • Joint Operational Support Center. "Global Command and Control Center," DISA 1999. http://gccs.disa.mil/gccs/
    • (1999)
  • 21
    • 0242445276 scopus 로고    scopus 로고
    • General instructions
    • Joint Information Exchange Operations, Department of Defense Handbook, March
    • JIEO Handbook 9000, Chapter One, "General Instructions," Joint Information Exchange Operations, Department of Defense Handbook, March 2000.
    • (2000) JIEO Handbook 9000, Chapter One
  • 22
    • 24544446391 scopus 로고    scopus 로고
    • Adaptive network defense, dynamic virtual private network
    • Networks Associates Technology, Inc., NAI Labs
    • D. Kindred and K. Djahandari, "Adaptive Network Defense, Dynamic Virtual Private Network," Networks Associates Technology, Inc., NAI Labs, 2001, see http://www.pgp.com/research/nailabs/adaptives-network/dynamic-virtual
    • (2001)
    • Kindred, D.1    Djahandari, K.2
  • 24
    • 0242528824 scopus 로고    scopus 로고
    • Army modernization: Digitization and transformation overview
    • briefing at Pentagon, April
    • S. Levine, "Army Modernization: Digitization and Transformation Overview," briefing at Pentagon, April 2000.
    • (2000)
    • Levine, S.1
  • 26
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • S. Osborn, R. Sandhu, and Q. Munawer, "Configuring Role-Based Access Control To Enforce Mandatory And Discretionary Access Control Policies," ACM Trans. Info. Syst. Security, Vol. 3, No. 2, 2000.
    • (2000) ACM Trans. Info. Syst. Security , vol.3 , Issue.2
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 27
    • 0242445279 scopus 로고    scopus 로고
    • Message text formats-a solution to the problem of interoperability
    • March
    • W. Peach, "Message Text Formats-A Solution to the Problem of Interoperability," Journal of Battlefield Technology, Vol. 2, March 1999.
    • (1999) Journal of Battlefield Technology , vol.2
    • Peach, W.1
  • 29
    • 24544445642 scopus 로고    scopus 로고
    • Toward information assurance in dynamic coalitions
    • Comp. Sci. and Engr. Dept., Univ. of Conn. (CSE-TR-02-3), February
    • C. Phillips, S. Demurjian, and T.C. Ting, "Toward Information Assurance in Dynamic Coalitions", Comp. Sci. and Engr. Dept., Univ. of Conn. (CSE-TR-02-3), February 2002.
    • (2002)
    • Phillips, C.1    Demurjian, S.2    Ting, T.C.3
  • 30
    • 0037848141 scopus 로고    scopus 로고
    • Access control: Policies, models, architectures, and mechanisms
    • Italy, Sept.
    • P. Samarati, "Access Control: Policies, Models, Architectures, and Mechanisms," FOSAD, Italy, Sept. 2000.
    • (2000) FOSAD
    • Samarati, P.1
  • 31
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • Nov.
    • R. Sandhu, "Lattice-Based Access Control Models," Computer Journal, Vol. 26, Nov. 1993.
    • (1993) Computer Journal , vol.26
    • Sandhu, R.1
  • 32
    • 0028513932 scopus 로고
    • Access control: Principles and practice
    • Sept.
    • R. Sandu and P. Samarati, "Access Control: Principles and Practice." IEEE Communications Magazine, Vol. 32, No.9, Sept. 1994.
    • (1994) IEEE Communications Magazine , vol.32 , Issue.9
    • Sandu, R.1    Samarati, P.2
  • 33
    • 0242613526 scopus 로고    scopus 로고
    • Role-based access control
    • M. Zerkowitz (ed.), Academic Press
    • R. Sandu, "Role-Based Access Control", Advances in Computer Science, Vol. 48, M. Zerkowitz (ed.), Academic Press, 1998.
    • (1998) Advances in Computer Science , vol.48
    • Sandu, R.1
  • 36
    • 4243553034 scopus 로고    scopus 로고
    • Information sharing for dynamic coalitions
    • VPSR Report 2836, Verdian Pacific-Sierra Research, Dec.
    • S. Spring and D. Gormley, "Information Sharing for Dynamic Coalitions," VPSR Report 2836, Verdian Pacific-Sierra Research, Dec. 2000.
    • (2000)
    • Spring, S.1    Gormley, D.2
  • 38
    • 0242445282 scopus 로고    scopus 로고
    • C4I for coalition warfare, command and control systems interoperability program
    • Quotation from the National Military Strategy; Army Digitization Office
    • Quotation from the National Military Strategy, "C4I For Coalition Warfare, Command and Control Systems Interoperability Program," Army Digitization Office, 1999.
    • (1999)
  • 39
    • 0242528829 scopus 로고
    • A user-role based data security approach
    • Landwehr (ed.), North-Holland
    • T.C. Ting, "A User-Role Based Data Security Approach," Database Security: Status and Prospects, Landwehr (ed.), North-Holland, 1988.
    • (1988) Database Security: Status and Prospects
    • Ting, T.C.1
  • 40
    • 0242613528 scopus 로고
    • Application information security semantics: A case of mental health delivery
    • D. Spooner and C. Landwehr (eds.), North-Holland
    • T.C. Ting, "Application Information Security Semantics: A Case of Mental Health Delivery," Database Security, III: Status and Prospects, D. Spooner and C. Landwehr (eds.), North-Holland, 1990.
    • (1990) Database Security, III: Status and Prospects
    • Ting, T.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.