메뉴 건너뛰기




Volumn 33, Issue 6, 2003, Pages 697-708

Achieving Secure and Flexible M-Services through Tickets

Author keywords

Access control architecture; Anonymity; RBAC; Secure M services; Ticket based access control

Indexed keywords

COMPUTATIONAL COMPLEXITY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; FUNCTIONS; LARGE SCALE SYSTEMS; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; TELECOMMUNICATION SERVICES; VECTORS; WIRELESS TELECOMMUNICATION SYSTEMS; WORLD WIDE WEB; XML;

EID: 0347337934     PISSN: 10834427     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSMCA.2003.819917     Document Type: Article
Times cited : (48)

References (34)
  • 5
    • 85069422432 scopus 로고    scopus 로고
    • [Online]
    • (2002) Excellent e-Service. [Online] Available: http://www.excellente-service.com/
    • (2002)
  • 7
    • 0032124041 scopus 로고    scopus 로고
    • Mobility and security management in the GSM system and some proposed future improvements
    • July
    • A. Mehrotra and L. Golding, "Mobility and security management in the GSM system and some proposed future improvements," Proc. IEEE, vol. 86, pp. 1480-1496, July 1998.
    • (1998) Proc. IEEE , vol.86 , pp. 1480-1496
    • Mehrotra, A.1    Golding, L.2
  • 8
    • 84962890350 scopus 로고    scopus 로고
    • Untraceable off-line electronic cash flow in e-commerce
    • Gold-Coast, Australia, Feb.
    • H. Wang and Y. Zhang, "Untraceable off-line electronic cash flow in e-commerce," in Proc. 24th Australian Computer Science Conf.,. Gold-Coast, Australia, Feb. 2001, pp. 191-198.
    • (2001) Proc. 24th Australian Computer Science Conf. , pp. 191-198
    • Wang, H.1    Zhang, Y.2
  • 10
    • 0348151884 scopus 로고    scopus 로고
    • A consumer anonymity scalable payment scheme with role based access control
    • Kyoto, Japan, Dec.
    • H. Wang, J. Cao, and Y. Zhang, "A consumer anonymity scalable payment scheme with role based access control," in Proc. 2nd Int. Conf. Web Information Systems Engineering, Kyoto, Japan, Dec. 2001, pp. 53-62.
    • (2001) Proc. 2nd Int. Conf. Web Information Systems Engineering , pp. 53-62
    • Wang, H.1    Cao, J.2    Zhang, Y.3
  • 11
    • 0030416137 scopus 로고    scopus 로고
    • Pseudorandom functions revisited: The cascade construction and its concrete security. Extended abstract
    • Burlington, VT, Oct.
    • M. Bellare, R. Canetti, and H. Krawczyk, "Pseudorandom functions revisited: the cascade construction and its concrete security. Extended abstract," in Proc. 37th Annu. Symp. Foundations Computer Science, Burlington, VT, Oct. 1996, pp. 514-523.
    • (1996) Proc. 37th Annu. Symp. Foundations Computer Science , pp. 514-523
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 13
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb.
    • R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 15
    • 0348151888 scopus 로고    scopus 로고
    • Formal authorization allocation approaches for role-based access control based on relational algebra operations
    • Singapore, Dec.
    • H. Wang, J. Cao, and Y. Zhang, "Formal authorization allocation approaches for role-based access control based on relational algebra operations," in Proc. 3nd Int. Conf. Web Information Systems Engineering, Singapore, Dec. 2002, pp. 301-312.
    • (2002) Proc. 3nd Int. Conf. Web Information Systems Engineering , pp. 301-312
    • Wang, H.1    Cao, J.2    Zhang, Y.3
  • 18
    • 0347380552 scopus 로고    scopus 로고
    • Supporting relationships in access control using role based access control
    • Fairfax, VA, Oct.
    • J. Barkley, K. Beznosov, and J. Uppal, "Supporting relationships in access control using role based access control," in Proc. 3rd ACM Workshop RoleBased Access Control, Fairfax, VA, Oct. 1998, pp. 55-65.
    • (1998) Proc. 3rd ACM Workshop RoleBased Access Control , pp. 55-65
    • Barkley, J.1    Beznosov, K.2    Uppal, J.3
  • 19
    • 0002422823 scopus 로고    scopus 로고
    • Role-based access control model and reference implementation within a corporate intranet
    • D. Ferraiolo, J. Barkley, and D. Kuhn, "Role-based access control model and reference implementation within a corporate intranet," ACM Trans. Inform. Syst. Security, vol. 2, no. 1, pp. 34-64, 1999.
    • (1999) ACM Trans. Inform. Syst. Security , vol.2 , Issue.1 , pp. 34-64
    • Ferraiolo, D.1    Barkley, J.2    Kuhn, D.3
  • 21
    • 0033313663 scopus 로고    scopus 로고
    • Accountable anonymous access to services in mobile communication systems
    • Lausanne, Switzerland, Oct.
    • L. Buttyan and J. Hubaux, "Accountable anonymous access to services in mobile communication systems," in Proc. 18th Symp. Reliable Distributed Systems. Lausanne, Switzerland, Oct. 1999, pp. 384-389.
    • (1999) Proc. 18th Symp. Reliable Distributed Systems , pp. 384-389
    • Buttyan, L.1    Hubaux, J.2
  • 24
    • 0348151887 scopus 로고    scopus 로고
    • A logic of authentication, from proceedings of the royal society, volume 426, number 1871, 1989
    • Los Alamitos, CA: IEEE Comput. Soc. Press
    • M. Burrows, M. Abadi, and R. Needham, "A logic of authentication, from proceedings of the royal society, volume 426, number 1871, 1989," in William Stallings, Practical Cryptography for Data Internetworks. Los Alamitos, CA: IEEE Comput. Soc. Press, 1996.
    • (1996) William Stallings, Practical Cryptography for Data Internetworks
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 30
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Commun. ACM, vol. 24, no. 2, pp. 84-88, 1981.
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 31
    • 0033723110 scopus 로고    scopus 로고
    • Design and implementation of an access control processor for XML documents
    • Jun.
    • E. Damiani, S. D. Capitani, S. Paraboschi, and P. Samarati, "Design and implementation of an access control processor for XML documents," Comput. Netw., vol. 33, no. 1-6, pp. 59-75, Jun. 2000.
    • (2000) Comput. Netw. , vol.33 , Issue.1-6 , pp. 59-75
    • Damiani, E.1    Capitani, S.D.2    Paraboschi, S.3    Samarati, P.4
  • 32
    • 0141908648 scopus 로고    scopus 로고
    • Securing SOAP e-services
    • Feb.
    • _, "Securing SOAP e-services," Int. J. Inform. Security, vol. 1, no. 2, pp. 100-115, Feb. 2002.
    • (2002) Int. J. Inform. Security , vol.1 , Issue.2 , pp. 100-115
  • 33
    • 85001697848 scopus 로고    scopus 로고
    • A fine-grained access control system for XML documents
    • May
    • _, "A fine-grained access control system for XML documents," ACM Trans. Inform. Syst. Security, vol. 5, no. 2, pp. 169-202, May 2002.
    • (2002) ACM Trans. Inform. Syst. Security , vol.5 , Issue.2 , pp. 169-202


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.