메뉴 건너뛰기




Volumn E87-A, Issue 1, 2004, Pages 190-203

The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem

Author keywords

Access control; Access matrix model; Computational complexity; Decidability; Safety problem

Indexed keywords

ACCIDENT PREVENTION; COMPUTABILITY AND DECIDABILITY; COMPUTATIONAL COMPLEXITY; CONTROL SYSTEMS; CRYPTOGRAPHY; GRAPHIC METHODS; INFORMATION ANALYSIS; MATHEMATICAL MODELS; PROBLEM SOLVING;

EID: 0842288709     PISSN: 09168508     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Conference Paper
Times cited : (11)

References (25)
  • 1
    • 0842327102 scopus 로고
    • A philosophy of security management
    • ed. M.D. Abrams, S. Jajodia, and H.J. Podell, IEEE Computer Society Press
    • D. Bailey, "A philosophy of security management," in Information Security: An Integrated Collection of Essays, ed. M.D. Abrams, S. Jajodia, and H.J. Podell, pp.98-110, IEEE Computer Society Press, 1995.
    • (1995) Information Security: An Integrated Collection of Essays , pp. 98-110
    • Bailey, D.1
  • 2
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • MITRE Corp., Bedford, MA, March
    • D.E. Bell and L.J. LaPadula, "Secure computer systems: Mathematical foundations and model," Technical Report ESD-TR-73-278-I, MITRE Corp., Bedford, MA, March 1973.
    • (1973) Technical Report , vol.ESD-TR-73-278-I
    • Bell, D.E.1    Lapadula, L.J.2
  • 4
    • 0029706405 scopus 로고    scopus 로고
    • A security model of dynamic labeling providing a tiered approach to verification
    • S.N. Foley, L. Gong, and X. Qian, "A security model of dynamic labeling providing a tiered approach to verification," Proc. IEEE Symposium on Security and Privacy, pp.142-153, 1996.
    • (1996) Proc. IEEE Symposium on Security and Privacy , pp. 142-153
    • Foley, S.N.1    Gong, L.2    Qian, X.3
  • 7
    • 0009442659 scopus 로고
    • Monotonic protection systems
    • ed. R.A. DeMillo, D.P. Dobkin, A.K. Jones, and R.J. Lipton, Academic Press
    • M.A. Harrison and W.L. Ruzzo, "Monotonic protection systems," in Foundations of Secure Computations, ed. R.A. DeMillo, D.P. Dobkin, A.K. Jones, and R.J. Lipton, pp.337-365, Academic Press, 1978.
    • (1978) Foundations of Secure Computations , pp. 337-365
    • Harrison, M.A.1    Ruzzo, W.L.2
  • 8
    • 0016984825 scopus 로고
    • Protection in operating systems
    • Aug.
    • M.A. Harrison, W.L. Ruzzo, and J.D. Ullman, "Protection in operating systems," Commun. ACM, vol.19, no.8, pp.461-471, Aug. 1976.
    • (1976) Commun. ACM , vol.19 , Issue.8 , pp. 461-471
    • Harrison, M.A.1    Ruzzo, W.L.2    Ullman, J.D.3
  • 12
    • 0842305607 scopus 로고    scopus 로고
    • Protection (security) models and policy
    • ed. A.B. Tucker, Jr., chapter 90, CRC Press, Boca Raton, FL
    • C.E. Landwehr, "Protection (security) models and policy," in The Computer Science and Engineering Handbook, ed. A.B. Tucker, Jr., chapter 90, pp. 1914-1928, CRC Press, Boca Raton, FL, 1997.
    • (1997) The Computer Science and Engineering Handbook , pp. 1914-1928
    • Landwehr, C.E.1
  • 14
    • 0003307796 scopus 로고
    • Security models
    • ed. J.J. Marciniak, John Wiley & Sons
    • J. MCLean, "Security models," in Encyclopedia of Software Engineering, ed. J.J. Marciniak, vol.2, pp.1136-1145, John Wiley & Sons, 1994.
    • (1994) Encyclopedia of Software Engineering , vol.2 , pp. 1136-1145
    • McLean, J.1
  • 15
    • 0037556344 scopus 로고
    • Policies for dynamic upgrading
    • ed. S. Jajodia and C.E. Landwehr, Elsevier Science Publishers B. V. (North-Holland)
    • C. Meadows, "Policies for dynamic upgrading," in Database Security, IV: Status and Prospects, ed. S. Jajodia and C.E. Landwehr, pp.241-250, Elsevier Science Publishers B. V. (North-Holland), 1991.
    • (1991) Database Security, IV: Status and Prospects , pp. 241-250
    • Meadows, C.1
  • 16
    • 0023999796 scopus 로고
    • The schematic protection model: Its definition and analysis for acyclic attenuating schemes
    • April
    • R.S. Sandhu, "The schematic protection model: Its definition and analysis for acyclic attenuating schemes," J. ACM, vol.35, no.2, pp.404-432, April 1988.
    • (1988) J. ACM , vol.35 , Issue.2 , pp. 404-432
    • Sandhu, R.S.1
  • 17
    • 84974744165 scopus 로고
    • Expressive power of the schematic protection model
    • R.S. Sandhu, "Expressive power of the schematic protection model," J. Comput. Security, vol.1, no.1, pp.59-98, 1992.
    • (1992) J. Comput. Security , vol.1 , Issue.1 , pp. 59-98
    • Sandhu, R.S.1
  • 19
    • 0026819359 scopus 로고
    • Undecidability of the safety problem for the schematic protection model with cyclic creates
    • Feb.
    • R.S. Sandhu, "Undecidability of the safety problem for the schematic protection model with cyclic creates," J. Comput. Syst. Sci., vol.44, no.1, pp.141-159. Feb. 1992.
    • (1992) J. Comput. Syst. Sci. , vol.44 , Issue.1 , pp. 141-159
    • Sandhu, R.S.1
  • 20
    • 3142653660 scopus 로고
    • Expressive power of the single-object typed access matrix model
    • Dec.
    • R.S. Sandhu and S. Ganta, "Expressive power of the single-object typed access matrix model," in Computer Security Applications Conference, pp.184-194, Dec. 1993.
    • (1993) Computer Security Applications Conference , pp. 184-194
    • Sandhu, R.S.1    Ganta, S.2
  • 22
    • 0019548112 scopus 로고
    • Formal models of capability-based protection systems
    • March
    • L. Snyder, "Formal models of capability-based protection systems," IEEE Trans. Comput., vol.C-30, no.3, pp.172-181, March 1981.
    • (1981) IEEE Trans. Comput. , vol.C-30 , Issue.3 , pp. 172-181
    • Snyder, L.1
  • 24
    • 84944079173 scopus 로고    scopus 로고
    • Safety analysis of the dynamic-typed access matrix model
    • Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security ed. F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, Springer-Verlag, Oct.
    • M. Soshi, "Safety analysis of the dynamic-typed access matrix model," in Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security, ed. F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, vol.1895 of Lecture Notes in Computer Science, pp. 106-121, Springer-Verlag, Oct. 2000.
    • (2000) Lecture Notes in Computer Science , vol.1895 , pp. 106-121
    • Soshi, M.1
  • 25
    • 0842305605 scopus 로고    scopus 로고
    • An access control model based on dual label
    • March
    • M. Soshi, T. Kato, and M. Maekawa, "An access control model based on dual labels," Trans. IPSJ, vol.40, no.3, pp.1305-1314, March 1999.
    • (1999) Trans. IPSJ , vol.40 , Issue.3 , pp. 1305-1314
    • Soshi, M.1    Kato, T.2    Maekawa, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.