메뉴 건너뛰기




Volumn 8, Issue 6, 2004, Pages 40-50

Access-control language for multidomain environments

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA; SEMANTICS; TELECOMMUNICATION SERVICES; WORLD WIDE WEB; XML;

EID: 11044223672     PISSN: 10897801     EISSN: None     Source Type: Journal    
DOI: 10.1109/MIC.2004.53     Document Type: Article
Times cited : (140)

References (16)
  • 2
    • 0035251598 scopus 로고    scopus 로고
    • "Digital Government Security Infrastructure Design Challenges"
    • Feb
    • J.B.D. Joshi et al., "Digital Government Security Infrastructure Design Challenges," Computer, vol. 34, no. 2, Feb. 2001, pp. 66-72.
    • (2001) Computer , vol.34 , Issue.2 , pp. 66-72
    • Joshi, J.B.D.1
  • 3
    • 0010032891 scopus 로고    scopus 로고
    • "Computational Issues in Secure Interoperation"
    • Jan
    • L. Gong and X. Qian, "Computational Issues in Secure Interoperation," IEEE Trans. Software and Eng., vol. 22, no. 1, Jan. 1996, pp. 43-52.
    • (1996) IEEE Trans. Software and Eng. , vol.22 , Issue.1 , pp. 43-52
    • Gong, L.1    Qian, X.2
  • 4
    • 0035330891 scopus 로고    scopus 로고
    • "Securing XML Documents with Author X"
    • May/June
    • E. Bertino, S. Castano, and E. Ferrari, "Securing XML Documents with Author X," IEEE Internet Computing, vol. 5, no. 3, May/June 2001, pp. 21-31.
    • (2001) IEEE Internet Computing , vol.5 , Issue.3 , pp. 21-31
    • Bertino, E.1    Castano, S.2    Ferrari, E.3
  • 5
    • 84884311106 scopus 로고    scopus 로고
    • "Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies"
    • S.L. Osborn, R. Sandhu, and Q. Munawer, "Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies," ACM Trans. Information and System Security, vol. 3, no. 2, Feb. 2000, pp. 85-106.
    • (2000) ACM Trans. Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.L.1    Sandhu, R.2    Munawer, Q.3
  • 6
    • 84992227458 scopus 로고    scopus 로고
    • "The NIST Model for Role-Based Access Control: Towards a Unified Standard"
    • Aug
    • D. Ferraiolo et al., "The NIST Model for Role-Based Access Control: Towards a Unified Standard," ACM Trans. Information and System Security, vol. 4, no. 3, Aug. 2001, pp. 224-274.
    • (2001) ACM Trans. Information and System Security , vol.4 , Issue.3 , pp. 224-274
    • Ferraiolo, D.1
  • 7
    • 77954476833 scopus 로고    scopus 로고
    • "Managing Security Policies in a Distributed Environment Using Extensible Markup Language (XML)"
    • ACM Press
    • N.N. Vuong, G.S. Smith, and Y. Deng, "Managing Security Policies in a Distributed Environment Using Extensible Markup Language (XML)," Proc. Symp. Applied Computing, ACM Press, 2001, pp. 405-411.
    • (2001) Proc. Symp. Applied Computing , pp. 405-411
    • Vuong, N.N.1    Smith, G.S.2    Deng, Y.3
  • 8
    • 2442512413 scopus 로고    scopus 로고
    • committee specification, 24 July, www.oasls-open.org/committees/xacml /epository/cs-xacmlspecification-1.1.pdf
    • T. Moses, ed., "OASIS eXtensible Access Control Markup Language (XACML) Version 1.1," committee specification, 24 July 2003; www.oasls-open.org/ committees/xacml/epository /cs-xacmlspecification-1.1.pdf.
    • (2003) OASIS EXtensible Access Control Markup Language (XACML) Version 1.1
    • Moses, T.1
  • 9
    • 11044234857 scopus 로고    scopus 로고
    • "XACML Profile for Role-Based Access Control (RBAC)"
    • OASIS Access Control TC committee draft 01, 13 Feb
    • A. Anderson, ed., "XACML Profile for Role-Based Access Control (RBAC)," OASIS Access Control TC committee draft 01, 13 Feb. 2004,
    • (2004)
    • Anderson, A.1
  • 10
    • 84948985429 scopus 로고    scopus 로고
    • "Advanced Features for Enterprise-wide Role-Based Access Control"
    • IEEE CS Press
    • A. Kern, "Advanced Features for Enterprise-Wide Role-Based Access Control," Proc. Ann. Computer Security Applications Conf., IEEE CS Press, 2002, pp. 333-343.
    • (2002) Proc. Ann. Computer Security Applications Conf. , pp. 333-343
    • Kern, A.1
  • 11
    • 4143144281 scopus 로고    scopus 로고
    • "Generalized Temporal Role-Based Access Control Model"
    • accepted for publication
    • J.B.D. Joshi et al., "Generalized Temporal Role-Based Access Control Model," IEEE Trans. Knowledge and Data Eng., accepted for publication.
    • IEEE Trans. Knowledge and Data Eng.
    • Joshi, J.B.D.1
  • 12
    • 1942532238 scopus 로고    scopus 로고
    • "XML-based Specification for Web-Services Document Security"
    • Apr
    • R. Bhatti et al., "XML-Based Specification for Web-Services Document Security," Computer, vol. 37, no. 4, Apr., 2004, pp. 41-49.
    • (2004) Computer , vol.37 , Issue.4 , pp. 41-49
    • Bhatti, R.1
  • 15
    • 0004078695 scopus 로고    scopus 로고
    • "The KeyNote Trust-Management System, version 2"
    • IETF RFC 2704, Sept. 1999; www.ietf.org/fc/rfc2704.txt
    • M. Blaze et al., "The KeyNote Trust-Management System, version 2," IETF RFC 2704, Sept. 1999; www.ietf.org/fc/rfc2704.txt.
    • (1999)
    • Blaze, M.1
  • 16


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.