메뉴 건너뛰기




Volumn , Issue , 2004, Pages 137-146

Security policy reconciliation in distributed computing environments

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CRYPTOGRAPHY; GRAPHIC METHODS; NETWORK PROTOCOLS; RESOURCE ALLOCATION; SECURITY OF DATA;

EID: 11244319622     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1016/j.aquaculture.2004.09.014     Document Type: Conference Paper
Times cited : (39)

References (33)
  • 4
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • MITRE Corporation, Bedford, MA
    • D. Bell and L. LaPadula. Secure Computer Systems: Mathematical Foundations and Model. Technical Report M74-244, MITRE Corporation, Bedford, MA, 1973.
    • (1973) Technical Report , vol.M74-244
    • Bell, D.1    LaPadula, L.2
  • 5
    • 84957800809 scopus 로고    scopus 로고
    • KeyNote: Trust management for public-key infrastructures
    • M. Blaze, J. Feigenbaum, and A. Keromytis. KeyNote: Trust management for public-key infrastructures. Lec. Notes in Comp. Sci., 1550:59-63, 1999.
    • (1999) Lec. Notes in Comp. Sci. , vol.1550 , pp. 59-63
    • Blaze, M.1    Feigenbaum, J.2    Keromytis, A.3
  • 8
    • 0030705406 scopus 로고    scopus 로고
    • Analyzing consistency of security policies
    • IEEE, May Oakland, CA
    • L. Cholvy and F. Cuppens. Analyzing Consistency of Security Policies. In 1997 IEEE Symposium on Security and Privacy, pages 103-112. IEEE, May 1997. Oakland, CA.
    • (1997) 1997 IEEE Symposium on Security and Privacy , pp. 103-112
    • Cholvy, L.1    Cuppens, F.2
  • 9
    • 84860061719 scopus 로고    scopus 로고
    • Condor. http://www.cs.wisc.edu/condor/.
  • 10
    • 0036083264 scopus 로고    scopus 로고
    • Binder, a logic-based security language
    • Oakland, CA, May IEEE Computer Society Press
    • J. DeTreville. Binder, a logic-based security language. In Symp. on Res. in Sec. and Privacy, Oakland, CA, May 2002. IEEE Computer Society Press.
    • (2002) Symp. on Res. in Sec. and Privacy
    • DeTreville, J.1
  • 12
    • 1942521913 scopus 로고    scopus 로고
    • SPKI requirements
    • Sept.
    • C. Ellison. SPKI requirements. RFC 2692, Sept. 1999.
    • (1999) RFC , vol.2692
    • Ellison, C.1
  • 17
    • 1542597501 scopus 로고    scopus 로고
    • Security policy specification using a graphical approach
    • The University of California, Davis Department of Computer Science, June
    • J. Hoagland, R. Pandey, and K. Levitt. Security Policy Specification Using a Graphical Approach. Technical Report CSE-98-3, The University of California, Davis Department of Computer Science, June 1998.
    • (1998) Technical Report , vol.CSE-98-3
    • Hoagland, J.1    Pandey, R.2    Levitt, K.3
  • 30
  • 31
    • 11244348419 scopus 로고    scopus 로고
    • Security policy reconciliation in deistributed computing environments
    • University of Wisconsin-Madison, March
    • H. Wang, S. Jha, P. McDaniel, and M. Livny. Security Policy Reconciliation in Deistributed Computing Environments. Technical Report 1499, University of Wisconsin-Madison, March 2004.
    • (2004) Technical Report , vol.1499
    • Wang, H.1    Jha, S.2    McDaniel, P.3    Livny, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.