메뉴 건너뛰기




Volumn , Issue , 2004, Pages 159-168

Cassandra: Distributed access control policies with tunable expressiveness

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; POLICY EVALUATION; ROLE DELEGATION; TRUST MANAGEMENT;

EID: 11244331795     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/POLICY.2004.1309162     Document Type: Conference Paper
Times cited : (151)

References (22)
  • 2
    • 3042584122 scopus 로고    scopus 로고
    • Flexible access control policy specification with constraint logic programming
    • S. Barker and P. J. Stuckey. Flexible access control policy specification with constraint logic programming. ACM Transactions on Information and System Security, 6(4):501-546, 2003.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.4 , pp. 501-546
    • Barker, S.1    Stuckey, P.J.2
  • 4
    • 84957800809 scopus 로고    scopus 로고
    • KeyNote: Trust management for public-key infrastructures (position paper)
    • M. Blaze, J. Feigenbaum, and A. D. Keromytis. KeyNote: Trust management for public-key infrastructures (position paper). Lecture Notes in Computer Science, 1550:59-63, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1550 , pp. 59-63
    • Blaze, M.1    Feigenbaum, J.2    Keromytis, A.D.3
  • 9
    • 0034428960 scopus 로고    scopus 로고
    • Policy-directed certificate retrieval
    • C. A. Gunter and T. Jim. Policy-directed certificate retrieval. Software - Practice and Experience, 30(15):1609-1640, 2000.
    • (2000) Software - Practice and Experience , vol.30 , Issue.15 , pp. 1609-1640
    • Gunter, C.A.1    Jim, T.2
  • 10
    • 4243532938 scopus 로고
    • Constraint logic programming: A survey
    • J. Jaffar and M. J. Maher. Constraint logic programming: a survey. Journal of Logic Programming, 19/20:503-581, 1994.
    • (1994) Journal of Logic Programming , vol.19-20 , pp. 503-581
    • Jaffar, J.1    Maher, M.J.2
  • 16
    • 84958042111 scopus 로고    scopus 로고
    • Can we eliminate certificate revocations lists?
    • R. L. Rivest. Can we eliminate certificate revocations lists? In Financial Cryptography, pages 178-183, 1998.
    • (1998) Financial Cryptography , pp. 178-183
    • Rivest, R.L.1
  • 18
    • 0242453160 scopus 로고    scopus 로고
    • Memoing evaluation for constraint extensions of datalog
    • D. Toman. Memoing evaluation for constraint extensions of datalog. Constraints, 2(3/4):337-359, 1997.
    • (1997) Constraints , vol.2 , Issue.3-4 , pp. 337-359
    • Toman, D.1
  • 22
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security, 6(1):1-42, 2003.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.