메뉴 건너뛰기




Volumn 1, Issue , 2003, Pages 50-61

Dynamic authorization and intrusion response in distributed systems

Author keywords

Access control; Authorization; Computer crime; Information security; Intrusion detection; Linux; Permission; Web and internet services; Web server; Wide area networks

Indexed keywords

ACCESS CONTROL; APPLICATION PROGRAMMING INTERFACES (API); COMPUTER CRIME; COMPUTER OPERATING SYSTEMS; GALLIUM ALLOYS; INTERNET; INTERNET PROTOCOLS; LINUX; MERCURY (METAL); NETWORK SECURITY; SECURITY OF DATA; SOCIAL NETWORKING (ONLINE); WEB SERVICES; WIDE AREA NETWORKS; WORLD WIDE WEB;

EID: 15944422261     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DISCEX.2003.1194872     Document Type: Conference Paper
Times cited : (9)

References (13)
  • 2
    • 84958048748 scopus 로고    scopus 로고
    • Compliance Checking in the Policy Maker Trust Management System
    • Proceedings of the Financial Cryptography '98
    • M. Blaze, J. Feigenbaum and M. Strauss. Compliance Checking in the Policy Maker Trust Management System. In Proceedings of the Financial Cryptography '98, Lecture Notes in Computer Science, volume 1465, pages 254-274.
    • Lecture Notes in Computer Science , vol.1465 , pp. 254-274
    • Blaze, M.1    Feigenbaum, J.2    Strauss, M.3
  • 3
    • 85084164023 scopus 로고    scopus 로고
    • A Comparison of Methods for Implementing Adaptive Security Policies
    • January
    • M. Carney and B. Loe. A Comparison of Methods for Implementing Adaptive Security Policies. In Proceedings of the 7th USENIX Security Symposium, pages 1-14, January, 1998.
    • (1998) Proceedings of the 7th USENIX Security Symposium , pp. 1-14
    • Carney, M.1    Loe, B.2
  • 4
    • 84944048132 scopus 로고    scopus 로고
    • The Ponder Policy Specification Language
    • Proceedings of the Workshop on Policies for Distributed Systems and Networks, Springer-Verlag Bristol, UK, January
    • N. Damianou, N. Dulay, E. Lupu and M. Sloman. The Ponder Policy Specification Language. In Proceedings of the Workshop on Policies for Distributed Systems and Networks, Springer-Verlag LNCS 1995, pages 18-39, Bristol, UK, January, 2001.
    • (2001) LNCS , vol.1995 , pp. 18-39
    • Damianou, N.1    Dulay, N.2    Lupu, E.3    Sloman, M.4
  • 7
    • 0027609384 scopus 로고
    • A Survey of Intrusion Detection Techniques
    • June
    • T. F. Lunt. A Survey of Intrusion Detection Techniques. Computers and Security, volume 12, pages 405-418, June 1993.
    • (1993) Computers and Security , vol.12 , pp. 405-418
    • Lunt, T.F.1
  • 9
    • 0000788149 scopus 로고    scopus 로고
    • Law-Governed Interaction: A Coordination & Control Mechanism for Heterogeneous Distributed Systems
    • July
    • N. Minsky and V. Ungureanu. Law-Governed Interaction: A Coordination & Control Mechanism for Heterogeneous Distributed Systems. In ACM Transactions on Software Engineering and Methodology (TOSEM), Vol 9, No 3, pages 273-305, July 2000.
    • (2000) ACM Transactions on Software Engineering and Methodology (TOSEM) , vol.9 , Issue.3 , pp. 273-305
    • Minsky, N.1    Ungureanu, V.2
  • 11
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • September
    • B.C. Neuman and T. Ts'o. Kerberos: An authentication service for computer networks. IEEE Communications Magazine, pages 33-38, September 1994.
    • (1994) IEEE Communications Magazine , pp. 33-38
    • Neuman, B.C.1    Ts'o, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.