메뉴 건너뛰기




Volumn 17, Issue 1, 2005, Pages 4-23

A generalized temporal role-based access control model

Author keywords

Access control; Role hierarchy; Role based; Separation of duty; Temporal constraints

Indexed keywords

ACCESS CONTROL; ROLE HIERARCHY; ROLE-BASED; SEPARATION OF DUTY; TEMPORAL CONSTRAINTS;

EID: 17444406680     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2005.1     Document Type: Article
Times cited : (493)

References (18)
  • 1
    • 84956993736 scopus 로고    scopus 로고
    • Role-based authorization constraints specification
    • Nov.
    • G. Ahn and R. Sandhu, "Role-Based Authorization Constraints Specification," ACM Trans. Information and System Security, vol. 3, no. 4, Nov. 2000.
    • (2000) ACM Trans. Information and System Security , vol.3 , Issue.4
    • Ahn, G.1    Sandhu, R.2
  • 2
    • 0020849266 scopus 로고
    • Maintaining knowledge about temporal intervals
    • Nov.
    • J.F. Allen, "Maintaining Knowledge about Temporal Intervals," Comm. ACM, vol. 26, no. 11, pp. 832-843, Nov. 1983.
    • (1983) Comm. ACM , vol.26 , Issue.11 , pp. 832-843
    • Allen, J.F.1
  • 3
    • 0008724838 scopus 로고    scopus 로고
    • An authorization model for temporal and derived data: Securing information portals
    • Feb.
    • V. Atluri and A. Gal, "An Authorization Model for Temporal and Derived Data: Securing Information Portals," ACM Trans. Information and System Security, vol. 5, no. 1, pp. 62-94, Feb. 2002.
    • (2002) ACM Trans. Information and System Security , vol.5 , Issue.1 , pp. 62-94
    • Atluri, V.1    Gal, A.2
  • 4
    • 84865788031 scopus 로고    scopus 로고
    • A model of OASIS role-based access control and its support for active security
    • Nov.
    • J. Bacon, K. Moody, and W. Yao, "A Model of OASIS Role-Based Access Control and Its Support for Active Security," ACM Trans. Information and System Security, vol. 5, no. 4, Nov. 2002.
    • (2002) ACM Trans. Information and System Security , vol.5 , Issue.4
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 5
    • 0032153903 scopus 로고    scopus 로고
    • An access control model supporting periodicity constraints and temporal reasoning
    • Sept.
    • E. Bertino, C. Bettini, E. Ferrari, and P. Samarati, "An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning," ACM Trans. Database Systems, vol. 23, no. 3, pp. 231-285, Sept. 1998.
    • (1998) ACM Trans. Database Systems , vol.23 , Issue.3 , pp. 231-285
    • Bertino, E.1    Bettini, C.2    Ferrari, E.3    Samarati, P.4
  • 6
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Feb.
    • E. Bertino, E. Ferrari, and V. Atluri, "The Specification and Enforcement of Authorization Constraints in Workflow Management Systems," ACM Trans. Information and System Security, vol. 2, no. 1, pp. 65-104, Feb. 1999.
    • (1999) ACM Trans. Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 8
    • 0002422823 scopus 로고    scopus 로고
    • A role-based access control model and reference implementation within a corporate intranet
    • D. Ferrariolo, J.F. Barkley, and D.R. Kuhn, A Role-Based Access" Control Model and Reference Implementation within a Corporate Intranet," ACM Trans. Information and System Security, vol. 2, no. 1, pp. 34-64, 1999.
    • (1999) ACM Trans. Information and System Security , vol.2 , Issue.1 , pp. 34-64
    • Ferrariolo, D.1    Barkley, J.F.2    Kuhn, D.R.3
  • 11
    • 17444380439 scopus 로고    scopus 로고
    • Mutual exclusion of roles as a means of implementing separation of duties in a role-based access control system
    • D.R. Kuhn, "Mutual Exclusion of Roles as a Means of Implementing Separation of Duties in a Role-Based Access Control System," ACM Trans. Information and System Security, vol. 2, no. 2, pp. 177-228, 1999.
    • (1999) ACM Trans. Information and System Security , vol.2 , Issue.2 , pp. 177-228
    • Kuhn, D.R.1
  • 14
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • Feb.
    • S.L. Osborn, R. Sandhu, and Q. Munawer, "Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies," ACM Trans. Information and System Security, vol. 3, no. 2, Feb. 2000.
    • (2000) ACM Trans. Information and System Security , vol.3 , Issue.2
    • Osborn, S.L.1    Sandhu, R.2    Munawer, Q.3
  • 15
    • 0347380518 scopus 로고
    • Separation of duties in computerized information systems
    • North Holland
    • R. Sandhu, "Separation of Duties in Computerized Information Systems," Database Security IV: Status and Prospects, pp. 179-189, North Holland, 1991.
    • (1991) Database Security IV: Status and Prospects , pp. 179-189
    • Sandhu, R.1
  • 16
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • Feb.
    • R. Sandhu, E. Coyne, H. Feinstem, and C. Youman, "Role-Based Access Control Models," Computer, vol. 29, no. 2, Feb. 1996.
    • (1996) Computer , vol.29 , Issue.2
    • Sandhu, R.1    Coyne, E.2    Feinstem, H.3    Youman, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.