메뉴 건너뛰기




Volumn , Issue , 2004, Pages 304-313

Security policies to mitigate insider threat in the document control domain

Author keywords

Access Control; Digital Documents; Information Flow; Insider Threat

Indexed keywords

ACCESS CONTROL; DIGITAL DOCUMENTS; INFORMATION FLOW; INSIDER THREAT;

EID: 21644453410     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2004.35     Document Type: Conference Paper
Times cited : (36)

References (22)
  • 1
    • 19944423977 scopus 로고
    • The protection of information in computer systems
    • July
    • J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Communications of the ACM 17(7), July 1974.
    • (1974) Communications of the ACM , vol.17 , Issue.7
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 2
    • 84860965918 scopus 로고    scopus 로고
    • http://www.microsoft.com/office/editions/prodinfo/technologies/irm.mspx
  • 3
    • 84860971939 scopus 로고    scopus 로고
    • http://www.authentica.com/products/document_protection.asp
  • 4
    • 0036395373 scopus 로고    scopus 로고
    • A framework for understanding and predicting insider attacks
    • E. E. Schultz. A Framework for Understanding and Predicting Insider Attacks. Computers and Security 21(6), pages 526-531, 2002.
    • (2002) Computers and Security , vol.21 , Issue.6 , pp. 526-531
    • Schultz, E.E.1
  • 10
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • The MITRE Corporation, May
    • D. E. Bell and L. J. La Padula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, The MITRE Corporation, May 1973.
    • (1973) Technical Report , vol.M74-244
    • Bell, D.E.1    La Padula, L.J.2
  • 13
    • 33749396186 scopus 로고    scopus 로고
    • The specification and enforcement of advanced security policies
    • T. Ryutov and C. Neuman. The Specification and Enforcement of Advanced Security Policies. Policy 2002.
    • Policy 2002
    • Ryutov, T.1    Neuman, C.2
  • 14
    • 3543132789 scopus 로고    scopus 로고
    • Extensible Access Control Markup Language (XACML) Version 1.0
    • February
    • S. Godik, T. Moses, et al. extensible Access Control Markup Language (XACML) Version 1.0. OASIS standard, February, 2003.
    • (2003) OASIS Standard
    • Godik, S.1    Moses, T.2
  • 16
    • 0011795795 scopus 로고    scopus 로고
    • Provisional authorizations
    • Gosh, A., editor, Kluwer Academic Press, Boston
    • S. Jajodia, M. Kudo and V. S. Subramanian. Provisional Authorizations, In Gosh, A., editor, E-Commerce Security and Privacy, pages 133-159, 2001, Kluwer Academic Press, Boston.
    • (2001) E-commerce Security and Privacy , pp. 133-159
    • Jajodia, S.1    Kudo, M.2    Subramanian, V.S.3
  • 19
    • 0016984825 scopus 로고
    • Protection in operating systems
    • M. Harrison, W. Ruzzo and J. Ullman. Protection in operating systems. CACM, pages 461-471,19(8), 1976.
    • (1976) CACM , vol.19 , Issue.8 , pp. 461-471
    • Harrison, M.1    Ruzzo, W.2    Ullman, J.3
  • 22
    • 0028678369 scopus 로고
    • Theft of information in the take-grant protection model
    • M. Bishop. Theft of information in the take-grant protection model. Journal of Computer Security, 3(4), pages 283-309, 1994/1995.
    • (1994) Journal of Computer Security , vol.3 , Issue.4 , pp. 283-309
    • Bishop, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.