메뉴 건너뛰기




Volumn 37, Issue 1, 2005, Pages 29-41

Access control in collaborative systems

Author keywords

Access control; Collaboration; Security models

Indexed keywords

ACCESS CONTROL; COLLABORATION; COLLABORATIVE SYSTEMS; SECURITY MODELS;

EID: 24344501341     PISSN: 03600300     EISSN: None     Source Type: Journal    
DOI: 10.1145/1057977.1057979     Document Type: Review
Times cited : (256)

References (39)
  • 1
    • 84956993736 scopus 로고    scopus 로고
    • Role-based authorization constraints specification
    • AHN, G.-J. AND SANDHU, R. 2000. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3, 4 (Nov.).
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.4 NOV
    • Ahn, G.-J.1    Sandhu, R.2
  • 3
    • 35048898774 scopus 로고    scopus 로고
    • Role-based privilege management using attribute certificates and delegation
    • Lecture Notes in Computer Science. Springer-Verlag
    • AHN, G.-J., SHIN, D., AND ZHANG, L. 2004. Role-based privilege management using attribute certificates and delegation. In International Conference on Trust and Privacy in Digital Business. Lecture Notes in Computer Science. Springer-Verlag.
    • (2004) International Conference on Trust and Privacy in Digital Business
    • Ahn, G.-J.1    Shin, D.2    Zhang, L.3
  • 5
    • 0002848811 scopus 로고    scopus 로고
    • Specification and enforcement of authorization constraints in workflow management systems
    • BERTINO, E., FERRARI, E., AND ATLURI, V. 1999. Specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2, 1 (Feb.).
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 FEB
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 9
    • 33645623929 scopus 로고    scopus 로고
    • An access control framework for multi-user collaborative environments
    • Phoenix, AZ
    • BULLOCK, A. AND BENFORD, S. 1999. An access control framework for multi-user collaborative environments. In ACM GROUP. Phoenix, AZ.
    • (1999) ACM GROUP
    • Bullock, A.1    Benford, S.2
  • 16
    • 0002422823 scopus 로고    scopus 로고
    • A role based access control model and reference implementation within a corporate intranet
    • FERRAIOLO, D. F., BARKLEY, J. F., AND KUHN, D. R. 1999. A role based access control model and reference implementation within a corporate intranet. ACM Trans. Inf. Syst. Secur. 2, 1 (Feb.).
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 FEB
    • Ferraiolo, D.F.1    Barkley, J.F.2    Kuhn, D.R.3
  • 18
    • 0023325798 scopus 로고
    • Data sharing in group work
    • GRIEF, I. AND SARIN, S. 1987. Data sharing in group work. ACM Trans. Inf. Syst. 5, 2 (April), 187-211.
    • (1987) ACM Trans. Inf. Syst. , vol.5 , Issue.2 APRIL , pp. 187-211
    • Grief, I.1    Sarin, S.2
  • 20
    • 0029426927 scopus 로고    scopus 로고
    • Requirements of role-based access control for collaborative systems
    • Gaithersburg, MD
    • JAEGER, T. AND PRAKASH, A. 1996. Requirements of role-based access control for collaborative systems. In ACM Role-based Access Control Workshop. Gaithersburg, MD. 53-64.
    • (1996) ACM Role-based Access Control Workshop , pp. 53-64
    • Jaeger, T.1    Prakash, A.2
  • 24
    • 3142654848 scopus 로고
    • Reprinted in
    • Reprinted in ACM Operat. Syst. Rev. 8, 1, 18-24, 1974.
    • (1974) ACM Operat. Syst. Rev. , vol.8 , Issue.1 , pp. 18-24
  • 27
    • 0028513932 scopus 로고
    • Access control: Principles and practice
    • SANDHU, R. AND SAMARATI, P. 1994. Access control: Principles and practice. IEEE Communications 32, 9, 40-48.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.1    Samarati, P.2
  • 32
    • 85016864383 scopus 로고
    • Integrating communication, cooperation, and awareness: The diva virtual office environment
    • Chapel Hill, NC
    • SOHLENKAMP, M. AND CHWELOS, G. 1994. Integrating communication, cooperation, and awareness: The diva virtual office environment. In ACM Conference on Computer Supported Cooperative Work. Chapel Hill, NC. 331-343.
    • (1994) ACM Conference on Computer Supported Cooperative Work , pp. 331-343
    • Sohlenkamp, M.1    Chwelos, G.2
  • 34
    • 0002841051 scopus 로고    scopus 로고
    • Task-based authorization controls (TBAC): Models for active and enterprise-oriented authorization management
    • T. Y. Lin and X. Qian, Eds. North-Holland
    • THOMAS, R. AND SANDHU, R. 1997. Task-based authorization controls (TBAC): Models for active and enterprise-oriented authorization management. In Database Security XI: Status and Prospects, T. Y. Lin and X. Qian, Eds. North-Holland.
    • (1997) Database Security XI: Status and Prospects
    • Thomas, R.1    Sandhu, R.2
  • 36
    • 0032620331 scopus 로고    scopus 로고
    • Team-and-role-based organizational context and access control for cooperative hypermedia environments
    • WANG, W. 1999. Team-and-role-based organizational context and access control for cooperative hypermedia environments. In ACM Hypertext.
    • (1999) ACM Hypertext
    • Wang, W.1
  • 37
    • 0035790651 scopus 로고    scopus 로고
    • A model of oasis role-based access control and its support for active security
    • ACM. Chantilly, VA
    • YAO, W., MOODY, K., AND BACON, J. 2001. A model of oasis role-based access control and its support for active security. In ACM Symposium on Access Control Model and Technology. ACM. Chantilly, VA.
    • (2001) ACM Symposium on Access Control Model and Technology
    • Yao, W.1    Moody, K.2    Bacon, J.3
  • 39
    • 3042684910 scopus 로고    scopus 로고
    • A rule-based framework for role-based delegation and revocation
    • ZHANG, L., AHN, G.-J., AND CHU, B. 2003. A rule-based framework for role-based delegation and revocation. ACM Trans. Inf. Syst. Secur. 6, 3 (Aug.).
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.3 AUG
    • Zhang, L.1    Ahn, G.-J.2    Chu, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.