메뉴 건너뛰기




Volumn 3433, Issue , 2005, Pages 225-237

Policies, models, and languages for access control

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; CONTROL SYSTEMS; DATA PROCESSING; DATABASE SYSTEMS; FORMAL LANGUAGES; INFORMATION TECHNOLOGY; MATHEMATICAL MODELS;

EID: 24644431553     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/978-3-540-31970-2_18     Document Type: Conference Paper
Times cited : (42)

References (35)
  • 6
    • 0036311802 scopus 로고    scopus 로고
    • A unified framework for regulating access and information release on the web
    • P. Bonatti and P. Samarati. A unified framework for regulating access and information release on the web. Journal of Computer Security, 10(3):241-272, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 241-272
    • Bonatti, P.1    Samarati, P.2
  • 14
    • 0038150613 scopus 로고    scopus 로고
    • An internet attribute certificate profile for authorization
    • April
    • S. Farrell and R. Housley. An internet attribute certificate profile for authorization. RFC 3281, April 2002.
    • (2002) RFC , vol.3281
    • Farrell, S.1    Housley, R.2
  • 15
  • 17
    • 0011795795 scopus 로고    scopus 로고
    • Provisional authorizations
    • Anup Ghosh, editor, Kluwer Academic Publishers, Boston
    • S. Jajodia, M. Kudo, and V.S. Subrahmanian. Provisional authorizations. In Anup Ghosh, editor, E-Commerce Security and Privacy, pages 133-159. Kluwer Academic Publishers, Boston, 2001.
    • (2001) E-commerce Security and Privacy , pp. 133-159
    • Jajodia, S.1    Kudo, M.2    Subrahmanian, V.S.3
  • 21
    • 0019608720 scopus 로고
    • Formal models for computer security
    • C.E. Landwehr. Formal models for computer security. ACM Computing Surveys, 13(3):247-278, 1981.
    • (1981) ACM Computing Surveys , vol.13 , Issue.3 , pp. 247-278
    • Landwehr, C.E.1
  • 22
    • 0041524661 scopus 로고    scopus 로고
    • Delegation logic: A logic-based approach to distributed authorization
    • February
    • N. Li, B.N. Grosof, and Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security, 6(1):128-171, February 2003.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.1 , pp. 128171
    • Li, N.1    Grosof, B.N.2    Feigenbaum3
  • 25
    • 0041177826 scopus 로고
    • Access control policies: Some unanswered questions
    • Franconia, NH, June
    • T. Lunt. Access control policies: Some unanswered questions. In IEEE Computer Security Foundations Workshop II, pages 227-245, Franconia, NH, June 1988.
    • (1988) IEEE Computer Security Foundations Workshop , vol.2 , pp. 227-245
    • Lunt, T.1
  • 29
    • 0005092487 scopus 로고
    • A model of authorization for next-generation database systems
    • March
    • F. Rabitti, E. Bertino, W. Kim, and D. Woelk. A model of authorization for next-generation database systems. ACM TODS, 16(1):89-131, March 1991.
    • (1991) ACM TODS , vol.16 , Issue.1 , pp. 89-131
    • Rabitti, F.1    Bertino, E.2    Kim, W.3    Woelk, D.4
  • 30
    • 84964853055 scopus 로고    scopus 로고
    • Access control: Policies, models, and mechanisms
    • R. Focardi and R. Gorrieri, editors, LNCS 2171. Springer-Verlag
    • P. Samarati and S. De Capitani di Vimercati. Access control: Policies, models, and mechanisms. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, LNCS 2171. Springer-Verlag, 2001.
    • (2001) Foundations of Security Analysis and Design
    • Samarati, P.1    De Capitani Di Vimercati, S.2
  • 35
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • February
    • T. Yu, M. Winslett, and K.E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security, 6(1):l-42, February 2003.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.1
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.