메뉴 건너뛰기




Volumn 46, Issue 11, 2004, Pages 729-737

Dynamic adaptation to object state change in an information flow control model

Author keywords

Information flow control; Information security; Object oriented systems; Role based access control

Indexed keywords

CONTROL SYSTEMS; DATA REDUCTION; DATA TRANSFER; MATHEMATICAL MODELS; OBJECT ORIENTED PROGRAMMING; SECURITY OF DATA;

EID: 2542437254     PISSN: 09505849     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infsof.2003.12.006     Document Type: Article
Times cited : (6)

References (43)
  • 8
    • 0003853254 scopus 로고    scopus 로고
    • A purposed-oriented access control model in object-based systems
    • Tachikawa T., Yasuda M., Takizawa M. A purposed-oriented access control model in object-based systems. Trans. Inf. Process. Soc. Jpn. 38:(11):1997;2362-2369.
    • (1997) Trans. Inf. Process. Soc. Jpn , vol.38 , Issue.11 , pp. 2362-2369
    • Tachikawa, T.1    Yasuda, M.2    Takizawa, M.3
  • 14
    • 0001048139 scopus 로고    scopus 로고
    • Protecting privacy using the decentralized label model
    • Myers A., Liskov B. Protecting privacy using the decentralized label model. ACM Trans. Software Engng Methodol. 9:(4):2000;410-442.
    • (2000) ACM Trans. Software Engng Methodol. , vol.9 , Issue.4 , pp. 410-442
    • Myers, A.1    Liskov, B.2
  • 16
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and multics interpretation
    • Mitre Corporation, March
    • D.E. Bell, L.J. LaPadula, Secure Computer Systems: Unified Exposition and Multics Interpretation, Technique Report, Mitre Corporation, March 1976, http://csrc.nist.gov/publications/history/bell76.pdf .
    • (1976) Technique Report
    • Bell, D.E.1    LaPadula, L.J.2
  • 17
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • Denning D.E. A lattice model of secure information flow. Commun. ACM. 19:(5):1976;236-243.
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 18
    • 0017517624 scopus 로고
    • Certification of program for secure information flow
    • Denning D.E., Denning P.J. Certification of program for secure information flow. Commun. ACM. 20:(7):1977;504-513.
    • (1977) Commun. ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 22
    • 0026910016 scopus 로고
    • Multilevel security in the UNIX tradition
    • McIlroy M.D., Reeds J.A. Multilevel security in the UNIX tradition. Software - Practice Exp. 22:(8):1992;673-694.
    • (1992) Software - Practice Exp. , vol.22 , Issue.8 , pp. 673-694
    • Mcilroy, M.D.1    Reeds, J.A.2
  • 26
    • 1242320313 scopus 로고    scopus 로고
    • Embedding role-based access control model in object-oriented systems to protect privacy
    • to appear in the
    • S.-C. Chou, Embedding role-based access control model in object-oriented systems to protect privacy, to appear in the Journal of Systems and Software.
    • Journal of Systems and Software
    • Chou, S.-C.1
  • 27
    • 0031232270 scopus 로고    scopus 로고
    • A role-based access control for intranet security
    • Tari Z., Chan S.-W. A role-based access control for intranet security. IEEE Internet Comput. 1:(5):1997;24-34.
    • (1997) IEEE Internet Comput , vol.1 , Issue.5 , pp. 24-34
    • Tari, Z.1    Chan, S.-W.2
  • 32
  • 34
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • Osborn S., Sandhu R., Munawer Q. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Security. 3:(2):2000;85-106.
    • (2000) ACM Trans. Inf. Syst. Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 43
    • 0001439194 scopus 로고    scopus 로고
    • The compositional security checker: A tool for the verification of information flow security properties
    • Focardi R., Gorrieri R. The compositional security checker: a tool for the verification of information flow security properties. IEEE Trans. Software Engng. 23:(9):1997;550-571.
    • (1997) IEEE Trans. Software Engng , vol.23 , Issue.9 , pp. 550-571
    • Focardi, R.1    Gorrieri, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.