메뉴 건너뛰기




Volumn , Issue , 2005, Pages 186-196

Nomad: A security model with non atomic actions and deadlines

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL MECHANISMS; ATOMIC ACTIONS; SECURITY MODELS; SECURITY POLICIES;

EID: 28144457207     PISSN: 10636900     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSFW.2005.20     Document Type: Conference Paper
Times cited : (52)

References (22)
  • 1
    • 0033685030 scopus 로고    scopus 로고
    • A petri net based safety analysis of workflow authorization models
    • V. Atluri and W.-K. Huang. A Petri Net Based Safety Analysis of Workflow Authorization Models. Journal of Computer Security, 8(2), 2000.
    • (2000) Journal of Computer Security , vol.8 , Issue.2
    • Atluri, V.1    Huang, W.-K.2
  • 2
    • 79952122841 scopus 로고    scopus 로고
    • Constitution et développement d'une logique de modalités aléthiques, déontiques, dynamiques, et temporelles en vue de la formalisation du raisonnement sur les actions et sur les normes
    • may
    • P. Balbiani. Constitution et développement d'une logique de modalités aléthiques, déontiques, dynamiques, et temporelles en vue de la formalisation du raisonnement sur les actions et sur les normes. In Troisièmes Journées Francophones - Modèles Formels de l'Interaction (MFI-05), may 2005.
    • (2005) Troisièmes Journées Francophones - Modèles Formels de L'Interaction (MFI-05)
    • Balbiani, P.1
  • 5
    • 0002848811 scopus 로고    scopus 로고
    • An approach for the specification and enforcement of authorization constraints in workflow management systems
    • February
    • E. Bertino, E. Ferrari, and V. Atluri. An Approach for the Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information Systems Security, 1(1), February 1999.
    • (1999) ACM Transactions on Information Systems Security , vol.1 , Issue.1
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 10
    • 28144443537 scopus 로고    scopus 로고
    • High level conflict management strategies in advanced access control models
    • Submitted to
    • F. Cuppens and N. Cuppens-Boulahia. High level conflict management strategies in advanced access control models. 2005. Submitted to CSFW'05.
    • (2005) CSFW'05
    • Cuppens, F.1    Cuppens-Boulahia, N.2
  • 12
    • 28144464967 scopus 로고    scopus 로고
    • Chapter 6: Completeness
    • K. Fine. Advanced Logic. Chapter 6: Completeness, http://www.nyu.edu/ gsas/dept/philo/courses/advlogic/, 2001.
    • (2001) Advanced Logic
    • Fine, K.1
  • 16
    • 33750942609 scopus 로고    scopus 로고
    • Timed and hybrid systems in Uppaal2k
    • June
    • K. Larsen and P. Pettersson. Timed and Hybrid Systems in Uppaal2k. In MOVEP'2k, June 2000.
    • (2000) MOVEP'2k
    • Larsen, K.1    Pettersson, P.2
  • 17
    • 84972542053 scopus 로고
    • A different approach to deontic logic: Deontic logic viewed as a variant of dynamic logic
    • J.-J. Meyer. A different approach to deontic logic: deontic logic viewed as a variant of dynamic logic. Notre Dame Journal of Formal Logic, 29(1): 109-136, 1988.
    • (1988) Notre Dame Journal of Formal Logic , vol.29 , Issue.1 , pp. 109-136
    • Meyer, J.-J.1
  • 21
    • 0002841051 scopus 로고    scopus 로고
    • Task-based Authorization Controls (TBAC): A family of models for active and enterprise-oriented authorization management
    • Lake Tahoe. California, USA
    • R. Thomas and R. Sandhu. Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management. In 11 th IFIP Working Conference on Database Security, Lake Tahoe. California, USA, 1997.
    • (1997) 11 Th IFIP Working Conference on Database Security
    • Thomas, R.1    Sandhu, R.2
  • 22
    • 0025441368 scopus 로고
    • A specification and verification method for preventing denial of service
    • June
    • C. Yu and V. Gligor. A specification and verification method for preventing denial of service. IEEE Transactions on Software Engineering, 16(6):581-592, June 1990.
    • (1990) IEEE Transactions on Software Engineering , vol.16 , Issue.6 , pp. 581-592
    • Yu, C.1    Gligor, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.