메뉴 건너뛰기




Volumn 17, Issue 11, 2005, Pages 1557-1577

Secure interoperation in a multidomain environment employing RBAC policies

Author keywords

Multidomain; Policy integration; Role Based Access Control (RBAC); Secure interoperation

Indexed keywords

MULTIDOMAIN; POLICY INTEGRATION; ROLE-BASED ACCESS CONTROL; SECURE INTEROPERATION;

EID: 28244460211     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2005.185     Document Type: Article
Times cited : (195)

References (26)
  • 1
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations
    • MITRE Corp., Mar.
    • D. Bell and L. Lapadula, "Secure Computer Systems: Mathematical Foundations," Technical Report MTR-2547, vol. 1, MITRE Corp., Mar. 1973.
    • (1973) Technical Report , vol.1 MTR-2547
    • Bell, D.1    Lapadula, L.2
  • 5
    • 0033884687 scopus 로고    scopus 로고
    • Providing security and interoperation of heterogeneous systems
    • Aug.
    • S. Dawson, S. Qian, and P. Samarati, "Providing Security and Interoperation of Heterogeneous Systems," Distributed and Parallel Databases, vol. 8, pp. 119-145, Aug. 2000.
    • (2000) Distributed and Parallel Databases , vol.8 , pp. 119-145
    • Dawson, S.1    Qian, S.2    Samarati, P.3
  • 6
    • 0030087497 scopus 로고    scopus 로고
    • A MAC policy framework for multilevel relational databases
    • Feb.
    • X. Qian and T.F. Lunt, "A MAC Policy Framework for Multilevel Relational Databases," IEEE Trans. Knowledge and Data Eng., vol. 8, no. 1, pp. 3-15, Feb. 1996.
    • (1996) IEEE Trans. Knowledge and Data Eng. , vol.8 , Issue.1 , pp. 3-15
    • Qian, X.1    Lunt, T.F.2
  • 7
    • 0031611731 scopus 로고    scopus 로고
    • Formal specification for role based access control user/role and role/role relationship management
    • Oct.
    • S.I. Gavrila and J.F. Barkley, "Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management," Proc. Third ACM Workshop Role-Based Access Control, Oct. 1998.
    • (1998) Proc. Third ACM Workshop Role-based Access Control
    • Gavrila, S.I.1    Barkley, J.F.2
  • 8
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • E. Bertino, E. Ferrari, and V. Atluri, "The Specification and Enforcement of Authorization Constraints in Workflow Management Systems," ACM. Trans. Information and System Security, vol. 2, no. 1, pp. 65-104, 1999.
    • (1999) ACM. Trans. Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 10
    • 0010032891 scopus 로고    scopus 로고
    • Computational issues in secure inter-operation
    • Jan.
    • L. Gong and X. Qian, "Computational Issues in Secure Inter-operation," IEEE Trans. Software Eng., vol. 22, no. 1, Jan. 1996.
    • (1996) IEEE Trans. Software Eng. , vol.22 , Issue.1
    • Gong, L.1    Qian, X.2
  • 11
    • 0036565513 scopus 로고    scopus 로고
    • Product schema integration for electronic commerce-a synonym comparison approach
    • May/ June
    • G. Yan, W.K. Ng, and E. Lim, "Product Schema Integration for Electronic Commerce-A Synonym Comparison Approach," IEEE Trans. Knowledge and Data Eng., vol. 14, no. 3, pp. 583-598, May/ June 2002.
    • (2002) IEEE Trans. Knowledge and Data Eng. , vol.14 , Issue.3 , pp. 583-598
    • Yan, G.1    Ng, W.K.2    Lim, E.3
  • 13
    • 0035251598 scopus 로고    scopus 로고
    • Digital government security infrastructure design challenges
    • Feb.
    • J.B.D. Joshi, A. Ghafoor, W. Aref, and E.H. Spafford, "Digital Government Security Infrastructure Design Challenges," Computer, vol. 34, no. 2, pp. 66-72, Feb. 2001.
    • (2001) Computer , vol.34 , Issue.2 , pp. 66-72
    • Joshi, J.B.D.1    Ghafoor, A.2    Aref, W.3    Spafford, E.H.4
  • 17
    • 0033333334 scopus 로고    scopus 로고
    • Conflicts in policy-based distributed systems management
    • Nov.
    • E. Lupu and M. Sloman, "Conflicts in Policy-Based Distributed Systems Management," IEEE Trans. Software Eng., vol 25, no. 6, pp. 852-869, Nov. 1999.
    • (1999) IEEE Trans. Software Eng. , vol.25 , Issue.6 , pp. 852-869
    • Lupu, E.1    Sloman, M.2
  • 18
    • 0001768982 scopus 로고
    • Semantic integration in heterogeneous databases using neural networks
    • W.S. Li and C. Clifton, "Semantic Integration in Heterogeneous Databases Using Neural Networks," Proc. Very Large Data Bases Conf., 1994.
    • (1994) Proc. Very Large Data Bases Conf.
    • Li, W.S.1    Clifton, C.2
  • 19
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • Feb.
    • S.L. Osborn, R. Sandhu, and Q. Munawer, "Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies," ACM Trans. Information and System Security, vol. 3, no. 2, pp. 85-106, Feb. 2000.
    • (2000) ACM Trans. Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.L.1    Sandhu, R.2    Munawer, Q.3
  • 24
    • 0032120792 scopus 로고    scopus 로고
    • Bottom-up construction of ontologies
    • July/Aug.
    • V. Vet and N. Mars, "Bottom-Up Construction of Ontologies," IEEE Trans. Knowledge and Data Eng., vol. 10, no. 4, pp. 513-526, July/Aug. 1998.
    • (1998) IEEE Trans. Knowledge and Data Eng. , vol.10 , Issue.4 , pp. 513-526
    • Vet, V.1    Mars, N.2
  • 26
    • 0023023948 scopus 로고
    • A comparative analysis of methodologies for database schema integration
    • C. Batini, M. Lenzrini, and S.B. Navathe, "A Comparative Analysis of Methodologies for Database Schema Integration," ACM Computing Surveys, vol. 18, no. 4, pp. 323-364, 1986.
    • (1986) ACM Computing Surveys , vol.18 , Issue.4 , pp. 323-364
    • Batini, C.1    Lenzrini, M.2    Navathe, S.B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.