메뉴 건너뛰기




Volumn 6, Issue 2, 2003, Pages 232-257

Access control with IBM Tivoli Access Manager

Author keywords

Access control; Authorization management; Web servers; WWW security

Indexed keywords

ACCESS CONTROL; AUTHORIZATION MANAGEMENT; WEB SERVERS; WWW SECURITY;

EID: 2942624556     PISSN: 10949224     EISSN: None     Source Type: Journal    
DOI: 10.1145/762476.762479     Document Type: Article
Times cited : (62)

References (18)
  • 1
    • 0003272324 scopus 로고    scopus 로고
    • Uniform resource identifiers (URI): Generic syntax
    • BERNERS-LEE, T., FIELDING, R., AND MASINTER, L. 1998. Uniform resource identifiers (URI): Generic syntax. RFC 2396.
    • (1998) RFC , vol.2396
    • Berners-Lee, T.1    Fielding, R.2    Masinter, L.3
  • 3
    • 84957800809 scopus 로고    scopus 로고
    • KeyNote: Trust management for public-key infrastructures
    • Lecture Notes in Computer Science. Springer Verlag, Berlin
    • BLAZE, M., FEIGENBAUM, J., AND KEROMYTIS, A. 1999. KeyNote: Trust management for public-key infrastructures. In Security Protocols - 6th International Workshop. Lecture Notes in Computer Science, vol. 1550. Springer Verlag, Berlin, 59-66.
    • (1999) Security Protocols - 6th International Workshop , vol.1550 , pp. 59-66
    • Blaze, M.1    Feigenbaum, J.2    Keromytis, A.3
  • 5
    • 0002422823 scopus 로고    scopus 로고
    • A role-based access control model and reference implementation within a coprorate intranet
    • FERRAIOLO, D. F., BARKLEY, J. F., AND KUHN, D. R. 1999. A role-based access control model and reference implementation within a coprorate intranet. ACM Trans. Inf. Syst. Sec. 2, 1, 34-64.
    • (1999) ACM Trans. Inf. Syst. Sec. , vol.2 , Issue.1 , pp. 34-64
    • Ferraiolo, D.F.1    Barkley, J.F.2    Kuhn, D.R.3
  • 6
    • 0031332308 scopus 로고    scopus 로고
    • Implementing Chinese walls in Unix
    • FOLEY, S. 1997. Implementing Chinese Walls in Unix. Comput. Sec. J. 16, 6, 551-563.
    • (1997) Comput. Sec. J. , vol.16 , Issue.6 , pp. 551-563
    • Foley, S.1
  • 7
    • 0011795795 scopus 로고    scopus 로고
    • Provisional authorization
    • A. Ghosh, Ed. Kluwer Academic Publishers, Boston, MA
    • JAJODIA, S., KUDO, M., AND SUBRAHMAMAN, V. S. 2001. Provisional authorization. In E-commerce Security and Privacy, A. Ghosh, Ed. Kluwer Academic Publishers, Boston, MA, 133-159. Also published in Workshop on Security and Privacy in E-Commerce (WSPEC), 2000.
    • (2001) E-commerce Security and Privacy , pp. 133-159
    • Jajodia, S.1    Kudo, M.2    Subrahmaman, V.S.3
  • 8
    • 3142546908 scopus 로고    scopus 로고
    • JAJODIA, S., KUDO, M., AND SUBRAHMAMAN, V. S. 2001. Provisional authorization. In E-commerce Security and Privacy, A. Ghosh, Ed. Kluwer Academic Publishers, Boston, MA, 133-159. Also published in Workshop on Security and Privacy in E-Commerce (WSPEC), 2000.
    • (2000) Workshop on Security and Privacy in E-commerce (WSPEC)
  • 10
    • 0033685767 scopus 로고    scopus 로고
    • Authorization in CORBA security
    • KARJOTH, G. 2000. Authorization in CORBA security. J. Comput. Sec. 8, 2/3, 89-108.
    • (2000) J. Comput. Sec. , vol.8 , Issue.2-3 , pp. 89-108
    • Karjoth, G.1
  • 15
    • 84943611297 scopus 로고    scopus 로고
    • Authorization (AZN) API
    • THE OPEN GROUP. 2000. Authorization (AZN) API. Open Group Technical Standard C908.
    • (2000) Open Group Technical Standard , vol.C908
  • 18
    • 0032629460 scopus 로고    scopus 로고
    • A user-centered modular authorization service built on RBAC foundation
    • IEEE Computer Society Press, Los Alamitos, CA
    • ZURKO, M., SIMON, R., AND SANFILIPPO, T. 1999, A user-centered modular authorization service built on RBAC foundation. In IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA, 57-71.
    • (1999) IEEE Symposium on Research in Security and Privacy , pp. 57-71
    • Zurko, M.1    Simon, R.2    Sanfilippo, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.