메뉴 건너뛰기




Volumn 6, Issue 3, 2003, Pages 404-441

A Rule-Based Framework for Role-Based Delegation and Revocation

Author keywords

access control; delegation; Management; revocation; Role; rule based; Security

Indexed keywords


EID: 3042684910     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/937527.937530     Document Type: Article
Times cited : (172)

References (29)
  • 3
    • 84956993736 scopus 로고    scopus 로고
    • Role-based authorization constraints specification
    • ACM (November
    • Ahn, G., Sandhu, R., 2000. Role-based authorization constraints specification.ACM Transactions on Information and System Security 3, 4, ACM (November) 207-226.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.4 , pp. 207-226
    • Ahn, G.1    Sandhu, R.2
  • 4
    • 84982994153 scopus 로고    scopus 로고
    • Distributed access-rights management with delegation certificates
    • J. Vitec and C. Jensen Eds. Springer, Berlin
    • Aura, T., 1999. Distributed access-rights management with delegation certificates.Security Internet programming. J. Vitec and C. Jensen Eds. Springer, Berlin, 211-235.
    • (1999) Security Internet programming. , pp. 211-235
    • Aura, T.1
  • 9
    • 84982899264 scopus 로고    scopus 로고
    • The role of trust management in distributed system security
    • J. Vitec and C. Jensen, eds. Springer, Berlin
    • Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A., 1999. The role of trust management in distributed system security.Security Internet Programming. J. Vitec and C. Jensen, eds. Springer, Berlin, 185-210.
    • (1999) Security Internet Programming. , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.4
  • 10
    • 0002422823 scopus 로고    scopus 로고
    • A role-based access control model and reference implementation within a corporate intranet
    • 1(February
    • Ferraiolo, D., Barkley, J., Kuhn, D. R., 1999. A role-based access control model and reference implementation within a corporate intranet.ACM Transactions on Information and System Security 2, 1(February), 34-64.
    • (1999) ACM Transactions on Information and System Security , vol.2 , pp. 34-64
    • Ferraiolo, D.1    Barkley, J.2    Kuhn, D.R.3
  • 17
    • 0031650454 scopus 로고    scopus 로고
    • OASIS: access control in an open, distributed environment
    • Oakland, CA, May 3-6. IEEE Computer Society Press, Los Alamitos, CA
    • Hayton, R., Bacon, J., Moody, K., 1998. OASIS: access control in an open, distributed environment. In Proceedings of 1998 IEEE Symposium on Security and Privacy. Oakland, CA, May 3-6. IEEE Computer Society Press, Los Alamitos, CA, 3-14.
    • (1998) Proceedings of 1998 IEEE Symposium on Security and Privacy. , pp. 3-14
    • Hayton, R.1    Bacon, J.2    Moody, K.3
  • 20
    • 0032671779 scopus 로고    scopus 로고
    • A logic-based knowledge representation for authorization with delegation (extended abstract)
    • extended version is IBM Research Report RC 21492
    • Li, N., Feigenbaum, J., Grosof, B. N., 1999. A logic-based knowledge representation for authorization with delegation (extended abstract). In Proceeding 12th intl. IEEE Computer Security Foundations Workshop, (extended version is IBM Research Report RC 21492).
    • (1999) Proceeding 12th intl. IEEE Computer Security Foundations Workshop
    • Li, N.1    Feigenbaum, J.2    Grosof, B.N.3
  • 23
    • 0012077289 scopus 로고    scopus 로고
    • Attribute certification: an enabling technology for delegation and role-based controls in distributed environments
    • Linn, J., Nystrom, M., 1999. Attribute certification: an enabling technology for delegation and role-based controls in distributed environments.ACM Workshop on Role-Based Access Control 121-130.
    • (1999) ACM Workshop on Role-Based Access Control , pp. 121-130
    • Linn, J.1    Nystrom, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.