메뉴 건너뛰기




Volumn , Issue , 2005, Pages 159-167

SERAT: SEcure Role mApping Technique for decentralized secure interoperability

Author keywords

Access path; Collaboration; Decentralized secure interoperability; Path discovery; Role based access control

Indexed keywords

ALGORITHMS; COMPUTER SUPPORTED COOPERATIVE WORK; CONSTRAINT THEORY; DISTRIBUTED COMPUTER SYSTEMS; QUERY LANGUAGES; SECURITY OF DATA; WORLD WIDE WEB;

EID: 30644461515     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1063979.1064007     Document Type: Conference Paper
Times cited : (49)

References (8)
  • 3
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • February
    • E. Bertino, E. Ferrari, and V. Atluri, "The Specification and Enforcement of Authorization Constraints in Workflow Management Systems," ACM Transactions on Information and System Security., 2(1):65-104, February, 1999.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 8
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • February
    • R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, 21 (2), pp. 120-126, February 1978
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.