메뉴 건너뛰기




Volumn , Issue , 2005, Pages 11-20

Composing and combining policies under the policy machine

Author keywords

Access control; Multi level security; Role based access control; Separation of duty

Indexed keywords

ACCESS CONTROL; MULTI-LEVEL SECURITY; ROLE BASED ACCESS CONTROL; SEPARATION OF DUTY;

EID: 30644479584     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1063979.1063982     Document Type: Conference Paper
Times cited : (23)

References (14)
  • 1
    • 8744240653 scopus 로고    scopus 로고
    • National Commission on Terrorist Attacks Upon the United States. The 9/ 11 Commission Report, 2004.
    • (2004) The 9/11 Commission Report
  • 2
    • 0004200684 scopus 로고
    • Computer security technology planning study
    • US Air Force Electronic Systems Div., Hanscom AFB
    • Anderson, J.P., Computer Security Technology Planning Study, Tech Report ESD-TR-73-51, US Air Force Electronic Systems Div., Hanscom AFB, 1972.
    • (1972) Tech Report , vol.ESD-TR-73-51
    • Anderson, J.P.1
  • 4
    • 0016555241 scopus 로고    scopus 로고
    • The protection of information in computer systems
    • September 1975
    • Jerome H. Saltzer and Michael D. Schroeder. The protection of information in computer systems. Proc. IEEE, 63, 9 (September 1975), 1278-1308.
    • Proc. IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 8
    • 0002422823 scopus 로고    scopus 로고
    • A role based access control model and reference implementation within a corporate intranet
    • February
    • D.F. Ferraiolo, J. Barkley, D.R. Kuhn, A Role Based Access Control Model and Reference Implementation within a Corporate Intranet, ACM Transactions on Information Systems Security, 1, 2 (February 1999), 34-64.
    • (1999) ACM Transactions on Information Systems Security , vol.1 , Issue.2 , pp. 34-64
    • Ferraiolo, D.F.1    Barkley, J.2    Kuhn, D.R.3
  • 9
    • 0003400255 scopus 로고
    • Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Hanscom Air Force Base, Bedford, Massachusetts, (April)
    • K. J. Biba. Integrity Considerations for Secure Computer Systems. Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Hanscom Air Force Base, Bedford, Massachusetts, (April 1977).
    • (1977) Integrity Considerations for Secure Computer Systems
    • Biba, K.J.1
  • 10
    • 0038967795 scopus 로고    scopus 로고
    • Role-based access control and the access control matrix
    • G. Saunders. Role-Based Access Control and the Access Control Matrix. ACM SIGOPS Operating System and Review, 35, 4 (2001), 6-20.
    • (2001) ACM SIGOPS Operating System and Review , vol.35 , Issue.4 , pp. 6-20
    • Saunders, G.1
  • 11
    • 0030419725 scopus 로고    scopus 로고
    • A domain and type enforcement prototype
    • L. Badger, et al. A Domain and Type Enforcement Prototype. Computing Systems, 9, 1 (1996), 47-83.
    • (1996) Computing Systems , vol.9 , Issue.1 , pp. 47-83
    • Badger, L.1
  • 13
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • May
    • S. Osborn, R. Sandhu, and Q. Munawer. Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies, ACM Transactions on Information and Systems Security, 3, 2 (May 2002), 85-106.
    • (2002) ACM Transactions on Information and Systems Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.