메뉴 건너뛰기




Volumn , Issue , 2005, Pages 59-66

A fine-grained, controllable, user-to-user delegation method in RBAC

Author keywords

Access control; Delegation; RBAC; Revocation

Indexed keywords

CONSTRAINT THEORY; RESEARCH;

EID: 30644480988     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1063979.1063991     Document Type: Conference Paper
Times cited : (73)

References (18)
  • 1
    • 0008724838 scopus 로고    scopus 로고
    • An authorization model for temporal and derived data: Securing information portals
    • Vijayalakshmi Atluri and Avigdor Gal. An authorization model for temporal and derived data: securing information portals. ACM Trans. Inf. Syst. Secur., 5(1):62-94, 2002.
    • (2002) ACM Trans. Inf. Syst. Secur. , vol.5 , Issue.1 , pp. 62-94
    • Atluri, V.1    Gal, A.2
  • 2
    • 84865788031 scopus 로고    scopus 로고
    • A model of OASIS role-based access control and its support for active security
    • Jean Bacon, Ken Moody, and Walt Yao. A model of OASIS role-based access control and its support for active security. ACM Trans. Inf. Syst. Secur., 5(4):492-540, 2002.
    • (2002) ACM Trans. Inf. Syst. Secur. , vol.5 , Issue.4 , pp. 492-540
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 5
    • 0038062314 scopus 로고    scopus 로고
    • Complexity and expressive power of logic programming
    • Evgeny Dantsin, Thomas Eiter, Georg Gottlob, and Andrei Voronkov. Complexity and expressive power of logic programming. ACM Comput. Surv., 33(3):374-425, 2001.
    • (2001) ACM Comput. Surv. , vol.33 , Issue.3 , pp. 374-425
    • Dantsin, E.1    Eiter, T.2    Gottlob, G.3    Voronkov, A.4
  • 6
    • 0018008817 scopus 로고
    • On an authorization mechanism
    • Ronald Fagin. On an authorization mechanism. ACM Trans. Database Syst., 3(3):310-319, 1978.
    • (1978) ACM Trans. Database Syst. , vol.3 , Issue.3 , pp. 310-319
    • Fagin, R.1
  • 8
    • 84976657250 scopus 로고
    • An authorization mechanism for a relational database system
    • Patricia P. Griffiths and Bradford W. Wade. An authorization mechanism for a relational database system. ACM Transactions on Database Systems (TODS), 1(3):242-255, 1976.
    • (1976) ACM Transactions on Database Systems (TODS) , vol.1 , Issue.3 , pp. 242-255
    • Griffiths, P.P.1    Wade, B.W.2
  • 11
    • 84947436665 scopus 로고    scopus 로고
    • Resolving conflicts in authorization delegations
    • 7th Australian Conference on Information Security and Privacy, Springer
    • Chun Ruan and Vijay Varadharajan. Resolving conflicts in authorization delegations. In 7th Australian Conference on Information Security and Privacy, volume 2384 of Lecture Notes in Computer Science, pages 271-285. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2384 , pp. 271-285
    • Ruan, C.1    Varadharajan, V.2
  • 16
    • 35248894984 scopus 로고    scopus 로고
    • Fidelis: A policy-driven trust management framework
    • Trust Management. First International Conference, iTrust, Springer
    • Walt Yao. Fidelis: A policy-driven trust management framework. In Trust Management. First International Conference, iTrust, volume 2692 of Lecture Notes in Computer Science, pages 301-317. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2692 , pp. 301-317
    • Yao, W.1
  • 17
    • 3042684910 scopus 로고    scopus 로고
    • A rule-based framework for role-based delegation and revocation
    • Longlma Zhang. Gail-Joon Ahn. and Bei-Tseng Chu. A rule-based framework for role-based delegation and revocation. ACM Trans. Inf. Syst. Secur., 6(3):404-441, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.3 , pp. 404-441
    • Zhang, L.1    Ahn, G.-J.2    Chu, B.-T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.