메뉴 건너뛰기




Volumn 39, Issue 11, 2005, Pages 1735-1739

User access control for networked manufacturing system

Author keywords

Access control; Authorization; Networked manufacturing; XACML

Indexed keywords

COMPUTER PROGRAMMING; HIERARCHICAL SYSTEMS; INFORMATION MANAGEMENT; SECURITY OF DATA;

EID: 30944468167     PISSN: 1008973X     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (2)

References (9)
  • 1
    • 30944454696 scopus 로고    scopus 로고
    • Research of key techniques in application service provider (ASP) based networked manufacturing system
    • Hangzhou: Zhejiang University
    • ZHENG Xiao-lin. Research of key techniques in application service provider (ASP) based networked manufacturing system[D]. Hangzhou: Zhejiang University, 2004: 1-72.
    • (2004) , pp. 1-72
    • Zheng, X.-L.1
  • 2
    • 56049116814 scopus 로고    scopus 로고
    • Application service providers (ASP)
    • CHERRY T C. Application service providers (ASP)[EB/OL]. http://www.cherrytreeco.com, 1999-10-14.
    • (1999)
    • Cherry, T.C.1
  • 3
    • 30944451994 scopus 로고    scopus 로고
    • Security for application service providers
    • GROVES J. Security for application service providers[J]. Network Security, 2001, (1): 6-9.
    • (2001) Network Security , Issue.1 , pp. 6-9
    • Groves, J.1
  • 4
    • 30944446649 scopus 로고    scopus 로고
    • Research on theory and application of role-based access control
    • Peking: Peking University
    • YU Shi-peng. Research on theory and application of role-based access control[D]. Peking: Peking University, 2003: 1-5.
    • (2003) , pp. 1-5
    • Yu, S.-P.1
  • 5
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • SANDHU R S, EDWARD J C, HAL L F, et al. Role-based access control models[J]. IEEE Computer, 1996, 29(2): 38-47.
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.S.1    Edward, J.C.2    Hal, L.F.3
  • 6
    • 3142647255 scopus 로고    scopus 로고
    • Practical way to implement role-based access control in security administration system
    • HUANG Yi-min, YANG Zi-jiang, PING Lin-di, et al. Practical way to implement role-based access control in security administration system[J]. Journal of Zhejiang University: Engineering Science, 2004, 38(4): 408-413.
    • (2004) Journal of Zhejiang University: Engineering Science , vol.38 , Issue.4 , pp. 408-413
    • Huang, Y.-M.1    Yang, Z.-J.2    Ping, L.-D.3
  • 7
    • 0002841051 scopus 로고    scopus 로고
    • Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management
    • Lake Tahoe: Chapman and Hall
    • THOMAS R K, SANDHU R S, Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management[A]. Proceedings of the IFIP WG11.3 Workshop on Database Security[C]. Lake Tahoe: Chapman and Hall, 1997: 166-181.
    • (1997) Proceedings of the IFIP WG11.3 Workshop on Database Security , pp. 166-181
    • Thomas, R.K.1    Sandhu, R.S.2
  • 9
    • 11044234857 scopus 로고    scopus 로고
    • XACML profile for role based access control (RBAC)
    • ANDERSON A. XACML profile for role based access control (RBAC)[EB/OL]. http://docs.oasis-open.org/xacml, 2004-02-13.
    • (2004)
    • Anderson, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.