메뉴 건너뛰기




Volumn 7, Issue 1, 2004, Pages 128-174

The UCON ABC usage control model

Author keywords

Access control; Digital rights management; Privacy; Trust; Usage control

Indexed keywords

ACCESS CONTROL; CORE MODELS; DIGITAL RIGHTS MANAGEMENT (DRM); PRIVACY; TRUST; USAGE CONTROL;

EID: 3142523603     PISSN: 10949224     EISSN: None     Source Type: Journal    
DOI: 10.1145/984334.984339     Document Type: Article
Times cited : (820)

References (44)
  • 1
    • 0027667638 scopus 로고
    • A calculus for access control in distributed systems
    • ABADI, M., BURROWS, M., AND LAMPSON, B. 1993. A calculus for access control in distributed systems. ACM TOPLAS 15, 4, 706-734.
    • (1993) ACM TOPLAS , vol.15 , Issue.4 , pp. 706-734
    • Abadi, M.1    Burrows, M.2    Lampson, B.3
  • 5
    • 3142618544 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • MTR 2547, November
    • BELL, D. AND LAPADULA, L. 1973. Secure computer systems: Mathematical foundations and model. MITRE Report, MTR 2547, v2, November.
    • (1973) MITRE Report , vol.2
    • Bell, D.1    LaPadula, L.2
  • 13
    • 0016984825 scopus 로고
    • Protection in operating systems
    • HARRISON, M. H., RUZZO, W. L., AND ULLMAN, J. D. 1976. Protection in operating systems. CACM 19, 8, 461-471.
    • (1976) CACM , vol.19 , Issue.8 , pp. 461-471
    • Harrison, M.H.1    Ruzzo, W.L.2    Ullman, J.D.3
  • 22
    • 3142654848 scopus 로고
    • Reprinted
    • LAMPSON, B. W. 1971. Protection. 5th Princeton Symposium on Information Science and Systems. Reprinted in ACM Operating Systems Review 8, 1, 18-24, 1974
    • (1974) ACM Operating Systems Review , vol.8 , Issue.1 , pp. 18-24
  • 23
    • 84861590861 scopus 로고    scopus 로고
    • Key challenges in DRM: An industry perspective
    • (in conjunction with ACM CCS Conference) November
    • LAMACCHIA, B. 2002. Key challenges in DRM: An industry perspective. Proceedings of the 2nd ACM DRM Workshop (in conjunction with ACM CCS Conference) November.
    • (2002) Proceedings of the 2nd ACM DRM Workshop
    • LaMacchia, B.1
  • 31
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • Nov.
    • SANDHU, R. 1993. Lattice-based access control models. IEEE Computer (Nov.), 9-19.
    • (1993) IEEE Computer , pp. 9-19
    • Sandhu, R.1
  • 32
    • 0033645573 scopus 로고    scopus 로고
    • Engineering authority and trust in cyberspace: The OM-AM and RBAC way
    • Berlin, Germany, July 26-28
    • SANDHU, R. 2000. Engineering authority and trust in cyberspace: The OM-AM and RBAC way. Proceedings of the 5th ACM Workshop on Role-Based Access Control, Berlin, Germany, July 26-28, 111-119.
    • (2000) Proceedings of the 5th ACM Workshop on Role-based Access Control , pp. 111-119
    • Sandhu, R.1
  • 36
    • 0032657326 scopus 로고    scopus 로고
    • Persistent access control to prevent piracy of digital information
    • July
    • SCHNECK, P. 1999. Persistent access control to prevent piracy of digital information. Proceedings of the IEEE 87, 7 (July).
    • (1999) Proceedings of the IEEE , vol.87 , Issue.7
    • Schneck, P.1
  • 44
    • 3142652650 scopus 로고    scopus 로고
    • Personal communication
    • ZHANG, X. 2004. Personal communication.
    • (2004)
    • Zhang, X.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.