메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 196-205

Verification and change-impact analysis of access-control policies

Author keywords

Access control policies; Change impact analysis; Decision diagram; Verification; XACML

Indexed keywords

ACCESS CONTROL POLICIES; CHANGE IMPACT ANALYSIS; DECISION DIAGRAM; XACML;

EID: 33244470893     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSE.2005.1553562     Document Type: Conference Paper
Times cited : (291)

References (31)
  • 2
    • 33244479658 scopus 로고    scopus 로고
    • Technical report, OASIS, Mar. Document identifier: wd-xacml-wspleval-03
    • A. Anderson. Evaluating XACML as a policy language. Technical report, OASIS, Mar. 2003. Document identifier: wd-xacml-wspleval-03.
    • (2003) Evaluating XACML As A Policy Language
    • Anderson, A.1
  • 5
    • 0022769976 scopus 로고
    • Graph based algorithms for boolean function manipulation
    • R. E. Bryant. Graph based algorithms for boolean function manipulation. IEEE Transactions on Computers, C35(8):677-691, 1986.
    • (1986) IEEE Transactions on Computers , vol.C35 , Issue.8 , pp. 677-691
    • Bryant, R.E.1
  • 6
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • D. D. Clark and D. R. Wilson. A comparison of commercial and military computer security policies. In IEEE Symposium of Security and Privacy, pages 184-194, 1987.
    • (1987) IEEE Symposium of Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 10
    • 24644452174 scopus 로고    scopus 로고
    • Model-checking access control policies
    • Lecture Notes in Computer Science. Springer-Verlag, Sept.
    • D. P. Guelev, M. D. Ryan, and P.-Y. Schobbens. Model-checking access control policies. In Information Security Conference, Lecture Notes in Computer Science. Springer-Verlag, Sept. 2004.
    • (2004) Information Security Conference
    • Guelev, D.P.1    Ryan, M.D.2    Schobbens, P.-Y.3
  • 13
    • 33244469750 scopus 로고    scopus 로고
    • Enabling complex UI in Web applications with send/suspend/dispatch
    • P. W. Hopkins. Enabling complex UI in Web applications with send/suspend/dispatch. In Scheme Workshop, 2003.
    • (2003) Scheme Workshop
    • Hopkins, P.W.1
  • 17
    • 0032010255 scopus 로고    scopus 로고
    • Isomorph-free model enumeration: A new method for checking relational specifications
    • Mar.
    • D. Jackson, S. Jha, and C. A. Damon. Isomorph-free model enumeration: A new method for checking relational specifications. ACM Transactions on Programming Languages and Systems, 20(2):302-343, Mar. 1998.
    • (1998) ACM Transactions on Programming Languages and Systems , vol.20 , Issue.2 , pp. 302-343
    • Jackson, D.1    Jha, S.2    Damon, C.A.3
  • 23
    • 33244491046 scopus 로고    scopus 로고
    • Tools and techniques for analyzing type enforcement policies in security enhanced Linux
    • Dec.
    • F. Mayer. Tools and techniques for analyzing type enforcement policies in security enhanced Linux. In Annual Computer Security Applications Conference, Dec. 2003.
    • (2003) Annual Computer Security Applications Conference
    • Mayer, F.1
  • 29
    • 0242625217 scopus 로고    scopus 로고
    • A lightweight approach to specification and analysis of role-based access control extensions
    • A. Schaad and J. D. Moffett. A lightweight approach to specification and analysis of role-based access control extensions. In Symposium on Access Control Models and Technologies, pages 13-22, 2002.
    • (2002) Symposium on Access Control Models and Technologies , pp. 13-22
    • Schaad, A.1    Moffett, J.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.