메뉴 건너뛰기




Volumn 79, Issue 4, 2006, Pages 507-522

Managing role relationships in an information flow control model

Author keywords

Indirect information leakage; Information flow control; Prevent information leakage; Role relationship; Security

Indexed keywords

DATA TRANSFER; INFORMATION ANALYSIS; INFORMATION DISSEMINATION; MATHEMATICAL MODELS;

EID: 33645164231     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2005.04.008     Document Type: Article
Times cited : (4)

References (31)
  • 1
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and multics interpretation
    • Mitre Corporation
    • Bell, D.E., LaPadula, L.J., 1976. Secure computer systems: unified exposition and multics interpretation. Technique Report, Mitre Corporation. Available from: .
    • (1976) Technique Report
    • Bell, D.E.1    Lapadula, L.J.2
  • 4
    • 1242320313 scopus 로고    scopus 로고
    • Embedding role-based access control model in object-oriented systems to protect privacy
    • S.-C. Chou Embedding role-based access control model in object-oriented systems to protect privacy Journal of Systems and Software 71 1-2 2004 143 161
    • (2004) Journal of Systems and Software , vol.71 , Issue.1-2 , pp. 143-161
    • Chou, S.-C.1
  • 5
    • 2542437254 scopus 로고    scopus 로고
    • Dynamic adaptation to object state change in an information flow control model
    • S.-C. Chou Dynamic adaptation to object state change in an information flow control model Information and Software Technology 46 11 2004 729 737
    • (2004) Information and Software Technology , vol.46 , Issue.11 , pp. 729-737
    • Chou, S.-C.1
  • 6
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D.E. Denning A lattice model of secure information flow Communications of the ACM 19 5 1976 236 243
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 7
    • 0017517624 scopus 로고
    • Certification of program for secure information flow
    • D.E. Denning, and P.J. Denning Certification of program for secure information flow Communications of the ACM 20 7 1977 504 513
    • (1977) Communications of the ACM , vol.20 , Issue.7 , pp. 504-513
    • Denning, D.E.1    Denning, P.J.2
  • 21
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • S. Osborn, R. Sandhu, and Q. Munawer Configuring role-based access control to enforce mandatory and discretionary access control policies ACM Transactions on Information and System Security 3 2 2000 85 106
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 24
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • R.S. Sandhu Lattice-based access control models IEEE Computer 26 11 1993 9 19
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 27
    • 0002841051 scopus 로고    scopus 로고
    • Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management
    • Thomas, R.K., Sandhu, R.S., 1997. Task-based authorization controls (TBAC): a family of models for active and enterprise-oriented authorization management. In: Proceedings of the IFIP WG11.3 Workshop on Database Security.
    • (1997) Proceedings of the IFIP WG11.3 Workshop on Database Security
    • Thomas, R.K.1    Sandhu, R.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.