메뉴 건너뛰기




Volumn 48, Issue 1, 2005, Pages 46-66

A new formal model for privilege control with supporting POSIX capability mechanism

Author keywords

Capability; Domain; Formal model; Least privilege; Role

Indexed keywords


EID: 33744762747     PISSN: 10092757     EISSN: None     Source Type: Journal    
DOI: 10.1360/03yf0244     Document Type: Article
Times cited : (5)

References (25)
  • 1
    • 77954788286 scopus 로고
    • Improving the security of your UNIX system
    • SRI International, April
    • Curry, D. A., Improving the security of your UNIX system, Technology report ITSTD-721-FR-90-21, SRI International, April 1990.
    • (1990) Technology Report , vol.ITSTD-721-FR-90-21
    • Curry, D.A.1
  • 2
    • 33746338386 scopus 로고    scopus 로고
    • Addressing secrity issues in Linux
    • IBM server group. Addressing secrity issues in Linux, A Linux White Paper, 2000.
    • (2000) A Linux White Paper
  • 5
    • 84949201378 scopus 로고    scopus 로고
    • A framework for multiple authorization types in a healthcare application system
    • December
    • Chandramouli, R., A framework for multiple authorization types in a healthcare application system, in Proc. 17th Annual Computer Security Applications Conference, December 2001,137-148.
    • (2001) Proc. 17th Annual Computer Security Applications Conference , pp. 137-148
    • Chandramouli, R.1
  • 7
    • 0030086382 scopus 로고    scopus 로고
    • Role based access control models
    • February
    • Sandhu, R.S., Coyne, E. J., Feinstein, H. L. et al., Role based access control models, IEEE Computer, February 1996, 29(2): 38-47.
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.S.1    Coyne, E.J.2    Feinstein, H.L.3
  • 9
    • 0012367317 scopus 로고    scopus 로고
    • An operating system approach to securing e-services
    • Dalton, C., Choo, T. H., An operating system approach to securing e-services, Communication of the ACM, 2001, 44(2): 58-66.
    • (2001) Communication of the ACM , vol.44 , Issue.2 , pp. 58-66
    • Dalton, C.1    Choo, T.H.2
  • 10
    • 0025028340 scopus 로고
    • Naming and grouping privileges to simplify security management in large database
    • Baldwin, R. W., Naming and grouping privileges to simplify security management in large database, in Proceedings of IEEE Symposium on Security and Privacy, 1990, 116-132.
    • (1990) Proceedings of IEEE Symposium on Security and Privacy , pp. 116-132
    • Baldwin, R.W.1
  • 15
    • 0031346670 scopus 로고    scopus 로고
    • Mutual exclusion as a means of implementing separation of duty requirements in role-based access control systems
    • New York: ACM Press
    • Kuhn, D. R., Mutual exclusion as a means of implementing separation of duty requirements in role-based access control systems, in Proceedings of the 2nd ACM Workshop on Role-Based Access Control, New York: ACM Press, 1997, 23-30.
    • (1997) Proceedings of the 2nd ACM Workshop on Role-based Access Control , pp. 23-30
    • Kuhn, D.R.1
  • 17
    • 0031611731 scopus 로고    scopus 로고
    • Formal specification for role based access control user/role and role/role relationship management
    • New York: ACM Press
    • Gavrila, S. I., Barkley, J. F., Formal specification for role based access control user/role and role/role relationship management, in Proceedings of the 3nd ACM Workshop on Role-Based Access Control, New York: ACM Press, 1998, 81-90.
    • (1998) Proceedings of the 3nd ACM Workshop on Role-based Access Control , pp. 81-90
    • Gavrila, S.I.1    Barkley, J.F.2
  • 18
    • 0002422823 scopus 로고    scopus 로고
    • A role-based access control model and reference implementation within a corporate intranet
    • February
    • Ferraiolo, D. F., Barkley, J. F., Kuhn, D. R., A role-based access control model and reference implementation within a corporate intranet, ACM Transactions on Infoemation and System Security, February 1999, 2(1): 34-64.
    • (1999) ACM Transactions on Infoemation and System Security , vol.2 , Issue.1 , pp. 34-64
    • Ferraiolo, D.F.1    Barkley, J.F.2    Kuhn, D.R.3
  • 21
    • 33748161983 scopus 로고    scopus 로고
    • Configuring the SELinux policy
    • NAI Labs, June
    • Smalley, S. D., Configuring the SELinux policy, Technical report#02-007, NAI Labs, June 2002.
    • (2002) Technical Report#02-007 , vol.2 , Issue.7
    • Smalley, S.D.1
  • 23
    • 33746363362 scopus 로고
    • Modeling database security requirements
    • (ed. Landwehr, C. E.), Amsterdam: North-Holland
    • Haigh, J.T., Modeling database security requirements, in Database Security: Status and Prospects (ed. Landwehr, C. E.), Amsterdam: North-Holland, 1988, 45-56.
    • (1988) Database Security: Status and Prospects , pp. 45-56
    • Haigh, J.T.1
  • 24
    • 1242282117 scopus 로고
    • Role-based application design and enforcement
    • (eds. Jajodia, S., Landwehr, Carl, E.), Amsterdam: North-Holland
    • Thomsen, D. J., Role-based application design and enforcement, in Database Security, IV: Status and Prospects (eds. Jajodia, S., Landwehr, Carl, E.), Amsterdam: North-Holland 1991, 151-168.
    • (1991) Database Security, IV: Status and Prospects , pp. 151-168
    • Thomsen, D.J.1
  • 25
    • 2442425355 scopus 로고    scopus 로고
    • Integrating flexiable support for security policies into the Linux operating system
    • NAI Labs, April
    • Loscocco, P. A., Smalley, S. D., Integrating flexiable support for security policies into the Linux operating system, Technical report, NAI Labs, April 2001.
    • (2001) Technical Report
    • Loscocco, P.A.1    Smalley, S.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.