메뉴 건너뛰기




Volumn , Issue , 2005, Pages 58-67

Secure collaboration in mediator-free environments

Author keywords

Access Path; Collaboration; Decentralized Secure Interoperability; Path Discovery; Role Based Access Control

Indexed keywords

ALGORITHMS; DECISION SUPPORT SYSTEMS; INTERNET; INTEROPERABILITY; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; VIRTUAL REALITY;

EID: 33745771515     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1102120.1102130     Document Type: Conference Paper
Times cited : (57)

References (25)
  • 2
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations
    • March
    • D. Bell and L. LaPadula. Secure Computer Systems: Mathematical Foundations. Technical Report MTR-2547, 1, March 1973.
    • (1973) Technical Report , vol.MTR-2547 , pp. 1
    • Bell, D.1    LaPadula, L.2
  • 3
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Feb
    • E. Bertino, E. Ferrari, and V. Atluri. The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information and Systems Security, 2(1):65-104, Feb 1999.
    • (1999) ACM Transactions on Information and Systems Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 7
    • 0033884687 scopus 로고    scopus 로고
    • Providing security and interoperation of heterogeneous systems
    • S. Dawson, S. Qian, and P. Samarati. Providing Security and Interoperation of Heterogeneous Systems. Distributed Parallel Databases, 8(1):119-145, 2000.
    • (2000) Distributed Parallel Databases , vol.8 , Issue.1 , pp. 119-145
    • Dawson, S.1    Qian, S.2    Samarati, P.3
  • 8
    • 18744384084 scopus 로고    scopus 로고
    • Special issue on adaptive complex enterprises
    • May
    • A. Desai and N. Awad. Special Issue on Adaptive Complex Enterprises. Communications of ACM, 48(5), May 2005.
    • (2005) Communications of ACM , vol.48 , Issue.5
    • Desai, A.1    Awad, N.2
  • 11
    • 0027969913 scopus 로고
    • The complexity and composability of secure interoperation
    • IEEE Computer Society
    • L. Gong and X. Qian. The Complexity and Composability of Secure Interoperation. In Proceedings of IEEE Symposium on Security and Privacy, pages 190-200. IEEE Computer Society, 1994.
    • (1994) Proceedings of IEEE Symposium on Security and Privacy , pp. 190-200
    • Gong, L.1    Qian, X.2
  • 14
    • 0001341422 scopus 로고    scopus 로고
    • DSR: The dynamic source routing protocol for multihop wireless adhoc networks
    • D. Johnson, D. Maltz, and J. Broch. DSR: The Dynamic Source Routing Protocol for Multihop Wireless Adhoc Networks. Ad hoc networking, pages 139-172, 2001.
    • (2001) Ad Hoc Networking , pp. 139-172
    • Johnson, D.1    Maltz, D.2    Broch, J.3
  • 21
    • 18744397572 scopus 로고    scopus 로고
    • IT-enabled sense-and-respond strategies in complex public organizations
    • May
    • R. Ramnath and D. Landsbergen. IT-Enabled Sense-and-Respond Strategies in Complex Public Organizations. Communications of ACM, 48(5):58-64, May 2005.
    • (2005) Communications of ACM , vol.48 , Issue.5 , pp. 58-64
    • Ramnath, R.1    Landsbergen, D.2
  • 22
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb
    • R. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, Feb 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 24
    • 0031357551 scopus 로고    scopus 로고
    • Authorization specification and enforcement in federated database systems
    • S. Vimercati and P. Samarati. Authorization Specification and Enforcement in Federated Database Systems. Journal of Computer Security, 5(2):155-188, 1997.
    • (1997) Journal of Computer Security , vol.5 , Issue.2 , pp. 155-188
    • Vimercati, S.1    Samarati, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.