메뉴 건너뛰기




Volumn 4127 LNCS, Issue , 2006, Pages 179-193

Term rewriting for access control

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; DATA PRIVACY; MATHEMATICAL MODELS; HIERARCHICAL SYSTEMS; SECURITY OF DATA;

EID: 33746684330     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11805588_13     Document Type: Conference Paper
Times cited : (32)

References (33)
  • 2
    • 3042601656 scopus 로고    scopus 로고
    • Protocol analysis in intrusion detection using decision tree
    • T. Abbes, A. Bouhoula, and M. Rusinowitch. Protocol analysis in intrusion detection using decision tree. In Proc. ITCC'04, pages 404-408, 2004.
    • (2004) Proc. ITCC'04 , pp. 404-408
    • Abbes, T.1    Bouhoula, A.2    Rusinowitch, M.3
  • 3
    • 0037999031 scopus 로고    scopus 로고
    • A unified security mechanism for networked applications
    • J. Abendroth and C. Jensen. A unified security mechanism for networked applications. In SAC2003, pages 351-357, 2003.
    • (2003) SAC2003 , pp. 351-357
    • Abendroth, J.1    Jensen, C.2
  • 6
    • 84867789527 scopus 로고    scopus 로고
    • Data protection by logic programming
    • Proc. 1st International Conference on Computational Logic. Springer-Verlag
    • S. Barker. Data protection by logic programming. In Proc. 1st International Conference on Computational Logic, volume 1861 of LNAI, pages 1300-1314. Springer-Verlag, 2000.
    • (2000) LNAI , vol.1861 , pp. 1300-1314
    • Barker, S.1
  • 7
    • 11244252943 scopus 로고    scopus 로고
    • Protecting deductive databases from unauthorized retrieval and update requests
    • S. Barker. Protecting deductive databases from unauthorized retrieval and update requests. Journal of Data and Knowledge Engineering, 23(3):231-285, 2002.
    • (2002) Journal of Data and Knowledge Engineering , vol.23 , Issue.3 , pp. 231-285
    • Barker, S.1
  • 8
    • 33746666258 scopus 로고    scopus 로고
    • Efficient and flexible access control via jones optimality logic program specialisation
    • To Appear
    • S. Barker, M. Leuschel, and M. Varea. Efficient and flexible access control via jones optimality logic program specialisation. HOSC, To Appear, 2006.
    • (2006) HOSC
    • Barker, S.1    Leuschel, M.2    Varea, M.3
  • 9
    • 3042584122 scopus 로고    scopus 로고
    • Flexible access control policy specification with constraint logic programming
    • S. Barker and P. Stuckey. Flexible access control policy specification with constraint logic programming. ACM Trans. on Information and System Security, 6(4):501-546, 2003.
    • (2003) ACM Trans. on Information and System Security , vol.6 , Issue.4 , pp. 501-546
    • Barker, S.1    Stuckey, P.2
  • 10
    • 33746720635 scopus 로고    scopus 로고
    • Jakarta: A toolset to reason about the JavaCard platform
    • Proceedings of e-SMART'01. Springer-Verlag
    • G. Barthe, G. Dufay, M. Huisman, and S. Melo de Sousa. Jakarta: a toolset to reason about the JavaCard platform. In Proceedings of e-SMART'01, volume 2140 of Lecture Notes in Computer Science. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2140
    • Barthe, G.1    Dufay, G.2    Huisman, M.3    Melo De Sousa, S.4
  • 12
    • 0035790640 scopus 로고    scopus 로고
    • A logical framework for reasoning about access control models
    • E. Bertino, B. Catania, E. Ferrari, and P. Perlasca. A logical framework for reasoning about access control models. In SACMAT, pages 41-52, 2001.
    • (2001) SACMAT , pp. 41-52
    • Bertino, E.1    Catania, B.2    Ferrari, E.3    Perlasca, P.4
  • 20
    • 15544365037 scopus 로고    scopus 로고
    • Reachability analysis over term rewriting systems
    • G. Feuillade, T. Genet, and V. Viet Triem Tong. Reachability Analysis over Term Rewriting Systems. JAR, 33 (3-4):341-383, 2004.
    • (2004) JAR , vol.33 , Issue.3-4 , pp. 341-383
    • Feuillade, G.1    Genet, T.2    Viet Triem Tong, V.3
  • 22
    • 0001619596 scopus 로고    scopus 로고
    • Flexible support for multiple access control policies
    • S. Jajodia, P. Samarati, M. Sapino, and V.S. Subrahmaninan. Flexible support for multiple access control policies. ACM TODS, 26(2):214-260, 2001.
    • (2001) ACM TODS , vol.26 , Issue.2 , pp. 214-260
    • Jajodia, S.1    Samarati, P.2    Sapino, M.3    Subrahmaninan, V.S.4
  • 24
    • 0001834942 scopus 로고
    • Term rewriting systems
    • S. Abramsky, Dov.M. Gabbay, and T.S.E. Maibaum, editors. Oxford University Press
    • J.-W. Klop. Term Rewriting Systems. In S. Abramsky, Dov.M. Gabbay, and T.S.E. Maibaum, editors, Handbook of Logic in Computer Science, volume 2. Oxford University Press, 1992.
    • (1992) Handbook of Logic in Computer Science , vol.2
    • Klop, J.-W.1
  • 26
    • 33746744130 scopus 로고    scopus 로고
    • A graph based formalism for rbac
    • M. Koch, L. Mancini, and F. Parisi-Presicce. A graph based formalism for rbac. In SACMAT, pages 129-187, 2004.
    • (2004) SACMAT , pp. 129-187
    • Koch, M.1    Mancini, L.2    Parisi-Presicce, F.3
  • 29
    • 0002569005 scopus 로고    scopus 로고
    • Higher-order rewrite systems and their confluence
    • Richard Mayr and Tobias Nipkow. Higher-order rewrite systems and their confluence. Theoretical Computer Science, 192:3-29, 1998.
    • (1998) Theoretical Computer Science , vol.192 , pp. 3-29
    • Mayr, R.1    Nipkow, T.2
  • 30
    • 0000187751 scopus 로고
    • On theories with a combinatorial definition of equivalence
    • M.H.A. Newman. On theories with a combinatorial definition of equivalence. Annals of Mathematics, 43(2):223-243, 1942.
    • (1942) Annals of Mathematics , vol.43 , Issue.2 , pp. 223-243
    • Newman, M.H.A.1
  • 31
    • 3142523603 scopus 로고    scopus 로고
    • The uconabc usage control model
    • J. Park and R. Sandhu. The uconabc usage control model. ACM Trans. Inf. Syst. Secur., 7(1): 128-174, 2004.
    • (2004) ACM Trans. Inf. Syst. Secur. , vol.7 , Issue.1 , pp. 128-174
    • Park, J.1    Sandhu, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.