메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 130-138

Constraint generation for separation of duty

Author keywords

Constraints; Role based access control; Separation of duty

Indexed keywords

CONSTRAINT THEORY; HIERARCHICAL SYSTEMS; PROBLEM SOLVING; PUBLIC POLICY; SET THEORY; USER INTERFACES;

EID: 33748060530     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1133058.1133077     Document Type: Conference Paper
Times cited : (21)

References (26)
  • 3
    • 24644450643 scopus 로고    scopus 로고
    • American national standard for information technology - Role based access control
    • Feb.
    • ANSI. American national standard for information technology - role based access control. ANSI INCITS 359-2004, Feb. 2004.
    • (2004) ANSI INCITS , vol.359 , Issue.2004
  • 4
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • IEEE Computer Society Press, May
    • D. D. Clark and D. R. Wilson. A comparison of commercial and military computer security policies. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, pages 184-194. IEEE Computer Society Press, May 1987.
    • (1987) Proceedings of the 1987 IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 5
    • 3142653715 scopus 로고    scopus 로고
    • PhD thesis, Birbeck College, University of London, UK
    • J. Crampton. Authorizations and Antichains, PhD thesis, Birbeck College, University of London, UK, 2002.
    • (2002) Authorizations and Antichains
    • Crampton, J.1
  • 16
    • 0031346670 scopus 로고    scopus 로고
    • Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems
    • Nov.
    • D. R. Kuhn. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. In Proceedings of the Second ACM Workshop on Role-Based Access Control (RBAC'97), pages 23-30, Nov. 1997.
    • (1997) Proceedings of the Second ACM Workshop on Role-based Access Control (RBAC'97) , pp. 23-30
    • Kuhn, D.R.1
  • 18
    • 14844322081 scopus 로고    scopus 로고
    • On mutually-exclusive roles and separation of duty
    • Center for Education and Research in Information Assurance and Security, Purdue University, June
    • N. Li, Z. Bizri, and M. V. Tripunitara. On mutually-exclusive roles and separation of duty. Technical Report CERIAS-TR-2004-21, Center for Education and Research in Information Assurance and Security, Purdue University, June 2004.
    • (2004) Technical Report , vol.CERIAS-TR-2004-21
    • Li, N.1    Bizri, Z.2    Tripunitara, M.V.3
  • 21
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9): 1278-1308, September 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.