메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 778-781

Access control with uncertain surveillance

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SYSTEMS; CONTROL SYSTEM ANALYSIS; MATHEMATICAL MODELS; SECURITY SYSTEMS; UNCERTAIN SYSTEMS;

EID: 33748868926     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WI.2005.19     Document Type: Conference Paper
Times cited : (1)

References (16)
  • 6
    • 0018444418 scopus 로고
    • Secure databases: Protection against user inference
    • [Dobkin et al., 1979]
    • [Dobkin et al., 1979] Dobkin, D., Jones, A., Lipton, R.: Secure databases: protection against user inference. ACM Transactions on Database Systems 4 (1979) 97-106.
    • (1979) ACM Transactions on Database Systems , vol.4 , pp. 97-106
    • Dobkin, D.1    Jones, A.2    Lipton, R.3
  • 7
    • 0002422823 scopus 로고    scopus 로고
    • A role-based access control model and reference implementation within a corporate intranet
    • [Ferraiolo et al., 1999]
    • [Ferraiolo et al., 1999] Ferraiolo, D., Barkley, J., Kuhn, D.: A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information And System Security 2 (1999) 34-64.
    • (1999) ACM Transactions on Information and System Security , vol.2 , pp. 34-64
    • Ferraiolo, D.1    Barkley, J.2    Kuhn, D.3
  • 10
    • 0021937866 scopus 로고
    • Theoretical issues concerning protection in operating systems
    • [Harrison, 1985]
    • [Harrison, 1985] Harrison, M.: Theoretical issues concerning protection in operating systems. Advances in Computers 24 (1985) 61-100.
    • (1985) Advances in Computers , vol.24 , pp. 61-100
    • Harrison, M.1
  • 11
    • 0009442659 scopus 로고
    • Monotonic protection systems
    • [Harrison and Ruzzo, 1978]. DeMillo, R., Dobkin, D., Jones, A., Lipton, R. (Editors). Academic Press
    • [Harrison and Ruzzo, 1978] Harrison, M., Ruzzo, W.: Monotonic protection systems. In DeMillo, R., Dobkin, D., Jones, A., Lipton, R. (Editors): Foundations of Secure Computation. Academic Press (1978) 337-363.
    • (1978) Foundations of Secure Computation , pp. 337-363
    • Harrison, M.1    Ruzzo, W.2
  • 12
    • 0016984825 scopus 로고
    • Protection in operating systems
    • [Harrison et al., 1976]
    • [Harrison et al., 1976] Harrison, M., Ruzzo, W., Ullman, J.: Protection in operating systems. Communications of the ACM 19 (1976) 461-471.
    • (1976) Communications of the ACM , vol.19 , pp. 461-471
    • Harrison, M.1    Ruzzo, W.2    Ullman, J.3
  • 13
    • 0003103622 scopus 로고
    • Protection
    • [Lampson, 1974]
    • [Lampson, 1974] Lampson, B.: Protection. Operating Systems Review 8 (1974) 18-24.
    • (1974) Operating Systems Review , vol.8 , pp. 18-24
    • Lampson, B.1
  • 15
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • [Sandhu et al., 1996]
    • [Sandhu et al., 1996] Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. Computer 29 (1996) 38-47.
    • (1996) Computer , vol.29 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Youman, C.4
  • 16
    • 84872002221 scopus 로고
    • On testing for the absence of rights in access control models
    • [Sandhu and Ganta, 1993]. IEEE Computer Society Press
    • [Sandhu and Ganta, 1993] Sandhu, R., Ganta, S: On testing for the absence of rights in access control models. In: IEEE 6th Computer Security Foundations Workshop. IEEE Computer Society Press (1993).
    • (1993) IEEE 6th Computer Security Foundations Workshop
    • Sandhu, R.1    Ganta, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.