메뉴 건너뛰기




Volumn 4130 LNAI, Issue , 2006, Pages 632-646

Specifying and reasoning about dynamic access-control policies

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; AUTOMATA THEORY; COMPUTER HARDWARE DESCRIPTION LANGUAGES; COMPUTER SCIENCE; SECURITY OF DATA;

EID: 33749558954     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11814771_51     Document Type: Conference Paper
Times cited : (90)

References (44)
  • 6
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • The Mitre Corporation
    • D. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, The Mitre Corporation, 1976.
    • (1976) Technical Report , vol.M74-244
    • Bell, D.1    LaPadula, L.J.2
  • 10
    • 0001377462 scopus 로고
    • Functional and inclusion dependencies: A graph theoretic approach
    • P. Kanellakis and F. Preparata, editors, volume 3: Theory of Databases. JAI Press
    • S. Cosmadakis and P. Kanellakis. Functional and inclusion dependencies: A graph theoretic approach. In P. Kanellakis and F. Preparata, editors, Advances in Computing Research, volume 3: Theory of Databases, pages 163-185. JAI Press, 1986.
    • (1986) Advances in Computing Research , pp. 163-185
    • Cosmadakis, S.1    Kanellakis, P.2
  • 11
    • 85050550846 scopus 로고
    • Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints
    • P. Cousot and R. Cousot. Abstract interpretation: A unified lattice model for static analysis of programs by construction or approximation of fixpoints. In ACM Symposium on Principles of Programming Languages, pages 238-252, 1977.
    • (1977) ACM Symposium on Principles of Programming Languages , pp. 238-252
    • Cousot, P.1    Cousot, R.2
  • 16
    • 0038540757 scopus 로고    scopus 로고
    • The complexity of acyclic conjunctive queries
    • G. Gottlob, N. Leone, and F. Scarcello. The complexity of acyclic conjunctive queries. J. ACM, 48(3):431-498, 2001.
    • (2001) J. ACM , vol.48 , Issue.3 , pp. 431-498
    • Gottlob, G.1    Leone, N.2    Scarcello, F.3
  • 17
    • 24644452174 scopus 로고    scopus 로고
    • Model-checking access control policies
    • number 3225 in Lecture Notes in Computer Science. Springer-Verlag
    • D. P. Guelev, M. D. Ryan, and P.-Y. Schobbens. Model-checking access control policies. In Information Security Conference, number 3225 in Lecture Notes in Computer Science. Springer-Verlag, 2004.
    • (2004) Information Security Conference
    • Guelev, D.P.1    Ryan, M.D.2    Schobbens, P.-Y.3
  • 21
    • 33244455252 scopus 로고    scopus 로고
    • Automated verification of access control policies
    • University of California, Santa Barbara
    • G. Hughes and T. Bultan. Automated verification of access control policies. Technical Report 2004-22, University of California, Santa Barbara, 2004.
    • (2004) Technical Report , vol.2004 , Issue.22
    • Hughes, G.1    Bultan, T.2
  • 23
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A trust management system with certified evaluation
    • T. Jim. SD3: A trust management system with certified evaluation. In IEEE Symposium on Security and Privacy, pages 106-115, 2001.
    • (2001) IEEE Symposium on Security and Privacy , pp. 106-115
    • Jim, T.1
  • 24
    • 0016542395 scopus 로고
    • Space-bounded reducibility among combinatorial problems
    • N. D. Jones. Space-bounded reducibility among combinatorial problems. Journal of Computer and System Sciences, 11(1):68-85, 1975.
    • (1975) Journal of Computer and System Sciences , vol.11 , Issue.1 , pp. 68-85
    • Jones, N.D.1
  • 31
    • 30544438141 scopus 로고    scopus 로고
    • Beyond proof-of- Compliance: Security analysis in trust management
    • May
    • N. Li, J. C. Mitchell, and W. H. Winsborough. Beyond proof-of- compliance: Security analysis in trust management. Journal of the ACM, 52(3):474-514, May 2005.
    • (2005) Journal of the ACM , vol.52 , Issue.3 , pp. 474-514
    • Li, N.1    Mitchell, J.C.2    Winsborough, W.H.3
  • 33
    • 2442512413 scopus 로고    scopus 로고
    • Extensible Access Control Markup Language (XACML) version 1.0
    • OASIS, Feb.
    • T. Moses, extensible Access Control Markup Language (XACML) version 1.0. Technical report, OASIS, Feb. 2003.
    • (2003) Technical Report
    • Moses, T.1
  • 36
    • 0023999796 scopus 로고
    • The schematic protection model: Its definition and analysis for acyclic attenuating systems
    • R. Sandhu. The schematic protection model: its definition and analysis for acyclic attenuating systems. Journal of the ACM, 35(2):404-412, 1988.
    • (1988) Journal of the ACM , vol.35 , Issue.2 , pp. 404-412
    • Sandhu, R.1
  • 39
    • 0242625217 scopus 로고    scopus 로고
    • A lightweight approach to specification and analysis of role-based access control extensions
    • A. Schaad and J. D. Moffett. A lightweight approach to specification and analysis of role-based access control extensions. In Symposium on Access Control Models and Technologies, pages 13-22, 2002.
    • (2002) Symposium on Access Control Models and Technologies , pp. 13-22
    • Schaad, A.1    Moffett, J.D.2
  • 41
    • 0033721519 scopus 로고    scopus 로고
    • Verification of relational transducers for electronic commerce
    • ACM Press
    • M. Spielmann. Verification of relational transducers for electronic commerce. In ACM Symposium on Principles of Database Systems, pages 92-103. ACM Press, 2000.
    • (2000) ACM Symposium on Principles of Database Systems , pp. 92-103
    • Spielmann, M.1
  • 42
    • 85028752389 scopus 로고
    • The complexity of relational query languages
    • ACM
    • M. Y. Vardi. The complexity of relational query languages (extended abstract). In Symposium on the Theory of Computing, pages 137-146. ACM, 1982.
    • (1982) Symposium on the Theory of Computing , pp. 137-146
    • Vardi, M.Y.1
  • 44
    • 35248859723 scopus 로고    scopus 로고
    • Verifying temporal heap properties specified via evolution logic
    • P. Degano, editor, European Symposium on Programming. Springer-Verlag
    • E. Yahav, T. Reps, M. Sagiv, and R. Wilhelm. Verifying temporal heap properties specified via evolution logic. In P. Degano, editor, European Symposium on Programming, volume 2618 of Lecture Notes in Computer Science, pages 204-222. Springer-Verlag, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2618 , pp. 204-222
    • Yahav, E.1    Reps, T.2    Sagiv, M.3    Wilhelm, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.