메뉴 건너뛰기




Volumn 4185 LNCS, Issue , 2006, Pages 179-190

Ontology-based RBAC specification for interoperation in distributed environment

Author keywords

Access control policy; Interoperation; Ontology; RBAC

Indexed keywords

DATA REDUCTION; DISTRIBUTED COMPUTER SYSTEMS; INFORMATION ANALYSIS; OPEN SYSTEMS;

EID: 33750248035     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11836025_19     Document Type: Conference Paper
Times cited : (9)

References (15)
  • 1
    • 84865788031 scopus 로고    scopus 로고
    • A model of OASIS role-based access control and its support for active security
    • ACM Press, New York
    • Bacon, J., Moody, K., and Yao, W.: A Model of OASIS Role-Based Access Control and Its Support for Active Security. ACM Trans. Information and System Security, Vol. 5, No. 4. ACM Press, New York (2002) 492-540
    • (2002) ACM Trans. Information and System Security , vol.5 , Issue.4 , pp. 492-540
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 2
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • ACM Press, New York
    • Osborn, S.L., Sandhu, R., and Munawer, Q.: Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies. ACM Trans. Information and System Security, Vol. 3, No. 2. ACM Press, New York (2000) 85-106
    • (2000) ACM Trans. Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.L.1    Sandhu, R.2    Munawer, Q.3
  • 3
    • 4644260332 scopus 로고    scopus 로고
    • OWL: Web ontology language semantics and abstract syntax
    • Patel-Schneider, P.P., Hayes, P., Horrocks, I., ed.: 10 February
    • Patel-Schneider, P.P., Hayes, P., Horrocks, I., ed.: OWL: Web Ontology Language Semantics and Abstract Syntax. W3C Recommendation 10 February 2004. Latest version is available at http://www.w3.org/TR/owl-semantics/
    • (2004) W3C Recommendation
  • 5
    • 84992227458 scopus 로고    scopus 로고
    • The NIST model for role-based access control: Towards a unified standard
    • ACM Press, New York
    • Ferraiolo, D., et al.: The NIST Model for Role-Based Access Control: Towards a Unified Standard. ACM Trans. Information and System Security, Vol. 4, No. 3. ACM Press, New York (2001) 224-274
    • (2001) ACM Trans. Information and System Security , vol.4 , Issue.3 , pp. 224-274
    • Ferraiolo, D.1
  • 7
    • 11044223672 scopus 로고    scopus 로고
    • Access-control language for multidomain environments
    • IEEE. IEEE Inc., Piscataway
    • Joshi, J.B.D.: Access-control language for multidomain environments. Internet Computing, IEEE, Vol 8, Is 6. IEEE Inc., Piscataway (2004) 40-50
    • (2004) Internet Computing , vol.8 , Issue.6 , pp. 40-50
    • Joshi, J.B.D.1
  • 8
    • 1142268572 scopus 로고    scopus 로고
    • KAoS semantic policy and domain services: An application of DAML to Web services-based grid architectures
    • Submitted to the, Melbourne, Australia, July
    • Johnson, M., Chang, P., Jeffers, R., Bradshaw, J., et al: KAoS Semantic Policy and Domain Services: An Application of DAML to Web Services-Based Grid Architectures. Submitted to the AAMAS 03 workshop on Web Services and Agent-Based Engineering, Melbourne, Australia, July, (2003)
    • (2003) AAMAS 03 Workshop on Web Services and Agent-based Engineering
    • Johnson, M.1    Chang, P.2    Jeffers, R.3    Bradshaw, J.4
  • 11
    • 84944048132 scopus 로고    scopus 로고
    • The ponder policy specification language
    • proceedings of Workshop on Policies for Distributed Systems and Networks (POLICY 2001). Springer-Verlag, Bristol, UK
    • Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language. In proceedings of Workshop on Policies for Distributed Systems and Networks (POLICY 2001). Springer-Verlag, LNCS 1995, Bristol, UK, (2001)
    • (2001) LNCS , vol.1995
    • Damianou, N.1    Dulay, N.2    Lupu, E.3    Sloman, M.4
  • 15
    • 0010032891 scopus 로고    scopus 로고
    • Computational issues in secure intel-operation
    • IEEE Inc., Piscataway
    • Gong, L., and Qian, X.: Computational Issues in Secure Intel-operation. IEEE Trans. Software and Eng., Vol. 22, No. 1. IEEE Inc., Piscataway (1996) 43-52
    • (1996) IEEE Trans. Software and Eng. , vol.22 , Issue.1 , pp. 43-52
    • Gong, L.1    Qian, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.