메뉴 건너뛰기




Volumn 30, Issue 1, 2007, Pages 42-59

Towards secure information sharing using role-based delegation

Author keywords

Delegation; Information sharing; Role based

Indexed keywords

COMPUTATION THEORY; COMPUTER ARCHITECTURE; RESOURCE ALLOCATION; RISK ASSESSMENT; STRATEGIC PLANNING;

EID: 33750534177     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2005.08.004     Document Type: Article
Times cited : (10)

References (24)
  • 2
    • 84956993736 scopus 로고    scopus 로고
    • Ahn G-J, Sandhu R. Role-based authorization constraints specification. ACM Trans Inf System Security 2003;3(4):207-26.
  • 3
    • 0242552308 scopus 로고    scopus 로고
    • Ahn G-J, Zhang L, Shin D, Chu B. Authorization management for role-based collaboration. In: IEEE international conference on system, man and cybernetic (SMC2003); Washington, DC, October 2003. p. 4128-214.
  • 4
    • 33750497926 scopus 로고    scopus 로고
    • Barka E, Sandhu R. A role-based delegation model and some extensions. In: Proceedings of the 16th annual computer security application conference; Sheraton, New Orleans. December 11-15, 2000a.
  • 5
    • 33750501666 scopus 로고    scopus 로고
    • Barka E, Sandhu R. Framework for role-based delegation model. In: Proceedings of the 23rd national information systems security conference; Baltimore, MD, October 16-19, 2000b. p. 101-14.
  • 6
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Bertino E., Ferrari E., and Atluri V. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans Inf System Security 2 1 (1999) 65-104
    • (1999) ACM Trans Inf System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 7
    • 0040884892 scopus 로고    scopus 로고
    • A flexible authorization mechanism for relational data management systems
    • Bertino E., Jajodia S., and Samarati P. A flexible authorization mechanism for relational data management systems. ACM Trans Inf Systems 17 2 (1999) 101-140
    • (1999) ACM Trans Inf Systems , vol.17 , Issue.2 , pp. 101-140
    • Bertino, E.1    Jajodia, S.2    Samarati, P.3
  • 10
    • 0002422823 scopus 로고    scopus 로고
    • A role based access control model and reference implementation within a corporate intranet
    • Ferraiolo D.F., Barkley J.F., and Kuhn D.R. A role based access control model and reference implementation within a corporate intranet. ACM Trans Inf System Security 2 1 (1999)
    • (1999) ACM Trans Inf System Security , vol.2 , Issue.1
    • Ferraiolo, D.F.1    Barkley, J.F.2    Kuhn, D.R.3
  • 11
    • 33750494808 scopus 로고    scopus 로고
    • Gasser M, McDermott E. An architecture for practical delegation in a distributed system. In: Proceedings of the IEEE computer society symposium on research in security and privacy; Oakland, CA, May 7-9, 1990.
  • 12
    • 0037345397 scopus 로고    scopus 로고
    • A multi-agent system approach for monitoring the prescription of restricted use of antibiotics
    • Godo L., Puyol-Gruart J., Sabater J., Torra V., Barrufet P., and Fàbregas X. A multi-agent system approach for monitoring the prescription of restricted use of antibiotics. Artif Intell Med 27 3 (2003) 259-282
    • (2003) Artif Intell Med , vol.27 , Issue.3 , pp. 259-282
    • Godo, L.1    Puyol-Gruart, J.2    Sabater, J.3    Torra, V.4    Barrufet, P.5    Fàbregas, X.6
  • 14
    • 0035281459 scopus 로고    scopus 로고
    • Gribble, SD, et al. The Ninja architecture for robust Internet-scale systems and services. Comput Networks 2001.
  • 15
    • 0034829103 scopus 로고    scopus 로고
    • Hagstrom A, Jajodia S, Presicce FP, Wijesekera D. Revocations-a classification. In: Proceedings of the 14th IEEE computer security foundations workshop; Nova Scotia, Canada, June 2001. p. 44-58.
  • 16
    • 33750528262 scopus 로고    scopus 로고
    • Kagal L, Finin T, Joshi A. Trust-based security in pervasive computing environments. IEEE Comput 2001. p. 2-5.
  • 18
    • 0032264589 scopus 로고    scopus 로고
    • Myers BA, Stiel H, Gargiulo R. Collaboration using multiple PDAs connected to a PC. In: Proceedings of the CSCW'98: ACM conference on computer-supported cooperative work; Seattle, WA, November 14-18, 1998. p. 285-294.
  • 19
    • 33750505974 scopus 로고    scopus 로고
    • The Pittsburgh Pebbles PDA Project. Available at www.cs.cmu.edu/∼pebbles; 2004
  • 22
    • 33750495467 scopus 로고    scopus 로고
    • Shin D, Ahn G-J, Cho S. Role-based EAM using X.509 attribute certificate. In: Proceedings of the sixteenth annual IFIP WG 11.3 working conference on data and application security; King's College, University of Cambridge, UK, July 29-31, 2002. p. 285-94.
  • 23
    • 3042684910 scopus 로고    scopus 로고
    • Zhang L, Ahn G-J, Chu B. A rule-based framework for role-based delegation and revocation. ACM Trans Inf System Security 2003;6(3):404-41.
  • 24
    • 33750508413 scopus 로고    scopus 로고
    • ITU-T Recommendation X.509. Information technology: open systems interconnection-the directory: public-key and attribute certificate frameworks, ISO/IEC 9594-8, 2001.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.