메뉴 건너뛰기




Volumn 9, Issue 3, 2006, Pages 259-291

Methods and limitations of security policy reconciliation

Author keywords

Security policy

Indexed keywords

ANTIGONE COMMUNICATION SYSTEM; AUTOMATED RECONCILIATION; POLICY LANGUAGES; SECURITY POLICY;

EID: 33750907119     PISSN: 10949224     EISSN: 10949224     Source Type: Journal    
DOI: 10.1145/1178618.1178620     Document Type: Article
Times cited : (42)

References (47)
  • 3
    • 0005908365 scopus 로고    scopus 로고
    • Distributed firewalls
    • November USENIX
    • BELLOVIN, S. November 1999. Distributed Firewalls. USENIX; Login:, 39-47.
    • (1999) Login , pp. 39-47
    • Bellovin, S.1
  • 4
    • 0032203011 scopus 로고    scopus 로고
    • Coyote: A system for constructing fine-grain configurable communication services
    • BHATTI, N. T., HILTUNEN, M. A., SCHLICHTING, R. D., AND CHIU, W. 1998. Coyote: A system for constructing fine-grain configurable communication services. ACM Transactions on Computer Systems 16, 4 (Nov.), 321-366.
    • (1998) ACM Transactions on Computer Systems , vol.16 , Issue.4 NOV , pp. 321-366
    • Bhatti, N.T.1    Hiltunen, M.A.2    Schlichting, R.D.3    Chiu, W.4
  • 19
    • 0032182406 scopus 로고    scopus 로고
    • Configuration management for highly-customizable software
    • HILTUNEN, M. 1998. Configuration management for highly-customizable software. IEE Proceedings: Software 145, 5, 180-188.
    • (1998) IEE Proceedings: Software , vol.145 , Issue.5 , pp. 180-188
    • Hiltunen, M.1
  • 21
  • 22
    • 0025722247 scopus 로고
    • The x-kernel: An architecture for implementing network protocols
    • HUTCHINSON, N. AND PETERSON, L. 1994. The x-kernel: An architecture for implementing network protocols. IEEE Transactions on Software Engineering 17, 1 (Jan.), 64-76.
    • (1994) IEEE Transactions on Software Engineering , vol.17 , Issue.1 JAN , pp. 64-76
    • Hutchinson, N.1    Peterson, L.2
  • 24
    • 0348037975 scopus 로고
    • The computational complexity of graph algorithms with succinct representations
    • KARPINSKI, M. AND WAGNER, K. W. 1988. The computational complexity of graph algorithms with succinct representations. Z. Operations Res. 3, 32, 201-211.
    • (1988) Z. Operations Res. , vol.3 , Issue.32 , pp. 201-211
    • Karpinski, M.1    Wagner, K.W.2
  • 26
    • 0005986692 scopus 로고
    • Secret-key agreement without public-key cryptography
    • LEIGHTON, T. AND MICALI, S. 1994. Secret-key agreement without public-key cryptography. In Proceedings of Crypto 93, 456-479.
    • (1994) Proceedings of Crypto , vol.93 , pp. 456-479
    • Leighton, T.1    Micali, S.2
  • 27
    • 30544438141 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Security analysis in trust management
    • LI, N., MITCHELL, J. C. AND WINSBOROUGH, W. H. 2005. Beyond proof-of-compliance: Security analysis in trust management. Journal of the ACM 52, 3, 474-514.
    • (2005) Journal of the ACM , vol.52 , Issue.3 , pp. 474-514
    • Li, N.1    Mitchell, J.C.2    Winsborough, W.H.3
  • 30
    • 33750929443 scopus 로고    scopus 로고
    • Tech. Rep. TD-5JCJCK, AT&T Labs-Research, Florham Park, NJ. January
    • MCDANIEL, P. 2003. On context in authorization policy. Tech. Rep. TD-5JCJCK, AT&T Labs-Research, Florham Park, NJ. January.
    • (2003) On Context in Authorization Policy
    • Mcdaniel, P.1
  • 32
    • 33750916077 scopus 로고    scopus 로고
    • Security policy enforcement in the antigone system
    • Accepted for publication
    • MCDANIEL, P. AND PRAKASH, A. 2005. Security policy enforcement in the antigone system. Journal of Computer Security, Accepted for publication.
    • (2005) Journal of Computer Security
    • Mcdaniel, P.1    Prakash, A.2
  • 37
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • NEUMAN, B. C. AND TS'O, T. 1994. Kerberos: An authentication service for computer networks. IEEE Communications 32, 9 (Sept.), 33-38.
    • (1994) IEEE Communications , vol.32 , Issue.9 SEPT , pp. 33-38
    • Neuman, B.C.1    Ts'o, T.2
  • 38
    • 85084162956 scopus 로고    scopus 로고
    • A java beans component architecture for cryptographic protocols
    • USENIX Association, San Antonio, Texas
    • NIKANDER, P. AND KARILA, A. 1998. A java beans component architecture for cryptographic protocols. In Proceedings of 7th USENIX UNIX Security Symposium. USENIX Association, San Antonio, Texas. 107-121.
    • (1998) Proceedings of 7th USENIX UNIX Security Symposium , pp. 107-121
    • Nikander, P.1    Karila, A.2
  • 42
    • 0027608186 scopus 로고
    • Adaptive: A dynamically assembled protocol transformation, integration, and evaluation environment
    • SCHMIDT, D., FOX, D., AND SUDYA, T. 1993. Adaptive: A dynamically assembled protocol transformation, integration, and evaluation environment. Journal of Concurrency: Practice and Experience 5, 4 (June), 269-286.
    • (1993) Journal of Concurrency: Practice and Experience , vol.5 , Issue.4 JUNE , pp. 269-286
    • Schmidt, D.1    Fox, D.2    Sudya, T.3
  • 45
    • 84974750564 scopus 로고
    • Authorization in distributed systems; A new approach
    • Woo, T. AND LAM, S. 1993. Authorization in distributed systems; A new approach. Journal of Computer Security 2, 2-3, 107-136.
    • (1993) Journal of Computer Security , vol.2 , Issue.2-3 , pp. 107-136
    • Woo, T.1    Lam, S.2
  • 46
    • 0031704255 scopus 로고    scopus 로고
    • Designing a distributed authorization service
    • IEEE, San Francisco, CA
    • Woo, T. AND LAM, S. 1998. Designing a distributed authorization service. In Proceedings of INFOCOM '98. IEEE, San Francisco, CA.
    • (1998) Proceedings of INFOCOM '98
    • Woo, T.1    Lam, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.