메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 82-

Towards continuous usage control on grid computational services

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION THEORY; COMPUTER ARCHITECTURE; SECURITY OF DATA; SOFTWARE PROTOTYPING;

EID: 33845332032     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICAS-ICNS.2005.93     Document Type: Conference Paper
Times cited : (32)

References (27)
  • 6
    • 33845314420 scopus 로고    scopus 로고
    • Gnu classpath project. http://www.gnu.org/software/classpath/home.html.
  • 8
    • 35048855997 scopus 로고    scopus 로고
    • Towards dynamic security perimeters for virtual collaborative networks
    • I. Djordjevic and T. Dimitrakos. Towards dynamic security perimeters for virtual collaborative networks. In Trust Management: 2nd Int. Conference, LNCS, volume 2995, pages 191-205, 2004.
    • (2004) Trust Management: 2nd Int. Conference, LNCS , vol.2995 , pp. 191-205
    • Djordjevic, I.1    Dimitrakos, T.2
  • 9
    • 0036090387 scopus 로고    scopus 로고
    • Statl: An attack language for state-based intrusion detection
    • S. Eckmann, G. Vigna, and R. Kemmerer. Statl: An attack language for state-based intrusion detection. Journal of Computer Security, 10(1/2):71-104, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 71-104
    • Eckmann, S.1    Vigna, G.2    Kemmerer, R.3
  • 14
    • 33845323833 scopus 로고    scopus 로고
    • Globus GRAM architecture. http://www-unix.globus.org/developer/gram-architecture.html.
  • 15
    • 0018005391 scopus 로고
    • Communicating sequential processes
    • C. Hoare. Communicating sequential processes. Commun. ACM, 21(8):666-677, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.8 , pp. 666-677
    • Hoare, C.1
  • 19
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • Feb.
    • J. Ligatti, L. Bauer, and D. Walker. Edit automata: Enforcement mechanisms for run-time security policies. International Journal of Information Security, 4(1-2):2-16, Feb. 2005.
    • (2005) International Journal of Information Security , vol.4 , Issue.1-2 , pp. 2-16
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 20
    • 38049150365 scopus 로고    scopus 로고
    • Partial model checking, process algebra operators and satisfiability procedures for (automatically) enforcing security properties
    • Tech. report, IIT-CNR, . To appear in
    • F. Martinelli and I. Matteucci. Partial model checking, process algebra operators and satisfiability procedures for (automatically) enforcing security properties. Tech. report, IIT-CNR, 2005. To appear in proc. of the Workshop on Foundations of Computer Security (FCS'05).
    • (2005) Proc. of the Workshop on Foundations of Computer Security (FCS'05)
    • Martinelli, F.1    Matteucci, I.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.