메뉴 건너뛰기




Volumn 9, Issue 4, 2006, Pages 391-420

Security analysis in role-based access control

Author keywords

Delegation; Role based access control; Role based administration; Trust management

Indexed keywords

DISCRETIONARY ACCESS CONTROL (DAC); ROLE-BASED ACCESS CONTROL (RBAC); ROLE-BASED ADMINISTRATION; TRUST-MANAGEMENT LANGUAGES;

EID: 33845517298     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1187441.1187442     Document Type: Article
Times cited : (143)

References (32)
  • 2
    • 3142653715 scopus 로고    scopus 로고
    • Ph.D. thesis, Birbeck College, University of London, UK
    • CRAMPTON, J. 2002. Authorizations and antichains. Ph.D. thesis, Birbeck College, University of London, UK.
    • (2002) Authorizations and Antichains
    • Crampton, J.1
  • 4
    • 3142510989 scopus 로고    scopus 로고
    • Administrative scope: A foundation for role-based administrative models
    • CRAMPTON, J. AND LOIZOU, G. 2003. Administrative scope: A foundation for role-based administrative models. ACM Transactions on Information and System Security 6, 2 (May), 201-231.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.2 MAY , pp. 201-231
    • Crampton, J.1    Loizou, G.2
  • 15
    • 3142654848 scopus 로고
    • Reprinted in (Jan)
    • Reprinted in ACM Operating Systems Review 8, 1, 18-24 (Jan 1974).
    • (1974) ACM Operating Systems Review , vol.8 , Issue.1 , pp. 18-24
  • 17
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • LI, N., WINSBOROUGH, W. H., AND MITCHELL, J. C. 2003. Distributed credential chain discovery in trust management. Journal of Computer Security 11, 1 (Feb.), 35-86.
    • (2003) Journal of Computer Security , vol.11 , Issue.1 FEB. , pp. 35-86
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 19
    • 30544438141 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Security analysis in trust management
    • LI, N., MITCHELL, J. C., AND WINSBOROUGH, W H. 2005. Beyond proof-of-compliance: Security analysis in trust management. Journal of the ACM 62, 3 (May), 474-514.
    • (2005) Journal of the ACM , vol.62 , Issue.3 MAY , pp. 474-514
    • Li, N.1    Mitchell, J.C.2    Winsborough, W.H.3
  • 21
    • 0017512599 scopus 로고
    • A linear time algorithm for deciding subject security
    • LIPTON, R. J. AND SNYDER, L. 1977. A linear time algorithm for deciding subject security. Journal of the ACM 24, 3, 455-464.
    • (1977) Journal of the ACM , vol.24 , Issue.3 , pp. 455-464
    • Lipton, R.J.1    Snyder, L.2
  • 25
    • 0023999796 scopus 로고
    • The schematic protection model: Its definition and analysis for acyclic attenuating systems
    • SANDHU, R. S. 1988. The schematic protection model: Its definition and analysis for acyclic attenuating systems. Journal of the ACM 36, 2, 404-432.
    • (1988) Journal of the ACM , vol.36 , Issue.2 , pp. 404-432
    • Sandhu, R.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.