메뉴 건너뛰기




Volumn 15, Issue 2, 2007, Pages 231-272

A theory for comparing the expressive power of access control models

Author keywords

Access control; Access matrix; Discretionary access control; Expressive power; Reduction; Role based access control; State matching reduction; Trust management

Indexed keywords

COMPUTER SIMULATION; DATA REDUCTION; MATRIX ALGEBRA; STATE ASSIGNMENT;

EID: 33847356528     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2007-15202     Document Type: Article
Times cited : (35)

References (26)
  • 1
    • 0030365407 scopus 로고    scopus 로고
    • The expressive power of multi-parent creation in monotonic access control models
    • P. Ammann, R. Lipton and R.S. Sandhu, The expressive power of multi-parent creation in monotonic access control models, Journal of Computer Security 4(2-3) (1996), 149-165.
    • (1996) Journal of Computer Security , vol.4 , Issue.2-3 , pp. 149-165
    • Ammann, P.1    Lipton, R.2    Sandhu, R.S.3
  • 8
    • 3142654848 scopus 로고
    • Reprinted in
    • Reprinted in ACM Operating Systems Review 8(1) (1974), 18-24.
    • (1974) ACM Operating Systems Review , vol.8 , Issue.1 , pp. 18-24
  • 11
    • 30544438141 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Security analysis in trust management
    • N. Li, J.C. Mitchell and W.H. Winsborough, Beyond proof-of-compliance: Security analysis in trust management, Journal of the ACM 52(3) (2005), 474-514.
    • (2005) Journal of the ACM , vol.52 , Issue.3 , pp. 474-514
    • Li, N.1    Mitchell, J.C.2    Winsborough, W.H.3
  • 12
    • 33847358981 scopus 로고    scopus 로고
    • Preliminary version appeared in: Proceedings of 2003 IEEE Symposium on Security and Privacy.
    • Preliminary version appeared in: Proceedings of 2003 IEEE Symposium on Security and Privacy.
  • 14
    • 33845517298 scopus 로고    scopus 로고
    • N. Li and M.V. Tripunitara, Security analysis in role-based access control, 2006. Accepted to appear in ACM Transactions on Information and Systems Security (TISSEC).
    • N. Li and M.V. Tripunitara, Security analysis in role-based access control, 2006. Accepted to appear in ACM Transactions on Information and Systems Security (TISSEC).
  • 15
    • 33847368389 scopus 로고    scopus 로고
    • Preliminary version appeared in: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies (SACMAT 2004).
    • Preliminary version appeared in: Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies (SACMAT 2004).
  • 16
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • N. Li, W.H. Winsborough and J.C. Mitchell, Distributed credential chain discovery in trust management, Journal of Computer Security 11(1) (2003), 35-86.
    • (2003) Journal of Computer Security , vol.11 , Issue.1 , pp. 35-86
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 17
    • 0003276135 scopus 로고
    • A Calculus of Communicating Systems
    • Springer
    • R. Milner. A Calculus of Communicating Systems, Lecture Notes in Computer Science, Vol. 92, Springer, 1980.
    • (1980) Lecture Notes in Computer Science , vol.92
    • Milner, R.1
  • 20
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • S. Osborn, R.S. Sandhu and Q. Munawer, Configuring role-based access control to enforce mandatory and discretionary access control policies, ACM Transactions on Information and System Security 3(2) (2000), 85-106.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.S.2    Munawer, Q.3
  • 21
    • 84945924340 scopus 로고
    • Concurrency and automata on infinite sequences
    • Proceedings of the 5th GI Conference on Theoretical Computer Science, Springer
    • D. Park, Concurrency and automata on infinite sequences, in: Proceedings of the 5th GI Conference on Theoretical Computer Science, Lecture Notes in Computer Science, Vol. 104, Springer, 1981.
    • (1981) Lecture Notes in Computer Science , vol.104
    • Park, D.1
  • 22
    • 84974744165 scopus 로고
    • Expressive power of the schematic protection model
    • R.S. Sandhu, Expressive power of the schematic protection model, Journal of Computer Security 1(1) (1992), 59-98.
    • (1992) Journal of Computer Security , vol.1 , Issue.1 , pp. 59-98
    • Sandhu, R.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.