메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages

Active authorization rules for enforcing role-based access control and its extensions

Author keywords

[No Author keywords available]

Indexed keywords

DEPENDENCY CONSTRAINTS; EVENT-CONDITION-ACTION (ECA); FLEXIBLE MECHANISM; ROLE-BASED ACCESS CONTROL (RBAC);

EID: 33947279986     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDE.2005.179     Document Type: Conference Paper
Times cited : (11)

References (32)
  • 1
    • 35248823056 scopus 로고    scopus 로고
    • SnoopIB: Interval-Based Event Specification and Detection for Active Databases
    • Proc. of ADBIS, Sept
    • R. Adaikkalavan and S. Chakravarthy. SnoopIB: Interval-Based Event Specification and Detection for Active Databases. In Proc. of ADBIS. LNCS 2798, Sept. 2003.
    • (2003) LNCS , vol.2798
    • Adaikkalavan, R.1    Chakravarthy, S.2
  • 2
    • 84948950552 scopus 로고    scopus 로고
    • M. A. Al-Kahtani and R. Sandhu. A Model for Attribute-Based User-Role Assignment. In Proc. of ACSAC, 2002.
    • M. A. Al-Kahtani and R. Sandhu. A Model for Attribute-Based User-Role Assignment. In Proc. of ACSAC, 2002.
  • 3
    • 0242456733 scopus 로고    scopus 로고
    • Induced Role Hierarchies with Attribute-Based RBAC
    • M. A. Al-Kahtani and R. Sandhu. Induced Role Hierarchies with Attribute-Based RBAC. In Proc. of SACMAT, 2003.
    • (2003) Proc. of SACMAT
    • Al-Kahtani, M.A.1    Sandhu, R.2
  • 4
    • 84937116327 scopus 로고    scopus 로고
    • Translating Role-Based Access Control Policy Within Context
    • J. Bacon, M. Lloyd, and K. Moody. Translating Role-Based Access Control Policy Within Context. In Proc. of POLICY, 2001.
    • (2001) Proc. of POLICY
    • Bacon, J.1    Lloyd, M.2    Moody, K.3
  • 5
    • 84865788031 scopus 로고    scopus 로고
    • J. Bacon, K. Moody, and W. Yao. A Model of OASIS Role-Based Access Control and its Support for Active Security. TISSEC, 5(4), 2002.
    • J. Bacon, K. Moody, and W. Yao. A Model of OASIS Role-Based Access Control and its Support for Active Security. TISSEC, 5(4), 2002.
  • 6
    • 84944792110 scopus 로고    scopus 로고
    • TRBAC: A Temporal Role-Based Access Control Model
    • E. Bertino, P. A. Bonatti, and E. Ferrari. TRBAC: A Temporal Role-Based Access Control Model. ACM TISSEC, 4(3):191-233, 2001.
    • (2001) ACM TISSEC , vol.4 , Issue.3 , pp. 191-233
    • Bertino, E.1    Bonatti, P.A.2    Ferrari, E.3
  • 9
    • 12344311484 scopus 로고    scopus 로고
    • X-GTRBAC Admin: A Decentralized Administration Model for Enterprise Wide Access Control
    • Technical Report 2004-04, CERIAS, Purdue University
    • R. Bhatti et al. X-GTRBAC Admin: A Decentralized Administration Model for Enterprise Wide Access Control. Technical Report 2004-04, CERIAS, Purdue University, 2004.
    • (2004)
    • Bhatti, R.1
  • 11
    • 0002962898 scopus 로고
    • Composite Events for Active Databases: Semantics, Contexts, and Detection
    • S. Chakravarthy et al. Composite Events for Active Databases: Semantics, Contexts, and Detection. In Proc. of VLDB, pages 606-617, 1994.
    • (1994) Proc. of VLDB , pp. 606-617
    • Chakravarthy, S.1
  • 12
    • 0028499256 scopus 로고
    • Design of Sentinel: An Object-Oriented DBMS with Event-Based Rules
    • S. Chakravarthy et al. Design of Sentinel: An Object-Oriented DBMS with Event-Based Rules. Information and Software Technology, 36(9):559-568, 1994.
    • (1994) Information and Software Technology , vol.36 , Issue.9 , pp. 559-568
    • Chakravarthy, S.1
  • 14
    • 33744543915 scopus 로고    scopus 로고
    • Role-Based Access Control Features in Commercial Database Management Systems
    • R. Chandramouli and R. S. Sandhu. Role-Based Access Control Features in Commercial Database Management Systems. In Proc. of NISSC, 1998.
    • (1998) Proc. of NISSC
    • Chandramouli, R.1    Sandhu, R.S.2
  • 17
    • 0002422823 scopus 로고    scopus 로고
    • A Role Based Access Control Model and Reference Implementation within a Corporate Intranet
    • D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn. A Role Based Access Control Model and Reference Implementation within a Corporate Intranet. TISSEC, 1(2), 1999.
    • (1999) TISSEC , vol.1 , Issue.2
    • Ferraiolo, D.F.1    Barkley, J.F.2    Kuhn, D.R.3
  • 19
    • 30144433198 scopus 로고    scopus 로고
    • Privacy Enforcement with an Extended Role-Based Access Control Model
    • Technical Report TR-2003-09, Department of Computer Science, NCSU
    • Q. He. Privacy Enforcement with an Extended Role-Based Access Control Model. Technical Report TR-2003-09, Department of Computer Science, NCSU, 2003.
    • (2003)
    • He, Q.1
  • 21
    • 33947245393 scopus 로고    scopus 로고
    • InterNational Committee for Information Technology Standards
    • InterNational Committee for Information Technology Standards. RBAC Standard, ANSI INCITS 359-2004, 2004.
    • (2004) RBAC Standard, ANSI INCITS , vol.359
  • 22
    • 33947249456 scopus 로고    scopus 로고
    • Generalized Temporal Role-Based Access Control Model - Specification and Modeling
    • Technical Report 2001-47, CERIAS, Purdue University
    • J. B. D. Joshi et al. Generalized Temporal Role-Based Access Control Model - Specification and Modeling. Technical Report 2001-47, CERIAS, Purdue University, 2001.
    • (2001)
    • Joshi, J.B.D.1
  • 23
    • 85088338388 scopus 로고    scopus 로고
    • Dependencies and Separation of Duty Constraints in GTRBAC
    • J. B. D. Joshi et al. Dependencies and Separation of Duty Constraints in GTRBAC. In Proc. of SACMAT, 2003.
    • (2003) Proc. of SACMAT
    • Joshi, J.B.D.1
  • 25
    • 0035006262 scopus 로고    scopus 로고
    • Generalized Role-Based Access Control
    • M. J. Moyer and M. Ahamad. Generalized Role-Based Access Control. In Proc. of ICDCS, 2001.
    • (2001) Proc. of ICDCS
    • Moyer, M.J.1    Ahamad, M.2
  • 27
    • 0242625198 scopus 로고    scopus 로고
    • An Approach to Engineer and Enforce Context Constraints in an RBAC Environment
    • G. Neumann and M. Strembeck. An Approach to Engineer and Enforce Context Constraints in an RBAC Environment. In Proc. of SACMAT, 2003.
    • (2003) Proc. of SACMAT
    • Neumann, G.1    Strembeck, M.2
  • 31
    • 4444270398 scopus 로고    scopus 로고
    • Conflict Checking of Separation of Duty Constraints in RBAC - Implementation Experiences
    • M. Strembeck. Conflict Checking of Separation of Duty Constraints in RBAC - Implementation Experiences. In Proc. of the Conference on Software Engineering, 2004.
    • (2004) Proc. of the Conference on Software Engineering
    • Strembeck, M.1
  • 32
    • 0035790651 scopus 로고    scopus 로고
    • W. Yao, K. Moody, and J. Bacon. A Model of OASIS Role-Based Access Control and its Support for Active Security. In Proc. of SACMAT, 2001.
    • W. Yao, K. Moody, and J. Bacon. A Model of OASIS Role-Based Access Control and its Support for Active Security. In Proc. of SACMAT, 2001.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.