메뉴 건너뛰기




Volumn , Issue , 2003, Pages 260-267

Security assurance for an RBAC/MAC security model

Author keywords

Access control; Application software; Data security; Databases; Government; Middleware; Programming profession; Prototypes; Servers; Software prototyping

Indexed keywords

APPLICATION PROGRAMMING INTERFACES (API); APPLICATION PROGRAMS; COMPUTER PROGRAMMING; CYBERNETICS; DATABASE SYSTEMS; MIDDLEWARE; NETWORK SECURITY; SECURITY OF DATA; SECURITY SYSTEMS; SERVERS; SOFTWARE PROTOTYPING;

EID: 34247203638     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SMCSIA.2003.1232431     Document Type: Conference Paper
Times cited : (5)

References (23)
  • 5
    • 1842458587 scopus 로고
    • The Impact of Inheritance on Security in Object-Oriented Database Systems
    • Landwehr (ed.), North-Holland
    • D. Spooner, "The Impact of Inheritance on Security in Object-Oriented Database Systems," Database Security, II: Status and Prospects, Landwehr (ed.), North-Holland, 1989.
    • (1989) Database Security, II: Status and Prospects
    • Spooner, D.1
  • 6
    • 0031361985 scopus 로고    scopus 로고
    • Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications
    • S. Demurjian and T.C. Ting, "Towards a Definitive Paradigm for Security in Object-Oriented Systems and Applications," J. of Computer Security, 5(4), 1997.
    • (1997) J. of Computer Security , vol.5 , Issue.4
    • Demurjian, S.1    Ting, T.C.2
  • 7
    • 0242613526 scopus 로고    scopus 로고
    • Role-Based Access Control
    • Zerkowitz (ed.), Academic Press
    • R. Sandu, "Role-Based Access Control," Advancements in Computer Science, Vol. 48. Zerkowitz (ed.), Academic Press, 1998.
    • (1998) Advancements in Computer Science , vol.48
    • Sandu, R.1
  • 10
    • 0030087035 scopus 로고    scopus 로고
    • A Temporal Access Control Mechanism For Database Systems
    • Feb.
    • E. Bertino, et al., "A Temporal Access Control Mechanism For Database Systems," IEEE Trans. on Knowledge and Data Engineering, 8(1), Feb. 1996.
    • (1996) IEEE Trans. on Knowledge and Data Engineering , vol.8 , Issue.1
    • Bertino, E.1
  • 11
    • 0002848811 scopus 로고    scopus 로고
    • The Specification and Enforcement of Authorization Constraints in Workflow Management Systems
    • Feb.
    • E. Bertino, et al., "The Specification and Enforcement of Authorization Constraints in Workflow Management Systems," ACM Trans. on Info. Systems Security, 2(1), Feb. 1999.
    • (1999) ACM Trans. on Info. Systems Security , vol.2 , Issue.1
    • Bertino, E.1
  • 12
    • 84946428435 scopus 로고    scopus 로고
    • Using Role-Templates for Handling Recurring Role Structures
    • Lin/Qian (eds.), Chapman Hall
    • W. Essamyr, et al., "Using Role-Templates for Handling Recurring Role Structures," Database Security, XI: Status and Prospects, Lin/Qian (eds.), Chapman Hall, 1998.
    • (1998) Database Security, XI: Status and Prospects
    • Essamyr, W.1
  • 22
    • 0031611731 scopus 로고    scopus 로고
    • Formal Specification For Role Based Access Control User/Role And Role/Role Relationship Management
    • S. Gavrila, and J. Barkley, Formal Specification For Role Based Access Control User/Role And Role/Role Relationship Management," Proc. of the 3rd ACM Wksp. on RBAC, Oct. 1998.
    • Proc. of the 3rd ACM Wksp. on RBAC, Oct. 1998
    • Gavrila, S.1    Barkley, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.