메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 121-131

Role-based access control consistency validation

Author keywords

J2EE; Java; Java EE; RBAC; Role based access control; Security; Static analysis

Indexed keywords

LOCATION CONSISTENCY; LOCATION-CONSISTENCY PROPERTY; ROLE BASED ACCESS CONTROL (RBAC); STATIC ANALYSIS FOR VALIDATION OF ENTERPRISE SECURITY (SAVES);

EID: 34247363687     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1146238.1146253     Document Type: Conference Paper
Times cited : (23)

References (42)
  • 1
    • 34247339204 scopus 로고
    • Analysis and Specialization for the C Programming Language. PhD thesis, University of Copenhagen, Copenhagen, Denmark, May
    • Lars Ole Andersen. Program Analysis and Specialization for the C Programming Language. PhD thesis, University of Copenhagen, Copenhagen, Denmark, May 1994.
    • (1994) Program
    • Ole Andersen, L.1
  • 2
    • 34247361097 scopus 로고    scopus 로고
    • Achim D. Brucker and Burkhart Wolff. Testing Distributed Component Based Systems Using UML/OCL. In K. Bauknecht, W. Brauer, and Th. Muck, editors, Proceedings of Informatik 2001, 1 of Tagungsband der GI/ÖCG Jahrestagung, pages 608-614, Vienna, Austria, November 2001. Österreichische Computer Gesellschaft.
    • Achim D. Brucker and Burkhart Wolff. Testing Distributed Component Based Systems Using UML/OCL. In K. Bauknecht, W. Brauer, and Th. Muck, editors, Proceedings of Informatik 2001, volume 1 of Tagungsband der GI/ÖCG Jahrestagung, pages 608-614, Vienna, Austria, November 2001. Österreichische Computer Gesellschaft.
  • 9
    • 34247358553 scopus 로고    scopus 로고
    • Stephen J. Fink, Julian Dolby, and Logan Colby. Semi-Automatic J2EE Transaction Configuration. Technical Report RC23326, IBM Corporation, Thomas J. Watson Research Center, Yorktown Heights, NY, USA, 2004.
    • Stephen J. Fink, Julian Dolby, and Logan Colby. Semi-Automatic J2EE Transaction Configuration. Technical Report RC23326, IBM Corporation, Thomas J. Watson Research Center, Yorktown Heights, NY, USA, 2004.
  • 10
    • 21644484975 scopus 로고    scopus 로고
    • O'Reilly & Associates, Inc, Sebastopol, CA, USA, June
    • Adam Freeman and Allen Jones. Programming .NET Security. O'Reilly & Associates, Inc., Sebastopol, CA, USA, June 2003.
    • (2003) Programming .NET Security
    • Freeman, A.1    Jones, A.2
  • 11
    • 0034246578 scopus 로고    scopus 로고
    • Location Consistency-A New Memory Model and Cache Consistency Protocol
    • Guang R. Gao and Vivek Sarkar. Location Consistency-A New Memory Model and Cache Consistency Protocol. IEEE Transactions on Computers, 49(8):798-813, 2000.
    • (2000) IEEE Transactions on Computers , vol.49 , Issue.8 , pp. 798-813
    • Gao, G.R.1    Sarkar, V.2
  • 13
    • 0004277741 scopus 로고    scopus 로고
    • Birkhäuser, Boston, MA, USA, second edition, January
    • George Grätzer. General Lattice Theory. Birkhäuser, Boston, MA, USA, second edition, January 2003.
    • (2003) General Lattice Theory
    • Grätzer, G.1
  • 14
    • 0011792814 scopus 로고    scopus 로고
    • A Framework for Call Graph Construction Algorithms
    • November
    • David Grove and Craig Chambers. A Framework for Call Graph Construction Algorithms. ACM Trans. Program. Lang. Syst., 23(6):685-746, November 2001.
    • (2001) ACM Trans. Program. Lang. Syst , vol.23 , Issue.6 , pp. 685-746
    • Grove, D.1    Chambers, C.2
  • 16
    • 34247370090 scopus 로고    scopus 로고
    • IBM Corporation
    • IBM Corporation, Trade3 Benchmark, http://www.ibm.com/software/.
    • Trade3 Benchmark
  • 17
    • 0038507387 scopus 로고    scopus 로고
    • Alloy: A Lightweight Object Modelling Notation
    • Daniel Jackson. Alloy: A Lightweight Object Modelling Notation. ACM Trans. Softw. Eng. Methodol., 11(2):256-290, 2002.
    • (2002) ACM Trans. Softw. Eng. Methodol , vol.11 , Issue.2 , pp. 256-290
    • Jackson, D.1
  • 19
    • 0015742560 scopus 로고    scopus 로고
    • Gary A. Kildall. A Unified Approach to Global Program Optimization. In Proceedings of the 1st Annual, ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages, pages 194-206, Boston, MA, USA, 1973. ACM Press.
    • Gary A. Kildall. A Unified Approach to Global Program Optimization. In Proceedings of the 1st Annual, ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages, pages 194-206, Boston, MA, USA, 1973. ACM Press.
  • 26
    • 26444597311 scopus 로고    scopus 로고
    • Static Analysis of Role-Based Access Control in J2EE Applications
    • September
    • Gleb Naumovich and Paolina, Centonze. Static Analysis of Role-Based Access Control in J2EE Applications. SIGSOFT Software Engineering Notes, 29(5): 1-10, September 2004.
    • (2004) SIGSOFT Software Engineering Notes , vol.29 , Issue.5 , pp. 1-10
    • Naumovich, G.1    Paolina, C.2
  • 29
    • 34247380593 scopus 로고    scopus 로고
    • Marco Pistoia, and Robert J. Flynn. Interprocedural Analysis for Automatic Evaluation of Role-Based Access Control Policies. Technical Report RC23846 (W0511-020), IBM Corporation, Thomas J. Watson Research Center, Yorktown Heights, NY, USA, November 2005.
    • Marco Pistoia, and Robert J. Flynn. Interprocedural Analysis for Automatic Evaluation of Role-Based Access Control Policies. Technical Report RC23846 (W0511-020), IBM Corporation, Thomas J. Watson Research Center, Yorktown Heights, NY, USA, November 2005.
  • 35
    • 0016555241 scopus 로고
    • The Protection of Information in Computer Systems
    • September
    • Jerome H. Saltzer and Michael D. Schroeder. The Protection of Information in Computer Systems. In Proceedings of the IEEE, volume 63, pages 1278-1308, September 1975.
    • (1975) Proceedings of the IEEE , vol.63 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 36
  • 37
    • 0242625217 scopus 로고    scopus 로고
    • A Lightweight Approach to Specification and Analysis of Role-Based Access Control Extensions
    • Monterey, CA, USA, ACM Press
    • Andreas Schaad and Jonathan D. Moffett. A Lightweight Approach to Specification and Analysis of Role-Based Access Control Extensions. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, pages 13-22, Monterey, CA, USA, 2002. ACM Press.
    • (2002) Proceedings of the 7th ACM Symposium on Access Control Models and Technologies , pp. 13-22
    • Schaad, A.1    Moffett, J.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.