메뉴 건너뛰기




Volumn 18, Issue 4, 2007, Pages 955-966

Access control in new network environment

Author keywords

DAC (discretionary access control); MAC (mandatory access control); RBAC (role based access control); Trust model

Indexed keywords

INTERNET; WIRELESS NETWORKS;

EID: 34249292685     PISSN: 10009825     EISSN: None     Source Type: Journal    
DOI: 10.1360/jos180955     Document Type: Article
Times cited : (19)

References (45)
  • 4
    • 0003969633 scopus 로고
    • Trusted computer system evaluation criteria (TESEC)
    • Department of Defense. Technical Report, DOD 5200.28-STD
    • Department of Defense. Trusted computer system evaluation criteria (TESEC). Technical Report, DOD 5200.28-STD, 1985.
    • (1985)
  • 8
    • 84977755884 scopus 로고    scopus 로고
    • The ARBAC99 model for administration of roles
    • Washington: IEEE Computer Society
    • Sandhu R, Munawer Q. The ARBAC99 model for administration of roles. In: Proc. of the 15th Annual Computer Security Applications Conf. Washington: IEEE Computer Society, 1999. 229-238. http://www.list.gmu.edu/confrnc/acsac/acsac99(org).pdf
    • (1999) Proc. of the 15th Annual Computer Security Applications Conf. , pp. 229-238
    • Sandhu, R.1    Munawer, Q.2
  • 10
    • 0002841051 scopus 로고    scopus 로고
    • Task-Based authentication control (TBAC): A family of models for active an enterprise-oriented authentication management
    • California
    • Thomas RK, Sandhu RS. Task-Based authentication control (TBAC): A family of models for active an enterprise-oriented authentication management. In: Proc. of the 11th IFIP Conf. on Database Security. California, 1997. 11-13. http://www.list.gmu.edu/confrnc/ifip/i97tbac.pdf
    • (1997) Proc. of the 11th IFIP Conf. on Database Security , pp. 11-13
    • Thomas, R.K.1    Sandhu, R.S.2
  • 11
    • 0038825675 scopus 로고    scopus 로고
    • Task-Role-Based access control model
    • Oh S, Park S. Task-Role-Based access control model. Information System, 2003,28(6):533-562.
    • (2003) Information System , vol.28 , Issue.6 , pp. 533-562
    • Oh, S.1    Park, S.2
  • 15
    • 61849106857 scopus 로고    scopus 로고
    • Condor high throughput computing
    • Condor high throughput computing. 2006. http://www.cs.wise.edu/condor/
    • (2006)
  • 16
    • 34249288542 scopus 로고    scopus 로고
    • Legion, a worldwide virtual computer
    • Legion Research Group of the University of Virginia
    • Legion Research Group of the University of Virginia. Legion, a worldwide virtual computer. 2005. http://legion.virginia.edu/
    • (2005)
  • 17
    • 34249306077 scopus 로고    scopus 로고
    • Globus project: Globus toolkit
    • Globus project: Globus toolkit. 2006. http://www.globus.org/
    • (2006)
  • 24
    • 0242624675 scopus 로고    scopus 로고
    • A reputation-based trust model for peer-to-peer ecommerce communities
    • New York: ACM Press
    • Xing L, Liu L. A reputation-based trust model for peer-to-peer ecommerce communities. In: Proc. of the ACM Conf. on Electronic Commerce. New York: ACM Press, 2003. 228-229.
    • (2003) Proc. of the ACM Conf. on Electronic Commerce , pp. 228-229
    • Xing, L.1    Liu, L.2
  • 33
    • 20444411497 scopus 로고    scopus 로고
    • Research on trustworthy networks
    • Chinese source
    • Lin C, Peng XH. Research on trustworthy networks. Chinese Journal of Computers, 2005,28(5):751-758 (in Chinese with English abstract).
    • (2005) Chinese Journal of Computers , vol.28 , Issue.5 , pp. 751-758
    • Lin, C.1    Peng, X.H.2
  • 34
    • 0141862713 scopus 로고    scopus 로고
    • The meanings of trust
    • Technical Report, TR94-04, University of Minnesota
    • Mcknight D, Chervany N. The meanings of trust. Technical Report, TR94-04, University of Minnesota, 1996.
    • (1996)
    • Mcknight, D.1    Chervany, N.2
  • 35
    • 85113133621 scopus 로고    scopus 로고
    • CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks
    • Portoroz
    • Michiardi P, Molva R. CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks. In: Proc. of the 6th IFIP Conf. on Communications and Multimedia Security. Portoroz, 2002. http://portal.acm.org/citation.cfm-id=647802.737297
    • (2002) Proc. of the 6th IFIP Conf. on Communications and Multimedia Security
    • Michiardi, P.1    Molva, R.2
  • 41
    • 33646831908 scopus 로고    scopus 로고
    • TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks
    • New York: ACM Press
    • Srivatsa M, Xiong L, Liu L. TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks. In: Proc. of the 14th World Wide Web Conf. New York: ACM Press, 2005. 422-431.
    • (2005) Proc. of the 14th World Wide Web Conf. , pp. 422-431
    • Srivatsa, M.1    Xiong, L.2    Liu, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.