메뉴 건너뛰기




Volumn 10, Issue 2, 2007, Pages

Specification and verification of security requirements in a programming model for decentralized CSCW systems

Author keywords

Finite state based model checking; Methodology for access control policy design; Role based access control; Security policy specification

Indexed keywords

ACCESS-CONTROL POLICY DESIGN; DYNAMIC SECURITY; ROLE BASED ACCESS CONTROL; SECURITY POLICY SPECIFICATION; TASK FLOW CONSTRAINTS;

EID: 34249723796     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1237500.1237503     Document Type: Article
Times cited : (16)

References (46)
  • 3
    • 84956993736 scopus 로고    scopus 로고
    • AHN, G.-J. AND SANDHU, R. 2000. Role-based authorization constraints specification. ACM Transactions on Information and System Security 3, 4 (Nov.), 207-226.
    • AHN, G.-J. AND SANDHU, R. 2000. Role-based authorization constraints specification. ACM Transactions on Information and System Security 3, 4 (Nov.), 207-226.
  • 4
    • 84949747356 scopus 로고    scopus 로고
    • An authorization model for workflows
    • Proceedings of the Fourth European Symposium on Research in Computer Security. Springer-Verlag London, UK
    • ATLURI, V. AND HUANG, W.-K. 1996. An authorization model for workflows. In Proceedings of the Fourth European Symposium on Research in Computer Security. Springer-Verlag LNCS Volume 1146, London, UK, 44-64.
    • (1996) LNCS , vol.1146 , pp. 44-64
    • ATLURI, V.1    HUANG, W.-K.2
  • 5
    • 84865788031 scopus 로고    scopus 로고
    • BACON, J., MOODY, K., AND YAO, W. 2002. A model of OASIS role-based access control and its support for active security. ACM Transactions on Information and System Security 5, 4 (Nov.), 492-540.
    • BACON, J., MOODY, K., AND YAO, W. 2002. A model of OASIS role-based access control and its support for active security. ACM Transactions on Information and System Security 5, 4 (Nov.), 492-540.
  • 6
    • 34249667420 scopus 로고    scopus 로고
    • BERTINO, E., FERRARI, E., AND ATLURI, V. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security 2, 1 (Feb.), 65-104.
    • BERTINO, E., FERRARI, E., AND ATLURI, V. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security 2, 1 (Feb.), 65-104.
  • 7
    • 84944792110 scopus 로고    scopus 로고
    • BERTINO, E., BONATTI, P. A., AND FERRARI, E. 2001. TRBAC: A temporal role-based access control model. ACM Transactions on Information and System Security 4, 3 (Aug.), 191-223.
    • BERTINO, E., BONATTI, P. A., AND FERRARI, E. 2001. TRBAC: A temporal role-based access control model. ACM Transactions on Information and System Security 4, 3 (Aug.), 191-223.
  • 8
    • 23244445557 scopus 로고    scopus 로고
    • X-GTRBAC: An XML-based policy specification framework and architecture for enterprise-wide access control
    • May
    • BHATTI, R., GHAFOOR, A., BERTINO, E., AND JOSHI, J. 2005. X-GTRBAC: An XML-based policy specification framework and architecture for enterprise-wide access control. ACM Transactions on Information and System Security 8, 2 (May), 187-227.
    • (2005) ACM Transactions on Information and System Security , vol.8 , Issue.2 , pp. 187-227
    • BHATTI, R.1    GHAFOOR, A.2    BERTINO, E.3    JOSHI, J.4
  • 9
    • 84976749912 scopus 로고
    • The specification of process synchronization by path expressions
    • Operating Systems, International Symposium, Rocquencourt, Springer Verlag, London, UK
    • CAMPBELL, R. H. AND HABERMANN, A. N. 1974. The specification of process synchronization by path expressions. In Operating Systems, International Symposium, Rocquencourt. Lecture Notes in Computer Science vol.16, Springer Verlag, London, UK.
    • (1974) Lecture Notes in Computer Science , vol.16
    • CAMPBELL, R.H.1    HABERMANN, A.N.2
  • 10
    • 0030401694 scopus 로고    scopus 로고
    • DCWPL: A programming language for describing collaborative work
    • ACM, New York
    • CORTS, M. AND MISHRA, P. 1996. DCWPL: A programming language for describing collaborative work. In. Proceedings of CSCW'96. ACM, New York. 21-29.
    • (1996) Proceedings of CSCW'96 , pp. 21-29
    • CORTS, M.1    MISHRA, P.2
  • 13
    • 3142510989 scopus 로고    scopus 로고
    • Administrative scope: A foundation for role-based administrative models
    • May
    • CRAMPTON, J. AND LOIZOU, G. 2003. Administrative scope: A foundation for role-based administrative models. ACM Transactions on Information and System. Security 6, 2 (May), 201-231.
    • (2003) ACM Transactions on Information and System. Security , vol.6 , Issue.2 , pp. 201-231
    • CRAMPTON, J.1    LOIZOU, G.2
  • 14
    • 34249713934 scopus 로고
    • User-role based security for collaborative computing environments
    • Summer
    • DEMURJIAN, S., TING, T., AND THURAISINGHAM, B. 1993. User-role based security for collaborative computing environments. Multimedia Review 4, 2 (Summer), 40-47.
    • (1993) Multimedia Review , vol.4 , Issue.2 , pp. 40-47
    • DEMURJIAN, S.1    TING, T.2    THURAISINGHAM, B.3
  • 20
    • 77952749389 scopus 로고    scopus 로고
    • SecureFlow: A secure web-enabled workflow management system
    • ACM, New York
    • HUANG, W.-K. AND ATLURI, V. 1999. SecureFlow: A secure web-enabled workflow management system. In ACM Workshop on Role-Based Access Control. ACM, New York. 83-94.
    • (1999) ACM Workshop on Role-Based Access Control , pp. 83-94
    • HUANG, W.-K.1    ATLURI, V.2
  • 22
    • 0030677524 scopus 로고    scopus 로고
    • A logical language for expressing authorizations
    • IEEE Computer Society Press, Los Alamitos, CA
    • JAJODIA, S., SAMARATI, P., AND SUBRAHMANIAN, V. S. 1997. A logical language for expressing authorizations. In IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA. 31-42.
    • (1997) IEEE Symposium on Security and Privacy , pp. 31-42
    • JAJODIA, S.1    SAMARATI, P.2    SUBRAHMANIAN, V.S.3
  • 24
    • 85137098783 scopus 로고    scopus 로고
    • KOCH, M., MANCINI, L. V., AND PARISI-PHESICCE, F. 2002. A graph-based formalism for RBAC. ACM Transactions on Information and System Security 5, 3 (Aug.), 332-365.
    • KOCH, M., MANCINI, L. V., AND PARISI-PHESICCE, F. 2002. A graph-based formalism for RBAC. ACM Transactions on Information and System Security 5, 3 (Aug.), 332-365.
  • 26
    • 0032258996 scopus 로고    scopus 로고
    • COCA: Collaborative objects coordination architecture
    • ACM, New York
    • LI, D. AND MUNTZ, R. 1998. COCA: Collaborative objects coordination architecture. In Proceedings of CSCW'98. ACM, New York. 179-188.
    • (1998) Proceedings of CSCW'98 , pp. 179-188
    • LI, D.1    MUNTZ, R.2
  • 28
    • 0038825043 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Safety and availability analysis in trust management
    • IEEE Computer Society Press, Los Alamitos, CA
    • LI, N., WINSBOROUGH, W. H., AND MITCHELL, J. 2003. Beyond proof-of-compliance: Safety and availability analysis in trust management. In Proceedings of the 2003 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA. 123-139.
    • (2003) Proceedings of the 2003 IEEE Symposium on Security and Privacy , pp. 123-139
    • LI, N.1    WINSBOROUGH, W.H.2    MITCHELL, J.3
  • 29
    • 0031382488 scopus 로고    scopus 로고
    • Reconciling role-based management and role-based access control
    • ACM, New York
    • LUPU, E. C. AND SLOMAN, M. 1997. Reconciling role-based management and role-based access control. In ACM Workshop on Role-based Access Control. ACM, New York. 135-141.
    • (1997) ACM Workshop on Role-based Access Control , pp. 135-141
    • LUPU, E.C.1    SLOMAN, M.2
  • 30
    • 84893561028 scopus 로고    scopus 로고
    • Using SPIN to verify security protocols
    • Proceedings of 9th Int. SPIN Workshop on Model Checking of Software
    • MAGGI, P. AND SISTO, R. 2002. Using SPIN to verify security protocols. In Proceedings of 9th Int. SPIN Workshop on Model Checking of Software, LNCS 2318. 187-204.
    • (2002) LNCS , vol.2318 , pp. 187-204
    • MAGGI, P.1    SISTO, R.2
  • 32
    • 34249739906 scopus 로고    scopus 로고
    • NYANCHAMA, M. AND OSBORN, S. 1999. The role graph model and conflict of interest. ACM Transaction on Information System Security 2, 1 (Feb.), 3-33.
    • NYANCHAMA, M. AND OSBORN, S. 1999. The role graph model and conflict of interest. ACM Transaction on Information System Security 2, 1 (Feb.), 3-33.
  • 35
    • 0342748752 scopus 로고
    • Securing causal relationships in distributed systems
    • REITER, M. AND GONG, L. 1995. Securing causal relationships in distributed systems. The Computer Journal 38, 8, 633-642.
    • (1995) The Computer Journal , vol.38 , Issue.8 , pp. 633-642
    • REITER, M.1    GONG, L.2
  • 36
    • 0017723679 scopus 로고
    • Towards autonomous descriptions of synchronization modules
    • North-Holland, Amsterdam
    • ROBERTS, P. AND VERJUS, J.-P. 1977. Towards autonomous descriptions of synchronization modules. In Proceedings of IFIP Congress. North-Holland, Amsterdam. 981-986.
    • (1977) Proceedings of IFIP Congress , pp. 981-986
    • ROBERTS, P.1    VERJUS, J.-P.2
  • 39
    • 34249728058 scopus 로고    scopus 로고
    • SANDHU, R., BHAMIDIPATI, V., AND MUNAWER, Q. 1999. The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security 2, 1 (Feb.), 105-135.
    • SANDHU, R., BHAMIDIPATI, V., AND MUNAWER, Q. 1999. The ARBAC97 model for role-based administration of roles. ACM Transactions on Information and System Security 2, 1 (Feb.), 105-135.
  • 40
    • 0030086382 scopus 로고    scopus 로고
    • SANDHU, R., COYNE, E., FEINSTEIN, H., AND YOUMAN, C. 1996. Role-based access control models. IEEE Computer 29, 2 (Feb.), 38-47.
    • SANDHU, R., COYNE, E., FEINSTEIN, H., AND YOUMAN, C. 1996. Role-based access control models. IEEE Computer 29, 2 (Feb.), 38-47.
  • 42
    • 0030644642 scopus 로고    scopus 로고
    • Separation of duty in role-based environments
    • IEEE Computer Society Press, Los Alamitos, CA
    • SIMON, R. AND ZURKO, M. 1997. Separation of duty in role-based environments. In 10th Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos, CA. 183-194.
    • (1997) 10th Computer Security Foundations Workshop , pp. 183-194
    • SIMON, R.1    ZURKO, M.2
  • 43
    • 0031387996 scopus 로고    scopus 로고
    • Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments
    • ACM, New York
    • THOMAS, R. K. 1997. Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments. In ACM Workshop on Role-based Access Control. ACM, New York. 13-19.
    • (1997) ACM Workshop on Role-based Access Control , pp. 13-19
    • THOMAS, R.K.1
  • 46
    • 0030672129 scopus 로고    scopus 로고
    • A general theory of security properties
    • IEEE Computer Society Press, Los Alamitos, CA
    • ZAKINTHINOS, A. AND LEE, E. 1997. A general theory of security properties. In IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA. 94-102.
    • (1997) IEEE Symposium on Security and Privacy , pp. 94-102
    • ZAKINTHINOS, A.1    LEE, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.