메뉴 건너뛰기




Volumn 10, Issue 2, 2007, Pages

On mutually exclusive roles and separation-of-duty

Author keywords

Computational complexity; constraints; Role based access control; separation of duty; verification

Indexed keywords

ROLE-BASED ACCESS CONTROL; SEPARATION-OF-DUTY; STATICALLY MUTUALLY EXCLUSIVE ROLES (SMER);

EID: 34249745790     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1237500.1237501     Document Type: Article
Times cited : (103)

References (40)
  • 2
    • 84956993736 scopus 로고    scopus 로고
    • AHN, G.-J. AND SANDHU, R. S. 2000. Role-based authorization constraints specification. ACM Transactions on Information and System Security 3, 4 (Nov.), 207-226.
    • AHN, G.-J. AND SANDHU, R. S. 2000. Role-based authorization constraints specification. ACM Transactions on Information and System Security 3, 4 (Nov.), 207-226.
  • 3
    • 34249678137 scopus 로고    scopus 로고
    • ANSI. 2004. American national standard for information technology-role based access control. ANSI INCITS 359-2004.
    • ANSI. 2004. American national standard for information technology-role based access control. ANSI INCITS 359-2004.
  • 6
    • 34249668902 scopus 로고    scopus 로고
    • BERTINO, E., FERRARI, E., AND ATLURI, V. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security 2, 1 (Feb.), 65-104.
    • BERTINO, E., FERRARI, E., AND ATLURI, V. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security 2, 1 (Feb.), 65-104.
  • 7
    • 0034810791 scopus 로고    scopus 로고
    • Separation of duties for access control enforcement in workflow environments
    • BOTHA, R. AND ELOFF, J. 2001. Separation of duties for access control enforcement in workflow environments. IBM Systems Journal 40, 3, 666-682.
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 666-682
    • BOTHA, R.1    ELOFF, J.2
  • 8
    • 0023266943 scopus 로고
    • A comparision of commercial and military computer security policies
    • IEEE Computer Society Press, Washington, D.C
    • CLARK, D. D. AND WILSON, D. R. 1987. A comparision of commercial and military computer security policies. In Proceedings of the 1987 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Washington, D.C. 184-194.
    • (1987) Proceedings of the 1987 IEEE Symposium on Security and Privacy , pp. 184-194
    • CLARK, D.D.1    WILSON, D.R.2
  • 12
    • 34249664654 scopus 로고    scopus 로고
    • DU, D., GU, J., AND PARDALOS, P. M., Eds. 1997. Satisfiability Problem: Theory and Applications. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, 35. AMS Press, Brooklyn, NY.
    • DU, D., GU, J., AND PARDALOS, P. M., Eds. 1997. Satisfiability Problem: Theory and Applications. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 35. AMS Press, Brooklyn, NY.
  • 15
    • 84992227458 scopus 로고    scopus 로고
    • FEHRAIOLO, D. F., SANDHU, R. S., GAVRILA, S., KUHN, D. R., AND CHANDRAMOULI, R. 2001. Proposed NIST standard for role-based access control. ACM Transactions on Information and Systems Security 4, 3 (Aug.), 224-274.
    • FEHRAIOLO, D. F., SANDHU, R. S., GAVRILA, S., KUHN, D. R., AND CHANDRAMOULI, R. 2001. Proposed NIST standard for role-based access control. ACM Transactions on Information and Systems Security 4, 3 (Aug.), 224-274.
  • 24
    • 17444406680 scopus 로고    scopus 로고
    • JOSHI, J., BERTINO, E., LATIF, U., AND GHAFOOR, A. 2005. A generalized temporal role-based access control model. IEEE Transactions on Knowledge and Data Engineering (TKDE) 17, 1 (Jan.), 4-23.
    • JOSHI, J., BERTINO, E., LATIF, U., AND GHAFOOR, A. 2005. A generalized temporal role-based access control model. IEEE Transactions on Knowledge and Data Engineering (TKDE) 17, 1 (Jan.), 4-23.
  • 27
    • 0031346670 scopus 로고    scopus 로고
    • Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems
    • KUHN, D. R. 1997. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. In Proceedings of the Second ACM Workshop on Role-Based Access Control (RBAC'97). 23-30.
    • (1997) Proceedings of the Second ACM Workshop on Role-Based Access Control (RBAC'97) , pp. 23-30
    • KUHN, D.R.1
  • 31
    • 0016555241 scopus 로고    scopus 로고
    • SALTZER, J. H. AND SCHROEDER, M. D. 1975. The protection of information in computer systems. Proceedings of the IEEE 63, 9 (Sept.), 1278-1308.
    • SALTZER, J. H. AND SCHROEDER, M. D. 1975. The protection of information in computer systems. Proceedings of the IEEE 63, 9 (Sept.), 1278-1308.
  • 35
    • 0030086382 scopus 로고    scopus 로고
    • SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Computer 29, 2 (Feb.), 38-47.
    • SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Computer 29, 2 (Feb.), 38-47.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.