메뉴 건너뛰기




Volumn 171, Issue 4, 2007, Pages 59-72

Rewriting-Based Access Control Policies

Author keywords

Access Control Policies; Term Rewriting Systems

Indexed keywords

AUTHENTICATION; DECISION THEORY; LAW ENFORCEMENT; LINEAR ALGEBRA;

EID: 34250823438     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2007.02.055     Document Type: Article
Times cited : (13)

References (25)
  • 2
    • 33746684330 scopus 로고    scopus 로고
    • Term rewriting for access control
    • DBSec. Damiani E., and Liu P. (Eds)
    • Barker S., and Fernández M. Term rewriting for access control. In: Damiani E., and Liu P. (Eds). DBSec. Lecture Notes in Computer Science 4127 (2006) 179-193
    • (2006) Lecture Notes in Computer Science , vol.4127 , pp. 179-193
    • Barker, S.1    Fernández, M.2
  • 3
    • 33745267229 scopus 로고    scopus 로고
    • Bauer, L., J. Ligatti and D. Walker, Composing security policies with polymer., in: V. Sarkar and M.W. Hall, editors, PLDI (2005), pp. 305-314
  • 4
    • 34250830678 scopus 로고    scopus 로고
    • Bell, E. D. and L.J. LaPadula, Secure computer systems: Mathematical foundations, Technical Report Mitre Report ESD-TR-73-278 (Vol. I-III), Mitre Corporation (1974)
  • 6
    • 34250857759 scopus 로고    scopus 로고
    • Bouhoula, A. and F. Jacquemard, Automatic verification of sufficient completeness for conditional constrained term rewriting systems, Technical Report RR-5863, INRIA (2006). URL http://hal.inria.fr/inria-00070163/en/
  • 7
    • 84949232265 scopus 로고    scopus 로고
    • Specifying authentication protocols using rewriting and strategies
    • PADL. Ramakrishnan I.V. (Ed)
    • Cirstea H. Specifying authentication protocols using rewriting and strategies. In: Ramakrishnan I.V. (Ed). PADL. Lecture Notes in Computer Science 1990 (2001) 138-152
    • (2001) Lecture Notes in Computer Science , vol.1990 , pp. 138-152
    • Cirstea, H.1
  • 11
    • 33749558954 scopus 로고    scopus 로고
    • Specifying and reasoning about dynamic access-control policies
    • IJCAR. Furbach U., and Shankar N. (Eds)
    • Dougherty D.J., Fisler K., and Krishnamurthi S. Specifying and reasoning about dynamic access-control policies. In: Furbach U., and Shankar N. (Eds). IJCAR. Lecture Notes in Computer Science 4130 (2006) 632-646
    • (2006) Lecture Notes in Computer Science , vol.4130 , pp. 632-646
    • Dougherty, D.J.1    Fisler, K.2    Krishnamurthi, S.3
  • 12
    • 33746103319 scopus 로고    scopus 로고
    • Echahed, R. and F. Prost, Security policy in a declarative style., in: P. Barahona and A.P. Felty, editors, PPDP (2005), pp. 153-163. URL http://doi.acm.org/10.1145/1069774.1069789
  • 13
    • 33750921115 scopus 로고    scopus 로고
    • Gnaedig, I. and H. Kirchner, Computing constructor forms with non terminating rewrite programs., in: A. Bossi and M.J. Maher, editors, PPDP (2006), pp. 121-132
  • 14
    • 0020299523 scopus 로고    scopus 로고
    • Goguen, J. A. and J. Meseguer, Security policies and security models., in: IEEE Symposium on Security and Privacy, 1982, pp. 11-20
  • 15
    • 0030244718 scopus 로고    scopus 로고
    • On termination and confluence properties of disjoint and constructor-sharing conditional rewrite systems
    • Gramlich B. On termination and confluence properties of disjoint and constructor-sharing conditional rewrite systems. Theor. Comput. Sci. 165 (1996) 97-131
    • (1996) Theor. Comput. Sci. , vol.165 , pp. 97-131
    • Gramlich, B.1
  • 16
    • 84942243858 scopus 로고    scopus 로고
    • Halpern, J. Y. and V. Weissman, Using first-order logic to reason about policies., in: CSFW (2003), pp. 187-201
  • 17
    • 84956860311 scopus 로고    scopus 로고
    • Compiling and verifying security protocols
    • LPAR. Parigot M., and Voronkov A. (Eds)
    • Jacquemard F., Rusinowitch M., and Vigneron L. Compiling and verifying security protocols. In: Parigot M., and Voronkov A. (Eds). LPAR. Lecture Notes in Computer Science 1955 (2000) 131-160
    • (2000) Lecture Notes in Computer Science , vol.1955 , pp. 131-160
    • Jacquemard, F.1    Rusinowitch, M.2    Vigneron, L.3
  • 19
    • 0024873046 scopus 로고    scopus 로고
    • Middeldorp, A., A sufficient condition for the termination of the direct sum of term rewriting systems, in: LICS (1989), pp. 396-401
  • 20
    • 34250797713 scopus 로고    scopus 로고
    • Moses, T., Extensible access control markup language (xacml) version 2.0, Technical report, OASIS (2005)
  • 21
    • 33646186281 scopus 로고    scopus 로고
    • A formal enforcement framework for role-based access control using aspect-oriented programming
    • MoDELS. Briand L.C., and Williams C. (Eds)
    • Pavlich-Mariscal J.A., Michel L., and Demurjian S.A. A formal enforcement framework for role-based access control using aspect-oriented programming. In: Briand L.C., and Williams C. (Eds). MoDELS. Lecture Notes in Computer Science 3713 (2005) 537-552
    • (2005) Lecture Notes in Computer Science , vol.3713 , pp. 537-552
    • Pavlich-Mariscal, J.A.1    Michel, L.2    Demurjian, S.A.3
  • 22
    • 0023435204 scopus 로고
    • On termination of the direct sum of term-rewriting systems
    • Rusinowitch M. On termination of the direct sum of term-rewriting systems. Inf. Process. Lett. 26 (1987) 65-70
    • (1987) Inf. Process. Lett. , vol.26 , pp. 65-70
    • Rusinowitch, M.1
  • 24
    • 0023345304 scopus 로고
    • Counterexamples to termination for the direct sum of term rewriting systems
    • Toyama Y. Counterexamples to termination for the direct sum of term rewriting systems. Inf. Process. Lett. 25 (1987) 141-143
    • (1987) Inf. Process. Lett. , vol.25 , pp. 141-143
    • Toyama, Y.1
  • 25
    • 0023252439 scopus 로고
    • On the church-rosser property for the direct sum of term rewriting systems
    • Toyama Y. On the church-rosser property for the direct sum of term rewriting systems. J. ACM 34 (1987) 128-143
    • (1987) J. ACM , vol.34 , pp. 128-143
    • Toyama, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.