메뉴 건너뛰기




Volumn , Issue , 2006, Pages 356-369

Beyond separation of duty: An algebra for specifying high-level security policies

Author keywords

Access control; Category; Policy design; Separation of duty

Indexed keywords

POLICY DESIGN; SEPARATION OF DUTY;

EID: 34547294402     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1180405.1180449     Document Type: Conference Paper
Times cited : (14)

References (24)
  • 4
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Feb
    • E. Bertino, E. Ferrari, and. V. Atluri. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security, 2(1):65-104, Feb. 1999.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 7
    • 0023266943 scopus 로고
    • A comparision of commercial and military computer security policies
    • IEEE Computer Society Press, May
    • D. D. Clark and D. R. Wilson. A comparision of commercial and military computer security policies. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, pages 184-194. IEEE Computer Society Press, May 1987.
    • (1987) Proceedings of the 1987 IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 17
    • 26444483379 scopus 로고    scopus 로고
    • Towards an algebra for security policies (extended abstract)
    • Proceedings of ICATPN 2005, number in, Springer
    • J. Pincus and J. M. Wing. Towards an algebra for security policies (extended abstract). In Proceedings of ICATPN 2005, number 3536 in LNCS, pages 17-25. Springer, 2005.
    • (2005) LNCS , vol.3536 , pp. 17-25
    • Pincus, J.1    Wing, J.M.2
  • 18
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • J. H. Saltzer and. M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9): 1278-1308, September 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.