메뉴 건너뛰기




Volumn , Issue , 2006, Pages 113-123

Resiliency policies in access control

Author keywords

Access control; Fault tolerant; Policy design

Indexed keywords

EMERGENCY SITUATIONS; POLICY DESIGN; RESILIENCY POLICY;

EID: 34547319005     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1180405.1180421     Document Type: Conference Paper
Times cited : (21)

References (27)
  • 2
    • 0023266943 scopus 로고
    • A comparision of commercial and military computer security policies
    • IEEE Computer Society Press, May
    • D. D. Clark and D. R. Wilson. A comparision of commercial and military computer security policies. In Proceedings of the, 1987 IEEE Symposium on Security and Privacy, pages 184-194. IEEE Computer Society Press, May 1987.
    • (1987) Proceedings of the, 1987 IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 4
    • 33646712738 scopus 로고    scopus 로고
    • Daniel Le Berre project leader, URL, Jan
    • Daniel Le Berre (project leader). SAT4J: A satisfiability library for Java. URL http://www.sat4j.org/, Jan. 2006.
    • (2006) SAT4J: A satisfiability library for Java
  • 5
    • 0010916383 scopus 로고    scopus 로고
    • Satisfiability Problem: Theory and Applications
    • D. Du, J. Gu, and P. M. Pardalos, editors, of, AMS Press
    • D. Du, J. Gu, and P. M. Pardalos, editors. Satisfiability Problem: Theory and Applications, volume 35 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science. AMS Press, 1997.
    • (1997) DIMACS Series in Discrete Mathematics and Theoretical Computer Science , vol.35
  • 13
    • 0003103622 scopus 로고
    • Protection
    • Proceedings of the 5th Princeton Conference on Information Sciences and Systems, Jan
    • B. W. Lampson. Protection. In Proceedings of the 5th Princeton Conference on Information Sciences and Systems, 1971. Reprinted in ACM Operating Systems Review, 8(1):18-24, Jan 1974.
    • (1971) Reprinted in ACM Operating Systems Review , vol.8 , Issue.1 , pp. 18-24
    • Lampson, B.W.1
  • 15
    • 30544438141 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Security analysis in trust management
    • May
    • N. Li, J. C. Mitchell, and W. H. Winsborough. Beyond proof-of-compliance: Security analysis in trust management. Journal of the ACM, 52(3):474-514, May 2005.
    • (2005) Journal of the ACM , vol.52 , Issue.3 , pp. 474-514
    • Li, N.1    Mitchell, J.C.2    Winsborough, W.H.3
  • 16
    • 34547325938 scopus 로고    scopus 로고
    • Preliminary version appeared in Proceedings of 2003 IEEE Symposium on Security and Privacy.
    • Preliminary version appeared in Proceedings of 2003 IEEE Symposium on Security and Privacy.
  • 18
    • 0017512599 scopus 로고
    • A linear time algorithm for deciding subject security
    • R. J. Lipton and L. Snyder. A linear time algorithm for deciding subject security. Journal of the ACM, 24(3):455-464, 1977.
    • (1977) Journal of the ACM , vol.24 , Issue.3 , pp. 455-464
    • Lipton, R.J.1    Snyder, L.2
  • 21
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • September
    • J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9): 1278-1308, September 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 23
    • 0023999796 scopus 로고
    • The schematic protection model: Its definition and analysis for acyclic attenuating systems
    • R. S. Sandhu. The schematic protection model: Its definition and analysis for acyclic attenuating systems. Journal of the ACM, 35(2):404-432, 1988.
    • (1988) Journal of the ACM , vol.35 , Issue.2 , pp. 404-432
    • Sandhu, R.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.