메뉴 건너뛰기




Volumn , Issue , 2006, Pages 134-143

On the modeling and analysis of obligations

Author keywords

Obligations; Policy

Indexed keywords

DATA SECURITY POLICY; OBLIGATIONS; SECURE SYSTEM STATES;

EID: 34547346853     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1180405.1180423     Document Type: Conference Paper
Times cited : (86)

References (30)
  • 4
    • 1142309815 scopus 로고    scopus 로고
    • Provisions and obligations in policy management and security applications
    • Hong Kong, China, Aug
    • C. Bettini, S. Jajodia, X. S. Wang, and D. Wijesekera. Provisions and obligations in policy management and security applications. In VLDB, Hong Kong, China, Aug. 2002.
    • (2002) VLDB
    • Bettini, C.1    Jajodia, S.2    Wang, X.S.3    Wijesekera, D.4
  • 7
    • 0001071507 scopus 로고    scopus 로고
    • Compliance Checking in the PolicyMaker Trust Management System
    • West Indies, Feb
    • M. Blaze, J. Feigenbaum, and M. Strauss. Compliance Checking in the PolicyMaker Trust Management System. In Financial Cryptography, British West Indies, Feb. 1998.
    • (1998) Financial Cryptography, British
    • Blaze, M.1    Feigenbaum, J.2    Strauss, M.3
  • 13
    • 84976657250 scopus 로고
    • An authorization mechanism for a relational database systems
    • P. Griffiths and B. Wade. An authorization mechanism for a relational database systems. ACM Transactions on Database Systems, 1(3), 1976.
    • (1976) ACM Transactions on Database Systems , vol.1 , Issue.3
    • Griffiths, P.1    Wade, B.2
  • 16
    • 34547280946 scopus 로고    scopus 로고
    • K. Irwin, T. Yu, and W. Winsborough. On the modeling and analysis of obligations. Technical Report NCSU CS TR 2006-26, North Carolina State University, 2006. ftp://ftp.ncsu.edu/pub/unity/lockers/ftp/csc_anon/tech/2006/ TR-2006-26.%,pdf.
    • K. Irwin, T. Yu, and W. Winsborough. On the modeling and analysis of obligations. Technical Report NCSU CS TR 2006-26, North Carolina State University, 2006. ftp://ftp.ncsu.edu/pub/unity/lockers/ftp/csc_anon/tech/2006/ TR-2006-26.%,pdf.
  • 20
    • 84975877752 scopus 로고    scopus 로고
    • Policy conflict analysis using free variable tableaux for access control in web services environments
    • Chiba, Japan, May
    • H. Kamoda, M. Yamaoka, S. Matsuda, K. Broda, and M. Sloman. Policy conflict analysis using free variable tableaux for access control in web services environments. In Policy Management for the Web Workshop, Chiba, Japan, May 2005.
    • (2005) Policy Management for the Web Workshop
    • Kamoda, H.1    Yamaoka, M.2    Matsuda, S.3    Broda, K.4    Sloman, M.5
  • 22
    • 0038825043 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Safety and availability analysis in trust management
    • IEEE Computer Society Press, May
    • N. Li, W. H. Winsborough, and J. C. Mitchell. Beyond proof-of-compliance: Safety and availability analysis in trust management. In Proceedings of IEEE Symposium on Security and Privacy, pages 123-139. IEEE Computer Society Press, May 2003.
    • (2003) Proceedings of IEEE Symposium on Security and Privacy , pp. 123-139
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 24
    • 34547295713 scopus 로고    scopus 로고
    • Monitoring and execution for contract compliance
    • Technical Report TR 2001-261, HP Labs, 2001
    • M. Sailer and M. Morciniec. Monitoring and execution for contract compliance. Technical Report TR 2001-261, HP Labs, 2001.
    • Sailer, M.1    Morciniec, M.2
  • 26
    • 0023999796 scopus 로고
    • The Schematic Protection Model: Its definition and analysis for acyclic attenuating systems
    • R. S. Sandhu. The Schematic Protection Model: Its definition and analysis for acyclic attenuating systems. Journal of ACM, 35(2):404-432, 1988.
    • (1988) Journal of ACM , vol.35 , Issue.2 , pp. 404-432
    • Sandhu, R.S.1
  • 30
    • 34547302121 scopus 로고    scopus 로고
    • OASIS eXtensible Access Control Markup Language (XACML). http://www.oasis-open.org/committees/xacml/, 2005.
    • OASIS eXtensible Access Control Markup Language (XACML). http://www.oasis-open.org/committees/xacml/, 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.