메뉴 건너뛰기




Volumn , Issue , 2007, Pages 163-168

A note on the formalisation of UCON

Author keywords

Access control; Formal specification; Security policy; Usage control

Indexed keywords

DATA STRUCTURES; INFORMATION SERVICES; RESOURCE ALLOCATION; USER INTERFACES;

EID: 34548016799     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1266840.1266867     Document Type: Conference Paper
Times cited : (17)

References (10)
  • 1
    • 34548051301 scopus 로고    scopus 로고
    • SecPAL: Design and Semantics of a Decentralized Authorisation Language
    • Technical report, Microsoft Research
    • M. Y. Becker, C. Fournet, and A. D. Gordon. SecPAL: Design and Semantics of a Decentralized Authorisation Language. Technical report, Microsoft Research, 2006.
    • (2006)
    • Becker, M.Y.1    Fournet, C.2    Gordon, A.D.3
  • 2
    • 84976843391 scopus 로고
    • Efficient checking of temporal integrity constraints using bounded history encoding
    • J. Chomicki. Efficient checking of temporal integrity constraints using bounded history encoding. ACM Trans. Database Syst., 20(2):149-186, 1995.
    • (1995) ACM Trans. Database Syst , vol.20 , Issue.2 , pp. 149-186
    • Chomicki, J.1
  • 5
    • 0028424892 scopus 로고
    • The temporal logic of actions
    • L. Lamport. The temporal logic of actions. ACM TOPLAS, 16(3):872-923, 1994.
    • (1994) ACM TOPLAS , vol.16 , Issue.3 , pp. 872-923
    • Lamport, L.1
  • 6
    • 84902461453 scopus 로고    scopus 로고
    • Attribute mutability in usage control
    • C. Farkas and P. Samarati, editors, Kluwer
    • J. Park, X. Zhang, and R. S. Sandhu. Attribute mutability in usage control. In C. Farkas and P. Samarati, editors, DBSec, pages 15-29. Kluwer, 2004.
    • (2004) DBSec , pp. 15-29
    • Park, J.1    Zhang, X.2    Sandhu, R.S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.