메뉴 건너뛰기




Volumn , Issue , 2007, Pages 478-487

When role models have flaws: Static validation of enterprise security policies

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; COMPUTER AIDED SOFTWARE ENGINEERING; MATHEMATICAL MODELS; USER INTERFACES;

EID: 34548808043     PISSN: 02705257     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSE.2007.98     Document Type: Conference Paper
Times cited : (27)

References (29)
  • 1
    • 33846012075 scopus 로고
    • A. V. Aho, R. Sethi, and J. D. Ullman. Compilers:, Addison-Wesley, Reading, MA, USA, Jan
    • A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley, Reading, MA, USA, Jan. 1986.
    • (1986) Principles, Techniques, and Tools
  • 9
    • 21644484975 scopus 로고    scopus 로고
    • O'Reilly & Associates, Inc, Sebastopol, CA, USA, June
    • A. Freeman and A. Jones. Programming .NET Security. O'Reilly & Associates, Inc., Sebastopol, CA, USA, June 2003.
    • (2003) Programming .NET Security
    • Freeman, A.1    Jones, A.2
  • 10
    • 0011792814 scopus 로고    scopus 로고
    • A Framework for Call Graph Construction Algorithms
    • November
    • D. Grove and C. Chambers. A Framework for Call Graph Construction Algorithms. ACM Trans. Program. Lang. Syst., 23(6):685-746, November 2001.
    • (2001) ACM Trans. Program. Lang. Syst , vol.23 , Issue.6 , pp. 685-746
    • Grove, D.1    Chambers, C.2
  • 11
    • 34247370090 scopus 로고    scopus 로고
    • IBM Corporation
    • IBM Corporation, Trade3 Benchmark, http://www.ibm.com/software/.
    • Trade3 Benchmark
  • 12
    • 0038507387 scopus 로고    scopus 로고
    • Alloy: A Lightweight Object Modelling Notation
    • D. Jackson. Alloy: A Lightweight Object Modelling Notation. ACM Trans. Softw. Eng. Methodol, 11(2):256-290, 2002.
    • (2002) ACM Trans. Softw. Eng. Methodol , vol.11 , Issue.2 , pp. 256-290
    • Jackson, D.1
  • 17
    • 34548730944 scopus 로고    scopus 로고
    • When Role Models Have Flaws: Static Validation of Enterprise Security Policies
    • Technical Report RC24056 W0609-065, IBM Corporation, Thomas J. Watson Research Center, Yorktown Heights, NY, USA, Sept
    • M. Pistoia, S. J. Fink, R. J. Flynn, and E. Yahav. When Role Models Have Flaws: Static Validation of Enterprise Security Policies. Technical Report RC24056 (W0609-065), IBM Corporation, Thomas J. Watson Research Center, Yorktown Heights, NY, USA, Sept. 2006.
    • (2006)
    • Pistoia, M.1    Fink, S.J.2    Flynn, R.J.3    Yahav, E.4
  • 21
    • 0016555241 scopus 로고
    • The Protection of Information in Computer Systems
    • Sept
    • J. H. Saltzer and M. D. Schroeder. The Protection of Information in Computer Systems. In Proceedings of the IEEE, volume 63, pages 1278-1308, Sept. 1975.
    • (1975) Proceedings of the IEEE , vol.63 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 23
    • 0242625217 scopus 로고    scopus 로고
    • A Lightweight Approach to Specification and Analysis of Role-Based Access Control Extensions
    • Monterey, CA, USA, ACM Press
    • A. Schaad and J. D. Moffett. A Lightweight Approach to Specification and Analysis of Role-Based Access Control Extensions. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, pages 13-22, Monterey, CA, USA, 2002. ACM Press.
    • (2002) Proceedings of the 7th ACM Symposium on Access Control Models and Technologies , pp. 13-22
    • Schaad, A.1    Moffett, J.D.2
  • 24
    • 34548745397 scopus 로고    scopus 로고
    • Standard Performance Evaluation Corporation Java Business Benchmark 2000 (SPECjbb2000), http://www.spec.org.
    • Standard Performance Evaluation Corporation Java Business Benchmark 2000 (SPECjbb2000), http://www.spec.org.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.