메뉴 건너뛰기




Volumn , Issue , 2007, Pages 161-170

Deriving enforcement mechanisms from policies

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; DISTRIBUTED COMPUTER SYSTEMS; SECURITY OF DATA;

EID: 34748838372     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/POLICY.2007.15     Document Type: Conference Paper
Times cited : (14)

References (26)
  • 1
    • 0028726831 scopus 로고
    • Policy driven management for distributed systems
    • Online, Available
    • M. Sloman, "Policy driven management for distributed systems," Journal of Network and Systems Management, vol. 2, pp. 333-360, 1994. [Online], Available: citeseer.ist.psu.edu/sloman94policy.html
    • (1994) Journal of Network and Systems Management , vol.2 , pp. 333-360
    • Sloman, M.1
  • 2
    • 34748885837 scopus 로고    scopus 로고
    • ISO/IEC 10181-3:1996 Information technology - Open Systems Interconnection - Security frameworks for open systems: Access control framework, March 2006. [Online]. Available: http://www.iso. org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=18199
    • ISO/IEC
    • ISO/IEC, "ISO/IEC 10181-3:1996 Information technology - Open Systems Interconnection - Security frameworks for open systems: Access control framework," March 2006. [Online]. Available: http://www.iso. org/iso/en/CatalogueDetailPage.CatalogueDetail?CSNUMBER=18199
  • 3
    • 0042467968 scopus 로고    scopus 로고
    • Logic in Access Control
    • Ottawa, Canada: IEEE Computer Society Press, June, Online, Available
    • M. Abadi, "Logic in Access Control," in Proceedings of the 18th Annual Symposium on Logic in Computer Science (LICS'03), vol. 15. Ottawa, Canada: IEEE Computer Society Press, June 2003, pp. 228-233. [Online]. Available: citeseer.ist.psu.edu/article/abadi031ogic.html
    • (2003) Proceedings of the 18th Annual Symposium on Logic in Computer Science (LICS'03) , vol.15 , pp. 228-233
    • Abadi, M.1
  • 4
    • 34748874111 scopus 로고    scopus 로고
    • M. Y. Becker, C. Fournet, and A. D. Gordon, SecPAL: Design and Semantics of a Decentralized Authorisation Language, Microsoft Research, Roger Needham Building 7 J.J. Thompson Avenue, Cambridge, CB3 0FB, UK, Tech. Rep., September 2006.
    • M. Y. Becker, C. Fournet, and A. D. Gordon, "SecPAL: Design and Semantics of a Decentralized Authorisation Language," Microsoft Research, Roger Needham Building 7 J.J. Thompson Avenue, Cambridge, CB3 0FB, UK, Tech. Rep., September 2006.
  • 7
    • 34748886844 scopus 로고    scopus 로고
    • The Development of Secure Multi-Agent Systems,
    • Ph.D. dissertation, De Montfort University, February
    • H. T. Janicke, "The Development of Secure Multi-Agent Systems," Ph.D. dissertation, De Montfort University, February 2007.
    • (2007)
    • Janicke, H.T.1
  • 9
    • 33845388878 scopus 로고    scopus 로고
    • A Compositional Framework for the Development of Secure Access Control Systems,
    • Ph.D. dissertation, Software Technology Research Laboratory, Department of Computer Science and Engineering, De Montfort University, Leicester
    • F. Siewe, "A Compositional Framework for the Development of Secure Access Control Systems," Ph.D. dissertation, Software Technology Research Laboratory, Department of Computer Science and Engineering, De Montfort University, Leicester, 2005.
    • (2005)
    • Siewe, F.1
  • 11
    • 34748852193 scopus 로고    scopus 로고
    • L. Gong, G. Ellison, and M. Dageforde, Inside Java 2 Platform Security: Architecture, API Design and Implementation, 2nd ed. Addison-Wesley Professional, 2003, iSBN: 0201787911.
    • L. Gong, G. Ellison, and M. Dageforde, Inside Java 2 Platform Security: Architecture, API Design and Implementation, 2nd ed. Addison-Wesley Professional, 2003, iSBN: 0201787911.
  • 13
    • 0003400251 scopus 로고
    • Secure Computer Systems: Mathematical Foundations
    • MITRE Technical Report 2547, Tech. Rep
    • L. J. LaPadula and D. E. Bell, "Secure Computer Systems: Mathematical Foundations," MITRE Technical Report 2547, Tech. Rep., 1973.
    • (1973)
    • LaPadula, L.J.1    Bell, D.E.2
  • 14
    • 84902461453 scopus 로고    scopus 로고
    • Attribute mutability in usage control
    • C. Farkas and P. Samarati, Eds. Kluwer
    • J. Park, X. Zhang, and R. S. Sandhu, "Attribute mutability in usage control." in DBSec, C. Farkas and P. Samarati, Eds. Kluwer, 2004, pp. 15-29.
    • (2004) DBSec , pp. 15-29
    • Park, J.1    Zhang, X.2    Sandhu, R.S.3
  • 23
    • 0028424892 scopus 로고
    • The temporal logic of actions
    • L. Lamport, "The temporal logic of actions," ACM Trans. Program. Lang. Syst., vol. 16, no. 3, pp. 872-923, 1994.
    • (1994) ACM Trans. Program. Lang. Syst , vol.16 , Issue.3 , pp. 872-923
    • Lamport, L.1
  • 24
    • 84976843391 scopus 로고
    • Efficient checking of temporal integrity constraints using bounded history encoding
    • J. Chomicki, "Efficient checking of temporal integrity constraints using bounded history encoding," ACM Trans. Database Syst., vol. 20, no. 2, pp. 149-186, 1995.
    • (1995) ACM Trans. Database Syst , vol.20 , Issue.2 , pp. 149-186
    • Chomicki, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.