메뉴 건너뛰기




Volumn , Issue , 2007, Pages 3-15

Design and semantics of a decentralized authorization language

Author keywords

[No Author keywords available]

Indexed keywords

CONSTRAINT THEORY; DATA REDUCTION; IMAGE RESOLUTION; QUERY LANGUAGES;

EID: 35048879241     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2007.18     Document Type: Conference Paper
Times cited : (107)

References (50)
  • 1
    • 0031637195 scopus 로고    scopus 로고
    • On SDSI's linked local name spaces
    • M. Abadi. On SDSI's linked local name spaces. Journal of Computer Security, 6(1-2):3-22, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 3-22
    • Abadi, M.1
  • 5
    • 3042584122 scopus 로고    scopus 로고
    • Flexible access control policy specification with constraint logic programming
    • S. Barker and P. J. Stuckey. Flexible access control policy specification with constraint logic programming. ACM Trans. Inf. Syst. Secur., 6(4):501-546, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.4 , pp. 501-546
    • Barker, S.1    Stuckey, P.J.2
  • 6
    • 33947674219 scopus 로고    scopus 로고
    • Cassandra: Flexible trust management and its application to electronic health records
    • Technical Report UCAM-CL-TR-648, University of Cambridge, Computer Laboratory, 2005. See
    • M. Y. Becker. Cassandra: Flexible trust management and its application to electronic health records (Ph.D. thesis). Technical Report UCAM-CL-TR-648, University of Cambridge, Computer Laboratory, 2005. See http://www.cl.cam.ac.uk/ TechReports/UCAM-CL-TR-648.html.
    • Becker, M.Y.1
  • 7
    • 35048847843 scopus 로고    scopus 로고
    • M. Y. Becker, C. Fournet, and A. D. Gordon. Sec-PAL: Design and semantics of a decentralized authorization language. Technical report, Microsoft Research, 2006.research.microsoft.com/research/pubs/view.aspx?tr_id=1166.
    • M. Y. Becker, C. Fournet, and A. D. Gordon. Sec-PAL: Design and semantics of a decentralized authorization language. Technical report, Microsoft Research, 2006.research.microsoft.com/research/pubs/view.aspx?tr_id=1166.
  • 8
    • 35048846423 scopus 로고    scopus 로고
    • M. Y. Becker and S. Nanz. A logic for state-modifying authorization policies. Technical Report MSR-TR-2007-32, Microsoft Research, 2007. research.microsoft.com/research/pubs/view.aspx?tr_id=1274.
    • M. Y. Becker and S. Nanz. A logic for state-modifying authorization policies. Technical Report MSR-TR-2007-32, Microsoft Research, 2007. research.microsoft.com/research/pubs/view.aspx?tr_id=1274.
  • 10
    • 4944223328 scopus 로고    scopus 로고
    • Cassandra: Flexible trust management, applied to electronic health records
    • M. Y. Becker and P. Sewell. Cassandra: Flexible trust management, applied to electronic health records. In IEEE Computer Security Foundations Workshop, pages 139-154, 2004.
    • (2004) IEEE Computer Security Foundations Workshop , pp. 139-154
    • Becker, M.Y.1    Sewell, P.2
  • 11
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and Multics interpretation
    • Technical report, The MITRE Corporation, July
    • D. E. Bell and L. J. LaPadula. Secure computer systems: Unified exposition and Multics interpretation. Technical report, The MITRE Corporation, July 1975.
    • (1975)
    • Bell, D.E.1    LaPadula, L.J.2
  • 12
    • 0032153903 scopus 로고    scopus 로고
    • An access control model supporting periodicity constraints and temporal reasoning
    • E. Bertino, C. Bettini, E. Ferrari, and P. Samarati. An access control model supporting periodicity constraints and temporal reasoning. ACM Trans. Database Syst., 23(3), 1998.
    • (1998) ACM Trans. Database Syst , vol.23 , Issue.3
    • Bertino, E.1    Bettini, C.2    Ferrari, E.3    Samarati, P.4
  • 19
    • 0029695436 scopus 로고    scopus 로고
    • Tabled evaluation with delaying for general logic programs
    • W. Chen and D. S. Warren. Tabled evaluation with delaying for general logic programs. Journal of the ACM, 43(1):20-74, 1996.
    • (1996) Journal of the ACM , vol.43 , Issue.1 , pp. 20-74
    • Chen, W.1    Warren, D.S.2
  • 22
    • 84867167943 scopus 로고    scopus 로고
    • J. DeTreville. Binder, a logic-based security language. In IEEE Symposium on Security and Privacy, pages 105-113, 2002.
    • J. DeTreville. Binder, a logic-based security language. In IEEE Symposium on Security and Privacy, pages 105-113, 2002.
  • 24
    • 0023561596 scopus 로고
    • Extension tables: Memo relations in logic programming
    • S. W. Dietrich. Extension tables: Memo relations in logic programming. In Symposium on Logic Programming, pages 264-272, 1987.
    • (1987) Symposium on Logic Programming , pp. 264-272
    • Dietrich, S.W.1
  • 26
    • 35048849307 scopus 로고    scopus 로고
    • C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory, RFC 2693, September 1999. See http://www.ietf.org/rfc/rfc2693.txt.
    • C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory, RFC 2693, September 1999. See http://www.ietf.org/rfc/rfc2693.txt.
  • 32
    • 4243532938 scopus 로고
    • Constraint logic programming: A survey
    • J. Jaffar and M. J. Maher. Constraint logic programming: a survey. Journal of Logic Programming, 19/20:503-581, 1994.
    • (1994) Journal of Logic Programming , vol.19-20 , pp. 503-581
    • Jaffar, J.1    Maher, M.J.2
  • 38
    • 0037974359 scopus 로고    scopus 로고
    • Datalog with constraints: A foundation for trust management languages
    • N. Li and J. C. Mitchell. Datalog with constraints: A foundation for trust management languages. In Proc. PADL, pages 58-73, 2003.
    • (2003) Proc. PADL , pp. 58-73
    • Li, N.1    Mitchell, J.C.2
  • 40
    • 0031382488 scopus 로고    scopus 로고
    • Reconciling role-based management and role-based access control
    • E. C. Lupu and M. Sloman. Reconciling role-based management and role-based access control. In ACM Workshop on Role-based Access Control, pages 135-141, 1997.
    • (1997) ACM Workshop on Role-based Access Control , pp. 135-141
    • Lupu, E.C.1    Sloman, M.2
  • 43
    • 0001821002 scopus 로고
    • Constraint databases: A survey
    • Semantics in Databases, of, Springer
    • P. Z. Revesz. Constraint databases: A survey. In Semantics in Databases, volume 1358 of Lecture Notes in Computer Science, pages 209-246. Springer, 1995.
    • (1995) Lecture Notes in Computer Science , vol.1358 , pp. 209-246
    • Revesz, P.Z.1
  • 44
    • 35048819863 scopus 로고    scopus 로고
    • R. L. Rivest and B. Lampson. SDSI - A simple distributed security infrastructure, August 1996. See http://theory.lcs.mit.edu/~rivest/sdsi10.ps.
    • R. L. Rivest and B. Lampson. SDSI - A simple distributed security infrastructure, August 1996. See http://theory.lcs.mit.edu/~rivest/sdsi10.ps.
  • 46
    • 0242453160 scopus 로고    scopus 로고
    • Memoing evaluation for constraint extensions of Datalog
    • D. Toman. Memoing evaluation for constraint extensions of Datalog. Constraints, 2(3/4):337-359, 1997.
    • (1997) Constraints , vol.2 , Issue.3-4 , pp. 337-359
    • Toman, D.1
  • 47
    • 0038842147 scopus 로고
    • Assigning an appropriate meaning to database logic with negation
    • H. Yamada, Y. Kambayashi, and S. Ohta, editors, World Scientific Press
    • J. D. Ullman. Assigning an appropriate meaning to database logic with negation. In H. Yamada, Y. Kambayashi, and S. Ohta, editors, Computers as Our Better Partners, pages 216-225. World Scientific Press, 1994.
    • (1994) Computers as Our Better Partners , pp. 216-225
    • Ullman, J.D.1
  • 49
    • 35048821348 scopus 로고    scopus 로고
    • V. Welch, I. Foster, T. Scavo, F. Siebenlist, and C. Catlett. Scaling TeraGrid access: A roadmap for attribute-based authorization for a large cyberinfrastructure (draft August 24). 2006. http://gridshib.globus.org/docs/tg- paper/TG-Attribute-Authz-Roadmap-draft-aug24.pdf.
    • V. Welch, I. Foster, T. Scavo, F. Siebenlist, and C. Catlett. Scaling TeraGrid access: A roadmap for attribute-based authorization for a large cyberinfrastructure (draft August 24). 2006. http://gridshib.globus.org/docs/tg- paper/TG-Attribute-Authz-Roadmap-draft-aug24.pdf.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.