메뉴 건너뛰기




Volumn 2, Issue , 2007, Pages 275-280

Conformance checking of access control policies specified in XACML

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTER AIDED SOFTWARE ENGINEERING; COMPUTER PROGRAMMING LANGUAGES; MODEL CHECKING; RESOURCE ALLOCATION;

EID: 37349091904     PISSN: 07303157     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COMPSAC.2007.96     Document Type: Conference Paper
Times cited : (45)

References (29)
  • 1
    • 84966641558 scopus 로고
    • A guide to understanding discretionary access control in trusted systems, Report NCSC-TG-003
    • National Computer Security Center, 30 September
    • National Computer Security Center. A guide to understanding discretionary access control in trusted systems, Report NCSC-TG-003, Version 1, 30 September 1987.
    • (1987) Version , vol.1
  • 2
    • 37349104989 scopus 로고    scopus 로고
    • OASIS eXtensible Access Control Markup Language (XACML). http://www.oasis-open.org/committees/xacml/, 2005.
    • OASIS eXtensible Access Control Markup Language (XACML). http://www.oasis-open.org/committees/xacml/, 2005.
  • 5
    • 37349057530 scopus 로고    scopus 로고
    • A. Anderson. XACML profile for role based access control (RBAC). OASIS Committee Draft 01, February 2004.
    • A. Anderson. XACML profile for role based access control (RBAC). OASIS Committee Draft 01, February 2004.
  • 11
    • 0017959155 scopus 로고
    • Hints on test data selection: Help for the practicing programmer
    • April
    • R. A. DeMillo, R. J. Lipton, and F. G. Sayward. Hints on test data selection: Help for the practicing programmer. IEEE Computer, 11(4):34-41, April 1978.
    • (1978) IEEE Computer , vol.11 , Issue.4 , pp. 34-41
    • DeMillo, R.A.1    Lipton, R.J.2    Sayward, F.G.3
  • 15
    • 33947625881 scopus 로고    scopus 로고
    • Assessment of access control systems
    • 7316, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, September
    • V. C. Hu, D. F. Ferraiolo, and D. R. Kuhn. Assessment of access control systems. Interagency Report 7316, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, September 2006.
    • (2006) Interagency Report
    • Hu, V.C.1    Ferraiolo, D.F.2    Kuhn, D.R.3
  • 21
    • 0033333334 scopus 로고    scopus 로고
    • Conflict in policy-based distributed systems management
    • E. C. Lupu and M. Sloman. Conflict in policy-based distributed systems management. IEEE Transaction on Software Engineering, 25(6):852-869, 1999.
    • (1999) IEEE Transaction on Software Engineering , vol.25 , Issue.6 , pp. 852-869
    • Lupu, E.C.1    Sloman, M.2
  • 26
    • 0037392527 scopus 로고    scopus 로고
    • Standards for XML and web services security
    • M. Naedele. Standards for XML and web services security. Computer, 36(4):96-98, 2003.
    • (2003) Computer , vol.36 , Issue.4 , pp. 96-98
    • Naedele, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.