메뉴 건너뛰기




Volumn 4602 LNCS, Issue , 2007, Pages 195-210

Dynamic event-based access control as term rewriting

Author keywords

[No Author keywords available]

Indexed keywords

DATA PROCESSING; DYNAMICAL SYSTEMS; MATHEMATICAL MODELS; ARTIFICIAL INTELLIGENCE; COMPUTERS;

EID: 37849037811     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-73538-0_15     Document Type: Conference Paper
Times cited : (38)

References (31)
  • 2
    • 3042601656 scopus 로고    scopus 로고
    • Protocol analysis in intrusion detection using decision tree
    • Abbes, T., Bouhoula, A., Rusinowitch, M.: Protocol analysis in intrusion detection using decision tree. In: Proc. ITCC'04, pp. 404-408 (2004)
    • (2004) Proc. ITCC'04 , pp. 404-408
    • Abbes, T.1    Bouhoula, A.2    Rusinowitch, M.3
  • 3
    • 0037999031 scopus 로고    scopus 로고
    • Abendroth, J., Jensen, C.: A unified security mechanism for networked applications. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, 3006, pp. 351-357. Springer, Heidelberg (2004)
    • Abendroth, J., Jensen, C.: A unified security mechanism for networked applications. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 351-357. Springer, Heidelberg (2004)
  • 5
    • 84865788031 scopus 로고    scopus 로고
    • A model of OASIS RBAC and its support for active security
    • Bacon, J., Moody, K., Yao, W.: A model of OASIS RBAC and its support for active security. TISSEC 5(4), 492-540 (2002)
    • (2002) TISSEC , vol.5 , Issue.4 , pp. 492-540
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 7
    • 33746684330 scopus 로고    scopus 로고
    • Term rewriting for access control
    • Damiani, E, Liu, P, eds, Data and Applications Security XX, Springer, Heidelberg
    • Barker, S., Fernández, M.: Term rewriting for access control. In: Damiani, E., Liu, P. (eds.) Data and Applications Security XX. LNCS, vol. 4127, Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4127
    • Barker, S.1    Fernández, M.2
  • 8
    • 3042584122 scopus 로고    scopus 로고
    • Flexible access control policy specification with constraint logic programming
    • Barker, S., Stuckey, P.: Flexible access control policy specification with constraint logic programming. ACM Trans. on Information and System Security 6(4), 501-546 (2003)
    • (2003) ACM Trans. on Information and System Security , vol.6 , Issue.4 , pp. 501-546
    • Barker, S.1    Stuckey, P.2
  • 9
    • 37849007125 scopus 로고    scopus 로고
    • Barthe, G., Dufay, G., Huisman, M., de Sousa, S.M.: Jakarta: a toolset to reason about the JavaCard platform. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, 2140, Springer, Heidelberg (2001)
    • Barthe, G., Dufay, G., Huisman, M., de Sousa, S.M.: Jakarta: a toolset to reason about the JavaCard platform. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, Springer, Heidelberg (2001)
  • 11
    • 0032153903 scopus 로고    scopus 로고
    • An access control model supporting periodicity constraints and temporal reasoning
    • Bertino, E., Bettini, C., Ferrari, E., Samarati, P.: An access control model supporting periodicity constraints and temporal reasoning. ACM TODS 23(3), 231-285 (1998)
    • (1998) ACM TODS , vol.23 , Issue.3 , pp. 231-285
    • Bertino, E.1    Bettini, C.2    Ferrari, E.3    Samarati, P.4
  • 15
    • 84928563923 scopus 로고    scopus 로고
    • Clavel, M., Durán, F., Eker, S., Lincoln, P., Martí-Oliet, N., Meseguer, J., Talcott, C.: The Maude 2.0 system. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, 2706, pp. 76-87. Springer, Heidelberg (2003)
    • Clavel, M., Durán, F., Eker, S., Lincoln, P., Martí-Oliet, N., Meseguer, J., Talcott, C.: The Maude 2.0 system. In: Nieuwenhuis, R. (ed.) RTA 2003. LNCS, vol. 2706, pp. 76-87. Springer, Heidelberg (2003)
  • 16
    • 37849029876 scopus 로고    scopus 로고
    • Dershowitz, N., Jouannaud, J.-P.: Rewrite Systems. In: van Leeuwen, J. (ed.) Handbook of Theoretical Computer Science: Formal Methods and Semantics, B, North-Holland, Amsterdam (1989)
    • Dershowitz, N., Jouannaud, J.-P.: Rewrite Systems. In: van Leeuwen, J. (ed.) Handbook of Theoretical Computer Science: Formal Methods and Semantics, vol. B, North-Holland, Amsterdam (1989)
  • 17
    • 0036083264 scopus 로고    scopus 로고
    • Binder, a logic-based security language
    • IEEE Computer Society Press, Los Alamitos
    • De Treville, J.: Binder, a logic-based security language. In: Proc. IEEE Symposium on Security and Privacy, pp. 105-113. IEEE Computer Society Press, Los Alamitos (2002)
    • (2002) Proc. IEEE Symposium on Security and Privacy , pp. 105-113
    • De Treville, J.1
  • 18
    • 33746103319 scopus 로고    scopus 로고
    • Security policy in a declarative style
    • ACM Press, New York
    • Echahed, R., Prost, F.: Security policy in a declarative style. In: Proc. PPDP'05, ACM Press, New York (2005)
    • (2005) Proc. PPDP'05
    • Echahed, R.1    Prost, F.2
  • 19
    • 84947939145 scopus 로고
    • Modular termination of term rewriting systems revisited
    • Reggio, G, Astesiano, E, Tarlecki, A, eds, Recent Trends in Data Type Specification, Springer, Heidelberg
    • Fernández, M., Jouannaud, J.-P.: Modular termination of term rewriting systems revisited. In: Reggio, G., Astesiano, E., Tarlecki, A. (eds.) Recent Trends in Data Type Specification. LNCS, vol. 906, Springer, Heidelberg (1995)
    • (1995) LNCS , vol.906
    • Fernández, M.1    Jouannaud, J.-P.2
  • 20
    • 0001619596 scopus 로고    scopus 로고
    • Flexible support for multiple access control policies
    • Jajodia, S., Samarati, P., Sapino, M., Subrahmaninan, V.S.: Flexible support for multiple access control policies. ACM TODS 26(2), 214-260 (2001)
    • (2001) ACM TODS , vol.26 , Issue.2 , pp. 214-260
    • Jajodia, S.1    Samarati, P.2    Sapino, M.3    Subrahmaninan, V.S.4
  • 21
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A trust management system with certified evaluation
    • IEEE Computer Society Press, Los Alamitos
    • Jim, T.: SD3: A trust management system with certified evaluation. In: IEEE Symp. Security and Privacy, pp. 106-115. IEEE Computer Society Press, Los Alamitos (2001)
    • (2001) IEEE Symp. Security and Privacy , pp. 106-115
    • Jim, T.1
  • 22
    • 37849000194 scopus 로고
    • ELAN user manual. Nancy (France)
    • Technical Report 95-R-342, CRIN
    • Kirchner, C., Kirchner, H., Vittek, M.: ELAN user manual. Nancy (France), Technical Report 95-R-342, CRIN (1995)
    • (1995)
    • Kirchner, C.1    Kirchner, H.2    Vittek, M.3
  • 23
    • 0001834942 scopus 로고
    • Term Rewriting Systems
    • Abramsky, S, Gabbay, D.M, Maibaum, T.S.E, eds, Oxford University Press, Oxford
    • Klop, J.-W.: Term Rewriting Systems. In: Abramsky, S., Gabbay, D.M., Maibaum, T.S.E. (eds.) Handbook of Logic in Computer Science, vol. 2, Oxford University Press, Oxford (1992)
    • (1992) Handbook of Logic in Computer Science , vol.2
    • Klop, J.-W.1
  • 27
    • 0000187751 scopus 로고
    • On theories with a combinatorial definition of equivalence
    • Newman, M.H.A.: On theories with a combinatorial definition of equivalence. Annals of Mathematics 43(2), 223-243 (1942)
    • (1942) Annals of Mathematics , vol.43 , Issue.2 , pp. 223-243
    • Newman, M.H.A.1
  • 29
    • 34250823438 scopus 로고    scopus 로고
    • Rewriting-based access control policies
    • Elsevier, Amsterdam
    • de Oliveira, A.S.: Rewriting-based access control policies. In: Proc. of SECRET'06. ENTCS, Elsevier, Amsterdam (2007)
    • (2007) Proc. of SECRET'06. ENTCS
    • de Oliveira, A.S.1
  • 31
    • 37849004117 scopus 로고    scopus 로고
    • The XSB System Version 2.7.1, Programmer's Manual (2005)
    • The XSB System Version 2.7.1, Programmer's Manual (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.