메뉴 건너뛰기




Volumn 4846 LNCS, Issue , 2007, Pages 111-125

An integrated model for access control and information flow requirements

Author keywords

DTE; MLS; OrBAC; RBAC; Security policy

Indexed keywords

DATA FLOW ANALYSIS; FUNCTION EVALUATION; MAPPING; MATHEMATICAL MODELS;

EID: 38349054601     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-76929-3_12     Document Type: Conference Paper
Times cited : (5)

References (26)
  • 1
    • 0027699087 scopus 로고
    • Lattice-Based Access Control Models
    • Sandhu, R.S.: Lattice-Based Access Control Models. IEEE Computer 26(11), 9-19 (1993)
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 5
    • 0031379040 scopus 로고    scopus 로고
    • Mandatory Access Control and Role-Based Access Control Revisited
    • Fairfax, Virginia, United States, pp
    • Osborn, S.: Mandatory Access Control and Role-Based Access Control Revisited. In: Proceedings of the second ACM workshop on Role-based access control, Fairfax, Virginia, United States, pp. 31-40 (1997)
    • (1997) Proceedings of the second ACM workshop on Role-based access control , pp. 31-40
    • Osborn, S.1
  • 6
    • 0031611451 scopus 로고    scopus 로고
    • Role Based Access control on MLS Systems without Kernel changes
    • Fairfax, Virginia, United States, pp
    • Kuhn, D.R.: Role Based Access control on MLS Systems without Kernel changes. In: Proceedings of the third ACM Workshop on Role-Based Access Control, Fairfax, Virginia, United States, pp. 25-32 (1998)
    • (1998) Proceedings of the third ACM Workshop on Role-Based Access Control , pp. 25-32
    • Kuhn, D.R.1
  • 7
    • 84884311106 scopus 로고    scopus 로고
    • Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access control Policies
    • Osborn, S., Sandhu, R., Munawer, Q.: Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access control Policies. ACM Transactions on Information and System Security 3(2), 85-106 (2000)
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 8
    • 38349024140 scopus 로고    scopus 로고
    • Implementation of Mandatory Access control in Role-Based Security System. CSE367 Final
    • Project report
    • Demurjian, S.: Implementation of Mandatory Access control in Role-Based Security System. CSE367 Final Project report (2001)
    • (2001)
    • Demurjian, S.1
  • 11
    • 0031355379 scopus 로고    scopus 로고
    • Enforcing Mandatory and Discretionary security in Workflow Management Systems
    • Atluri, V., Huang, W.-K.: Enforcing Mandatory and Discretionary security in Workflow Management Systems. Journal of Computer Security 5(4), 303-339 (1997)
    • (1997) Journal of Computer Security , vol.5 , Issue.4 , pp. 303-339
    • Atluri, V.1    Huang, W.-K.2
  • 12
    • 0033887763 scopus 로고    scopus 로고
    • A semantic Based Execution Model for Multilevel Secure Workflows
    • Atluri, V., Huang, W.-K., Bertino, E.: A semantic Based Execution Model for Multilevel Secure Workflows. Journal of Computer Security 8(1) (2000)
    • (2000) Journal of Computer Security , vol.8 , Issue.1
    • Atluri, V.1    Huang, W.-K.2    Bertino, E.3
  • 17
    • 22444446932 scopus 로고    scopus 로고
    • Domain and Type Enforcement for Real-Time Operating Systems
    • Emerging Technologies and Factory Automation
    • Kiszka, J., Wagner, B.: Domain and Type Enforcement for Real-Time Operating Systems. In: Proceedings ETFA 2003, Emerging Technologies and Factory Automation (2003)
    • (2003) Proceedings ETFA
    • Kiszka, J.1    Wagner, B.2
  • 24
    • 38349034438 scopus 로고    scopus 로고
    • Hallyn, S., Kearns, P.: Tools to Administer Domain and Type Enforcement. LISA XV. San Diego, CA (2001)
    • Hallyn, S., Kearns, P.: Tools to Administer Domain and Type Enforcement. LISA XV. San Diego, CA (2001)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.