메뉴 건너뛰기




Volumn , Issue , 2006, Pages 86-89

Administrative usage control model for secure interoperability

Author keywords

[No Author keywords available]

Indexed keywords

INTEROPERABILITY; MATHEMATICAL MODELS;

EID: 38949086865     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PDCAT.2006.27     Document Type: Conference Paper
Times cited : (2)

References (10)
  • 1
    • 38949188648 scopus 로고    scopus 로고
    • st International Conference on Internet Computing, June 26th - 29th, 2000,Monte Carlo Resort, Las Vegas,Nevada, USA.
    • st International Conference on Internet Computing, June 26th - 29th, 2000,Monte Carlo Resort, Las Vegas,Nevada, USA.
  • 2
    • 84962248491 scopus 로고    scopus 로고
    • Seraphism:Dynamic interoperable security architecture for active networks
    • Tel-Aviv, March
    • R. Campbell, Z. Liu, D. Mickunas, P. Naldurg, and S. Yi. "Seraphism:Dynamic interoperable security architecture for active networks", IEEE OPENARCH 2000, Tel-Aviv, March 2000.
    • (2000) IEEE OPENARCH 2000
    • Campbell, R.1    Liu, Z.2    Mickunas, D.3    Naldurg, P.4    Yi, S.5
  • 3
    • 38949145730 scopus 로고    scopus 로고
    • Jalal Al-Muhtadi, Apu Kapadia, Roy H. Campbell, and M. Dennis Mickunas. A-IRBAC 2000 Model: Administrative Interoperable Role-Based Access Control. Technical Report UIUC-DCS-R-2000-2163.http://choices.cs. uiuc.edu/~almuhtad/
    • Jalal Al-Muhtadi, Apu Kapadia, Roy H. Campbell, and M. Dennis Mickunas. "A-IRBAC 2000 Model: Administrative Interoperable Role-Based Access Control". Technical Report UIUC-DCS-R-2000-2163.http://choices.cs. uiuc.edu/~almuhtad/
  • 4
    • 38949187197 scopus 로고    scopus 로고
    • Eric Freudenthal,et al. dRBAC:Distributed Role-based Access Control for Dynamic Coalition Environments[EB/OL]. http://www.cs.nyu.edu/vijayk/ papers/drbacicdcs02.pdf,2002-06
    • Eric Freudenthal,et al. "dRBAC:Distributed Role-based Access Control for Dynamic Coalition Environments[EB/OL]". http://www.cs.nyu.edu/vijayk/ papers/drbacicdcs02.pdf,2002-06
  • 5
    • 0030086382 scopus 로고    scopus 로고
    • R. Sandhu, Edward J Coyne, Hal L. Feinstein, et al. Role-Based Access Control Models. IEEE Computer, 1996,29(11), pp 38-47.
    • R. Sandhu, Edward J Coyne, Hal L. Feinstein, et al. "Role-Based Access Control Models". IEEE Computer, 1996,29(11), pp 38-47.
  • 8
    • 35248873795 scopus 로고    scopus 로고
    • R. Sandhu and J. Park, Usage control: A vision for next generation access control. In Proceedings of The 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, pp 17-31.
    • R. Sandhu and J. Park, "Usage control: A vision for next generation access control". In Proceedings of The 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security, pp 17-31.
  • 10
    • 67649670564 scopus 로고    scopus 로고
    • Safety Analysis of Usage Control Authorization Models
    • March 21-24, Taipei, Taiwan
    • XinWen Zhang, R.Sandhu. "Safety Analysis of Usage Control Authorization Models".ASIACCS'06 March 21-24, 2006, Taipei, Taiwan.
    • (2006) ASIACCS'06
    • Zhang, X.1    Sandhu, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.