메뉴 건너뛰기




Volumn 22, Issue 5, 2007, Pages 289-305

A framework for modelling restricted delegation of rights in the SECTET

Author keywords

Delegation of rights; Domain specific language; Model driven architecture; Model driven engineering; Service oriented architecture

Indexed keywords

ACCESS CONTROL; DYNAMIC MODELS; MODEL PREDICTIVE CONTROL; PUBLIC POLICY;

EID: 38949134784     PISSN: 02676192     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (3)

References (49)
  • 1
    • 38149087053 scopus 로고    scopus 로고
    • Modeling Permissions in a (U/X)ML World
    • ISBN: 0-7695-2567-9
    • M. Alam et al, "Modeling Permissions in a (U/X)ML World," in IEEE ARES 2006, ISBN: 0-7695-2567-9.
    • (2006) IEEE ARES
    • Alam, M.1
  • 2
    • 0242540371 scopus 로고    scopus 로고
    • PBDM: A Flexible Delegation Model in RBAC
    • sACMAT 03, Italy ACM 1-58113-681-1/03/0006
    • X. Zhang and S. Oh and R. Sandhu, "PBDM: A Flexible Delegation Model in RBAC," sACMAT 03, Italy ACM 1-58113-681-1/03/0006.
    • Zhang, X.1    Oh, S.2    Sandhu, R.3
  • 3
    • 38949088624 scopus 로고    scopus 로고
    • OASIS Organization for the Advancement of Structured Information Standards
    • "OASIS Organization for the Advancement of Structured Information Standards," www.oasis-open.org.
  • 5
    • 38949094909 scopus 로고    scopus 로고
    • "Object Management Group," http://www.omg.org.
  • 7
    • 33746435793 scopus 로고    scopus 로고
    • Business Process Modeling: Defining Domain Specific Modeling Languages by Use of UML Profiles
    • ECMDA-FA 2006
    • S. Brahe and K. Osterbye, "Business Process Modeling: Defining Domain Specific Modeling Languages by Use of UML Profiles," ECMDA-FA 2006, LNCS 4066, pp.241-255, 2006.
    • (2006) LNCS , vol.4066 , pp. 241-255
    • Brahe, S.1    Osterbye, K.2
  • 8
    • 26444432193 scopus 로고    scopus 로고
    • Web service engineering - advancing a new software engineering discipline
    • 3579 Springer
    • R. Breu et al, "Web service engineering - advancing a new software engineering discipline," ICWE 2005, LNCS 3579 Springer 2005.
    • (2005) LNCS , vol.ICWE 2005
    • Breu, R.1
  • 9
    • 33750090142 scopus 로고    scopus 로고
    • Model Based Developement of Access Policies
    • submitted
    • R. Breu and G. Popp and M. Alam, "Model Based Developement of Access Policies," submitted.
    • Breu, R.1    Popp, G.2    Alam, M.3
  • 10
    • 38349165472 scopus 로고    scopus 로고
    • M. Hafner et al., A Security Architecture For Inter-organizational Workflows-Putting WS Security Standards Together, iCEIS 2005,ISBN: 972-8865-19-8.
    • M. Hafner et al., "A Security Architecture For Inter-organizational Workflows-Putting WS Security Standards Together," iCEIS 2005,ISBN: 972-8865-19-8.
  • 11
    • 33750937976 scopus 로고    scopus 로고
    • Model Driven Security for Inter-Organizational Workflows in e-Government
    • ISBN 3-540-25016-6
    • R. Breu et al, "Model Driven Security for Inter-Organizational Workflows in e-Government," TCGOV 2005,Proceedings. ISBN 3-540-25016-6.
    • TCGOV 2005,Proceedings
    • Breu, R.1
  • 12
    • 67650243926 scopus 로고    scopus 로고
    • M. Alam et al, Model Driven Security for Web Services (MDS4WS) INMIC 2004,Digi Obj Id 10.1109/IN-MIC.2004.1492930.
    • M. Alam et al, "Model Driven Security for Web Services (MDS4WS)" INMIC 2004,Digi Obj Id 10.1109/IN-MIC.2004.1492930.
  • 13
    • 38149008431 scopus 로고    scopus 로고
    • Modeling Inter-organizational Workflow Security in a Peer-to-Peer Environment
    • ISBN: 0-7695-2409-5
    • M. Hafner et al, "Modeling Inter-organizational Workflow Security in a Peer-to-Peer Environment," IEEE ICWS 2005,ISBN: 0-7695-2409-5.
    • (2005) IEEE ICWS
    • Hafner, M.1
  • 14
    • 23844508158 scopus 로고    scopus 로고
    • Domain Specific Modeling
    • editorial of Software System Model Journal
    • R. France, B. Rumpe, "Domain Specific Modeling," editorial of Software System Model Journal 2005.
    • (2005)
    • France, R.1    Rumpe, B.2
  • 17
    • 77954114693 scopus 로고    scopus 로고
    • SECTET - An Extensible Framework for the Realization of Secure Inter-Organizational Workflows
    • M. Hafner et al, "SECTET - An Extensible Framework for the Realization of Secure Inter-Organizational Workflows," Accepted for ICEIS 2006.
    • (2006) Accepted for ICEIS
    • Hafner, M.1
  • 18
    • 38949182283 scopus 로고    scopus 로고
    • Modeling Authorization in a SOA based Distributed Workflow
    • ISBN: 0-88986-572-8
    • M. Alam, M. Hafner, and R. Breu, "Modeling Authorization in a SOA based Distributed Workflow," iASTED Software Engineering 2006, ISBN: 0-88986-572-8.
    • (2006) iASTED Software Engineering
    • Alam, M.1    Hafner, M.2    Breu, R.3
  • 19
    • 33750315310 scopus 로고    scopus 로고
    • A MOF/QVT-based Domain Architecture for Model Driven Security
    • Appeared in IEEE/ACM Models
    • M. Hafner, M. Alam, R. Breu, "A MOF/QVT-based Domain Architecture for Model Driven Security," Appeared in IEEE/ACM Models 2006 LNCS 4199.
    • (2006) LNCS , vol.4199
    • Hafner, M.1    Alam, M.2    Breu, R.3
  • 20
    • 38949181888 scopus 로고    scopus 로고
    • Role Based Access Control avialable at, csrc.nist.gov/rbac
    • Role Based Access Control avialable at, csrc.nist.gov/rbac/.
  • 22
    • 85087243734 scopus 로고    scopus 로고
    • Model-Driven Security Engineering for the realization of Dynamic Security Requirements in Collaborative Systems
    • Appeared in PhD Symposium of IEEE/ACM Models
    • M. Alam, "Model-Driven Security Engineering for the realization of Dynamic Security Requirements in Collaborative Systems," Appeared in PhD Symposium of IEEE/ACM Models 2006 LNCS 4364.
    • (2006) LNCS , vol.4364
    • Alam, M.1
  • 24
    • 33750037935 scopus 로고    scopus 로고
    • A Framework for Modeling Restricted Delegation in Service Oriented Architecture
    • Proceedings of the Third International Conference on Trust, Privacy, and Security of Digital Business TrustBus06, Springer, ISBN 0302-9743, 246pp
    • M. Alam et al, "A Framework for Modeling Restricted Delegation in Service Oriented Architecture," Proceedings of the Third International Conference on Trust, Privacy, and Security of Digital Business (TrustBus06), LNCS 4083, Springer, ISBN 0302-9743, 246pp, 2006.
    • (2006) LNCS , vol.4083
    • Alam, M.1
  • 25
    • 38949204424 scopus 로고    scopus 로고
    • An introduction to Model Driven Architecture
    • An introduction to Model Driven Architecture, http://www-128.ibm.eom/ developerworks/rational/library/3100.html.
  • 27
    • 38949162926 scopus 로고    scopus 로고
    • http://www.antlr.org.
  • 30
    • 38949121612 scopus 로고    scopus 로고
    • A. introduction to UML Profiles, http://www.sparxsystems.com/resources/ developers/uml_profiles.html.
    • A. introduction to UML Profiles, http://www.sparxsystems.com/resources/ developers/uml_profiles.html.
  • 31
    • 38949146370 scopus 로고    scopus 로고
    • Web Service Description Language WSDL, available at
    • Web Service Description Language (WSDL), available at, http://www.w3.org/TR/wsdl.
  • 32
    • 38949198678 scopus 로고    scopus 로고
    • WSDL First, July 22, 2003
    • "WSDL First, July 22, 2003," http://webservices.xml.com/pub/a/ ws/2003/07/22/wsdlfirst.html.
  • 33
    • 38949092879 scopus 로고    scopus 로고
    • M. Alam, M. Hafner, and R. Breu, Constraint based Role Based Access Control for modelling administrative constraints in the SECTET, proceedings of the ACM PST 2006 - International Conference on Privacy, Security and Trust, October 30th, 2006 -November 1st, 2006.
    • M. Alam, M. Hafner, and R. Breu, "Constraint based Role Based Access Control for modelling administrative constraints in the SECTET," proceedings of the ACM PST 2006 - International Conference on Privacy, Security and Trust, October 30th, 2006 -November 1st, 2006.
  • 34
    • 33749080076 scopus 로고    scopus 로고
    • Attributed Based Access Control (ABAC) for Web Services
    • ISBN 0-7695-2409-5
    • E. Yuan and J. Tong, "Attributed Based Access Control (ABAC) for Web Services," iEEE ICWS 2005,ISBN 0-7695-2409-5.
    • (2005) iEEE ICWS
    • Yuan, E.1    Tong, J.2
  • 35
    • 38949208781 scopus 로고    scopus 로고
    • http://wikipedia.org/.
  • 36
    • 84977755884 scopus 로고    scopus 로고
    • R. Sandhu and Q. Munawer, The ARBAC99 Model for Administration of Roles, acsac, p. 229, 15th Annual Computer Security Applications Conference (ACSAC '99),1999.
    • R. Sandhu and Q. Munawer, "The ARBAC99 Model for Administration of Roles," acsac, p. 229, 15th Annual Computer Security Applications Conference (ACSAC '99),1999.
  • 38
    • 77954394878 scopus 로고    scopus 로고
    • "XACML 2.0 Specification Set," http://www.oasis-open.org/ committees/tc_home.php?wg_abbrev=xacml.
    • XACML 2.0 Specification Set
  • 39
    • 84941160706 scopus 로고    scopus 로고
    • "SAML 2.0 Specification," http://www.oasis-open.org/ committees/tc_home.php?wg_abbrev=security.
    • SAML 2.0 Specification
  • 40
    • 33646588011 scopus 로고    scopus 로고
    • G. Yin et al., Trust Management with Safe Privilege Propagation, aPPT 2005, LNCS 3756,pp. 174-183,2005.
    • G. Yin et al., "Trust Management with Safe Privilege Propagation," aPPT 2005, LNCS 3756,pp. 174-183,2005.
  • 42
    • 24644487887 scopus 로고    scopus 로고
    • Using Trust for Restricted Delegation in Grid Envoirnments
    • iSPEC
    • W. Jiang et al., "Using Trust for Restricted Delegation in Grid Envoirnments," iSPEC 2005, LNCS 3439,pp.293-301,2005.
    • (2005) LNCS , vol.3439 , pp. 293-301
    • Jiang, W.1
  • 44
    • 0142152900 scopus 로고    scopus 로고
    • A New Role-Based Delegation Model Using Sub-role Hierarchies
    • iSCIS
    • H. Lee et al., "A New Role-Based Delegation Model Using Sub-role Hierarchies," iSCIS 2003,LNCS 2869,pp.811-818,2003.
    • (2003) LNCS , vol.2869 , pp. 811-818
    • Lee, H.1
  • 45
    • 33644684766 scopus 로고    scopus 로고
    • Attributed-Based Delegation Model and its Extension
    • journal of Research and Practise in Information Technology, Februrary
    • C. Ye and Z. Wu, "Attributed-Based Delegation Model and its Extension," journal of Research and Practise in Information Technology, Vol 38, No. 1, Februrary 2006.
    • (2006) , vol.38 , Issue.1
    • Ye, C.1    Wu, Z.2
  • 46
    • 3042684910 scopus 로고    scopus 로고
    • A Rule-Based Framework for Role-Based Delegation
    • August
    • L. Zhang et al., "A Rule-Based Framework for Role-Based Delegation," aCM Transactions on Information System Security, Vol 6, No. 3 August 2003, Pages 404-441.
    • (2003) aCM Transactions on Information System Security , vol.6 , Issue.3 , pp. 404-441
    • Zhang, L.1
  • 47
    • 35048828980 scopus 로고    scopus 로고
    • K. Stoupa et al., XML-Based Revocation and Delegation in a Distributed Environment, eDBT 2004 workshops LNCS 3268, pp. 299-308.
    • K. Stoupa et al., "XML-Based Revocation and Delegation in a Distributed Environment," eDBT 2004 workshops LNCS 3268, pp. 299-308.
  • 48
    • 38949188606 scopus 로고    scopus 로고
    • journal of Grid Computing Kluwer Publishers, Netharland
    • S. Kim et al., "Wokflow-based Authorization," journal of Grid Computing 2004 Kluwer Publishers, Netharland.
    • (2004) Wokflow-based Authorization
    • Kim, S.1
  • 49
    • 38949151542 scopus 로고    scopus 로고
    • Extending the SAML to Support Delegation for Web Services and Grid Services
    • ISBN: 0-7695-2409-5
    • J Wang et al., "Extending the SAML to Support Delegation for Web Services and Grid Services," iEEE ICWS 2005,ISBN: 0-7695-2409-5.
    • (2005) iEEE ICWS
    • Wang, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.