메뉴 건너뛰기




Volumn 10, Issue 4, 2008, Pages

Formal foundations for hybrid hierarchies in GTRBAC

Author keywords

Derived relation; Role hierarchy

Indexed keywords

DERIVED RELATIONS; GTRBAC; HYBRID HIERARCHIES; ROLE HIERARCHY; UNIQUELY ACTIVABLE SET;

EID: 39149138668     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1284680.1284682     Document Type: Article
Times cited : (19)

References (25)
  • 1
    • 39149091940 scopus 로고    scopus 로고
    • BARKLEY, J., CINCOTTA, A., FERRAIOLO, D., GAVRILA, S., AND KUHN, D. R. 1997. Role based access control for the world wide web. In Proceedings of 20th National Information System Security Conference. NIST/NSA.
    • BARKLEY, J., CINCOTTA, A., FERRAIOLO, D., GAVRILA, S., AND KUHN, D. R. 1997. Role based access control for the world wide web. In Proceedings of 20th National Information System Security Conference. NIST/NSA.
  • 2
    • 39149144231 scopus 로고    scopus 로고
    • BERTINO, E. AND FERRARI, E. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System, Security 2, 1 (Feb.), 65-104.
    • BERTINO, E. AND FERRARI, E. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System, Security 2, 1 (Feb.), 65-104.
  • 3
    • 84944792110 scopus 로고    scopus 로고
    • BERTINO, E., BONATTI, P. A., AND FERRARI, E. 2001. Trbac: A temporal role-based access control model. ACM Transactions on Information and System Security 4, 3 (Aug.), 191-233.
    • BERTINO, E., BONATTI, P. A., AND FERRARI, E. 2001. Trbac: A temporal role-based access control model. ACM Transactions on Information and System Security 4, 3 (Aug.), 191-233.
  • 5
    • 3142510989 scopus 로고    scopus 로고
    • Administrative scope: A foundation for role-based administrative models
    • CRAMPTON, J. AND LOIZOU, G. 2003. Administrative scope: A foundation for role-based administrative models. ACM Transactions on Information System Security 6, 2, 201-231.
    • (2003) ACM Transactions on Information System Security , vol.6 , Issue.2 , pp. 201-231
    • CRAMPTON, J.1    LOIZOU, G.2
  • 10
    • 0000206310 scopus 로고    scopus 로고
    • JOSHI, J. B. D., AREF, W., GHAFOOR, A., AND SPAFFORD, E. H. 2001a. Security models for web-based applications. Communications of the ACM 44, 2 (Feb.), 38-72.
    • JOSHI, J. B. D., AREF, W., GHAFOOR, A., AND SPAFFORD, E. H. 2001a. Security models for web-based applications. Communications of the ACM 44, 2 (Feb.), 38-72.
  • 11
    • 0035251598 scopus 로고    scopus 로고
    • JOSHI, J. B. D., GHAFOOR, A., AREF, W., AND SPAFFORD, E. H. 2001b. Digital government security infrastructure design challenges. IEEE Computer 34, 2 (Feb.), 66-72.
    • JOSHI, J. B. D., GHAFOOR, A., AREF, W., AND SPAFFORD, E. H. 2001b. Digital government security infrastructure design challenges. IEEE Computer 34, 2 (Feb.), 66-72.
  • 14
    • 17444406680 scopus 로고    scopus 로고
    • JOSHI, J. B. D., BERTINO, E., LATIF, U., AND GHAFOOR, A. 2005b. Generalized temporal role based access control model. IEEE Transactions on Knowledge and Data Engineering 17, 1 (Jan.), 4-23.
    • JOSHI, J. B. D., BERTINO, E., LATIF, U., AND GHAFOOR, A. 2005b. Generalized temporal role based access control model. IEEE Transactions on Knowledge and Data Engineering 17, 1 (Jan.), 4-23.
  • 20
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • OSBORN, S., SANDHU, R., AND MUNAWER, Q. 2000. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security 3, 2, 85-106.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • OSBORN, S.1    SANDHU, R.2    MUNAWER, Q.3
  • 21
    • 84994391858 scopus 로고    scopus 로고
    • PARK, J. S., SANDHU, R., AND AHN, G. J. 2001. Role-based access control on the web. ACM Transactions on Information and System Security 4, 1 (Feb.), 37-71.
    • PARK, J. S., SANDHU, R., AND AHN, G. J. 2001. Role-based access control on the web. ACM Transactions on Information and System Security 4, 1 (Feb.), 37-71.
  • 22
    • 50249183308 scopus 로고    scopus 로고
    • Role hierarchies and constraints for lattice-based access controls
    • SANDHU, R. 1996. Role hierarchies and constraints for lattice-based access controls. Computer Security - Esorics'96, LNCSN 1146, 65-79.
    • (1996) Computer Security - Esorics'96, LNCSN 1146 , pp. 65-79
    • SANDHU, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.