메뉴 건너뛰기




Volumn 2001-January, Issue , 2001, Pages 117-126

Detecting conflicts in a role-based delegation model

Author keywords

Access control; Analytical models; Computer science; NIST; Permission; Role transfer; Runtime; Specification languages

Indexed keywords

ANALYTICAL MODELS; COMPUTATIONAL LINGUISTICS; COMPUTER SCIENCE; SECURITY OF DATA; SECURITY SYSTEMS; SPECIFICATION LANGUAGES; SPECIFICATIONS;

EID: 39749103319     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2001.991528     Document Type: Conference Paper
Times cited : (20)

References (19)
  • 6
    • 84944048132 scopus 로고    scopus 로고
    • The ponder policy specification language
    • Bristol,. Springer Lecture Notes in Computer Science
    • N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder Policy Specification Language. In Policies for Distributed Systems and Networks, volume 1995, pages 18-38, Bristol, 2001. Springer Lecture Notes in Computer Science
    • (2001) Policies for Distributed Systems and Networks , vol.1995 , pp. 18-38
    • Damianou, N.1    Dulay, N.2    Lupu, E.3    Sloman, M.4
  • 7
    • 0031346670 scopus 로고    scopus 로고
    • Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems
    • R. Kuhn. Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. In Proceedings of the second ACM workshop on Role-based access control, pages 23-30, 1997
    • (1997) Proceedings of the Second ACM Workshop on Role-based Access Control , pp. 23-30
    • Kuhn, R.1
  • 8
    • 84949287528 scopus 로고    scopus 로고
    • A rule-based framework for role-based delegation
    • Chantilly, VA, USA
    • Z. Longhua, G. Ahn, and Chu. B. A Rule-based Framework for Role-Based Delegation. In ACM SACMAT, Chantilly, VA, USA, 2001
    • (2001) ACM SACMAT
    • Longhua, Z.1    Ahn, G.2    Chu, B.3
  • 10
    • 0023965320 scopus 로고
    • The source of authority for commercial access control
    • J. Moffett and M. Sloman. The Source of Authority for Commercial Access Control. IEEE Computer, pages 59-69, 1988
    • (1988) IEEE Computer , pp. 59-69
    • Moffett, J.1    Sloman, M.2
  • 11
    • 0025099231 scopus 로고
    • Some conundrums concerning separation of duty
    • editor, IEEE Symposium on Security and Privacy Oakland, CA
    • M. Nash and K. Poland. Some Conundrums Concerning Separation of Duty. In IEEE Computer Society Press, editor, IEEE Symposium on Security and Privacy, pages 201-209, Oakland, CA, 1990
    • (1990) IEEE Computer Society Press , pp. 201-209
    • Nash, M.1    Poland, K.2
  • 12
    • 0024125647 scopus 로고
    • Transaction control expressions for separation of duties
    • Arizona
    • R. Sandhu. Transaction Control Expressions for Separation of Duties. In 4th Aerospace Computer Security Conference, pages 282-286, Arizona, 1988
    • (1988) 4th Aerospace Computer Security Conference , pp. 282-286
    • Sandhu, R.1
  • 15
    • 0033652039 scopus 로고    scopus 로고
    • The nist model for role-based access control: Towards a unified standard
    • Berlin, Germany
    • R. Sandhu, D. Ferraiolo, and R. Kuhn. The NIST Model for Role-based Access Control: Towards a Unified Standard. In 5th ACM RBAC, Berlin, Germany, 2000
    • (2000) 5th ACM RBAC
    • Sandhu, R.1    Ferraiolo, D.2    Kuhn, R.3
  • 16
    • 0013244034 scopus 로고    scopus 로고
    • The incorporation of control principles into access control policies (extended abstract)
    • Bristol
    • A. Schaad and J. Moffett. The Incorporation of Control Principles into Access Control Policies (Extended Abstract). In Hewlett Packard Policy Workshop, Bristol, 2001
    • (2001) Hewlett Packard Policy Workshop
    • Schaad, A.1    Moffett, J.2
  • 18


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.