메뉴 건너뛰기




Volumn 206, Issue 2-4, 2008, Pages 185-212

Analysis of dynamic policies

Author keywords

Dynamic access control policies; First order CTL; Role containment; Security properties; Tree automata; Trust Management Systems

Indexed keywords

AUTOMATA THEORY; LOGIC PROGRAMMING; MATHEMATICAL MODELS; SPECIFICATIONS; TREES (MATHEMATICS);

EID: 40149096827     PISSN: 08905401     EISSN: 10902651     Source Type: Journal    
DOI: 10.1016/j.ic.2007.05.006     Document Type: Article
Times cited : (10)

References (26)
  • 1
    • 85058426170 scopus 로고    scopus 로고
    • M. Abadi, On SDSI's linked local name spaces, in: PCSFW: Proceedings of the 10th Computer Security Foundations Workshop, IEEE Computer Society Press, 1997.
    • M. Abadi, On SDSI's linked local name spaces, in: PCSFW: Proceedings of the 10th Computer Security Foundations Workshop, IEEE Computer Society Press, 1997.
  • 2
  • 3
  • 4
    • 84982899264 scopus 로고    scopus 로고
    • M. Blaze, J. Feigenbaum, J. Ioannidis, A.D. Keromytis, The role of trust management in distributed systems security, 1999, pp. 185-210.
    • M. Blaze, J. Feigenbaum, J. Ioannidis, A.D. Keromytis, The role of trust management in distributed systems security, 1999, pp. 185-210.
  • 5
    • 84957800809 scopus 로고    scopus 로고
    • M. Blaze, J. Feigenbaum, K. Keromytis, KeyNote: trust management for public-key infrastructures, in: B. Christianson, B. Crispo, W.S. Harbison, M. Roe (Eds.), Security Protocols-6th International Workshop, Lecture Notes in Computer Science, vol. 1550, Cambridge, United Kingdom, Springer-Verlag, Berlin Germany, 1999, pp 59-66.
    • M. Blaze, J. Feigenbaum, K. Keromytis, KeyNote: trust management for public-key infrastructures, in: B. Christianson, B. Crispo, W.S. Harbison, M. Roe (Eds.), Security Protocols-6th International Workshop, Lecture Notes in Computer Science, vol. 1550, Cambridge, United Kingdom, Springer-Verlag, Berlin Germany, 1999, pp 59-66.
  • 6
    • 0024663219 scopus 로고    scopus 로고
    • D.F.C. Brower, M.J. Nash, The chinese wall security policy, in: IEEE Symposium on Security and Privacy, Oakland, California, May 1989, pp. 206-214.
    • D.F.C. Brower, M.J. Nash, The chinese wall security policy, in: IEEE Symposium on Security and Privacy, Oakland, California, May 1989, pp. 206-214.
  • 7
    • 40149100581 scopus 로고    scopus 로고
    • D.R. Clark, D.R. Wilson, A comparison of commercial and millitary security policies, in: IEEE Symposium on Security and Privacy, Oakland, California, 1987.
    • D.R. Clark, D.R. Wilson, A comparison of commercial and millitary security policies, in: IEEE Symposium on Security and Privacy, Oakland, California, 1987.
  • 9
    • 85037030721 scopus 로고    scopus 로고
    • E.M. Clarke, E.A. Emerson, Design and synthesis of synchronization skeletons using branching time temporal logic, in: Proceedings of Workshop on Logics of Programs-Springer-Verlag LNCS, vol. 131, Springer-Verlag, Yorktown Heights, NY, 1981, pp. 52-71.
    • E.M. Clarke, E.A. Emerson, Design and synthesis of synchronization skeletons using branching time temporal logic, in: Proceedings of Workshop on Logics of Programs-Springer-Verlag LNCS, vol. 131, Springer-Verlag, Yorktown Heights, NY, 1981, pp. 52-71.
  • 12
    • 40149102776 scopus 로고    scopus 로고
    • C.M.Ellision, B. Frantz, B. Lampson, R.L. Rivest, B.M. Thomas, T. Ylonen, Spki certificate theory, in: RFC 2693, 1999.
    • C.M.Ellision, B. Frantz, B. Lampson, R.L. Rivest, B.M. Thomas, T. Ylonen, Spki certificate theory, in: RFC 2693, 1999.
  • 13
    • 40149097089 scopus 로고    scopus 로고
    • A.K. Eamani, A.P. Sistla, Language based policy analysis in trust management systems, in: Proceedings of the Fourth PKI Conference, 2005.
    • A.K. Eamani, A.P. Sistla, Language based policy analysis in trust management systems, in: Proceedings of the Fourth PKI Conference, 2005.
  • 14
    • 40149103745 scopus 로고    scopus 로고
    • C.M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, T. Ylonen, RFC 2693: SPKI Certificate Theory, The Internet Society, 1999, Available from: .
    • C.M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, T. Ylonen, RFC 2693: SPKI Certificate Theory, The Internet Society, 1999, Available from: .
  • 15
    • 84942243858 scopus 로고    scopus 로고
    • J. Halpern, V. Weizman, Using first order logic to reason about policies, in: Proceedings of the 16th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 2003.
    • J. Halpern, V. Weizman, Using first order logic to reason about policies, in: Proceedings of the 16th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 2003.
  • 18
    • 77955202238 scopus 로고    scopus 로고
    • S. Jha, T. Reps, Analysis of spki/sdsi certificates using model checking, in: 15th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, Cape Breton, Canada, 24-26, 2001, pp. 129-144.
    • S. Jha, T. Reps, Analysis of spki/sdsi certificates using model checking, in: 15th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, Cape Breton, Canada, 24-26, 2001, pp. 129-144.
  • 19
    • 0033681410 scopus 로고    scopus 로고
    • N. Li, Local names in SPKI/SDSI, in: Proceedings of the 13th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 2000, pp. 2-15.
    • N. Li, Local names in SPKI/SDSI, in: Proceedings of the 13th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 2000, pp. 2-15.
  • 20
    • 30544438141 scopus 로고    scopus 로고
    • Beyond Proof-of-Compliance: Safety and availability analysis in trust management
    • Li N., Mitchell J., and Winsborough W.H. Beyond Proof-of-Compliance: Safety and availability analysis in trust management. Journal of the ACM 52 3 (2005)
    • (2005) Journal of the ACM , vol.52 , Issue.3
    • Li, N.1    Mitchell, J.2    Winsborough, W.H.3
  • 21
    • 40149083200 scopus 로고    scopus 로고
    • N. Li, J.C. Mitchell, Datalog with constraints: a foundation for trust management languages, in: Proceedings of the Fifth International Symposium on Practical Aspects of Declarative Languages, 2003.
    • N. Li, J.C. Mitchell, Datalog with constraints: a foundation for trust management languages, in: Proceedings of the Fifth International Symposium on Practical Aspects of Declarative Languages, 2003.
  • 22
    • 0036085965 scopus 로고    scopus 로고
    • N. Li, J.C. Mitchell, W.H. Winsborough, Design of a role-based trust-management framework, in: SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy, IEEE Computer Society, 2002, p. 114.
    • N. Li, J.C. Mitchell, W.H. Winsborough, Design of a role-based trust-management framework, in: SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy, IEEE Computer Society, 2002, p. 114.
  • 23
    • 33744503327 scopus 로고    scopus 로고
    • N. Li, W.H. Winsborough, J.C. Mitchell, Beyond proof-of-compliance: safety and availability analysis in trust management, in: SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, DC, USA, 2003, pp. 123.
    • N. Li, W.H. Winsborough, J.C. Mitchell, Beyond proof-of-compliance: safety and availability analysis in trust management, in: SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy, IEEE Computer Society, Washington, DC, USA, 2003, pp. 123.
  • 25
    • 33947695249 scopus 로고    scopus 로고
    • A. Sasterkar, P. Yang, S.D. Stroller, C.R. Ramakrishnan, Policy analysis for administrative role based access control, in: CSFW 2006: Proceedings of the Computer Security Foundation Workshop, Venice, Italy, 2006.
    • A. Sasterkar, P. Yang, S.D. Stroller, C.R. Ramakrishnan, Policy analysis for administrative role based access control, in: CSFW 2006: Proceedings of the Computer Security Foundation Workshop, Venice, Italy, 2006.
  • 26
    • 0025445530 scopus 로고
    • Deciding equivalence of finite tree automata
    • Seidl H. Deciding equivalence of finite tree automata. SIAM Journal of Computing 19 3 (1990) 424-437
    • (1990) SIAM Journal of Computing , vol.19 , Issue.3 , pp. 424-437
    • Seidl, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.