메뉴 건너뛰기




Volumn 9, Issue , 2004, Pages 31-40

Towards a credential-based implementation of compound access control policies

Author keywords

Access control; Certificate chain discovery; Credential; Policy algebra; Public key infrastructure; SPKI SDSI

Indexed keywords

ALGORITHMS; DISTRIBUTED COMPUTER SYSTEMS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; INFORMATION ANALYSIS; INTEROPERABILITY; NETWORK PROTOCOLS; PUBLIC POLICY; QUERY LANGUAGES; SOFTWARE PROTOTYPING; USER INTERFACES;

EID: 4143055831     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/990036.990042     Document Type: Conference Paper
Times cited : (14)

References (20)
  • 1
    • 0031637195 scopus 로고    scopus 로고
    • On SDSI's linked local name spaces
    • M. Abadi. On SDSI's linked local name spaces. Journal of Computer Security, 6(1-2):3-21, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 3-21
    • Abadi, M.1
  • 3
    • 84904350804 scopus 로고    scopus 로고
    • A hybrid pki model: Application to secure mediation
    • 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security . Kluwer Academic Publishers, Boston
    • J. Biskup and Y. Karabulut. A hybrid pki model: Application to secure mediation. In Research Directions in Data and Application Security, 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security, pages 271-282. Kluwer Academic Publishers, Boston, 2003.
    • (2003) Research Directions in Data and Application Security , pp. 271-282
    • Biskup, J.1    Karabulut, Y.2
  • 8
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • ACM Press
    • D. Chaum. Security without identification: transaction systems to make big brother obsolete. In Communications of the ACM 28, volume 10, pages 1030-1044. ACM Press, 1985.
    • (1985) Communications of the ACM 28 , vol.10 , pp. 1030-1044
    • Chaum, D.1
  • 13
    • 0031162048 scopus 로고    scopus 로고
    • A unified framework for enforcing multiple access control policies
    • June
    • S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino. A unified framework for enforcing multiple access control policies. ACM SIGMOD Record, 26(2):474-485, June 1997.
    • (1997) ACM SIGMOD Record , vol.26 , Issue.2 , pp. 474-485
    • Jajodia, S.1    Samarati, P.2    Subrahmanian, V.S.3    Bertino, E.4
  • 14
    • 33947617835 scopus 로고    scopus 로고
    • Understanding SPKI/SDSI using first-order logic
    • CSFW 2003, Pacific Grove, California, USA, IEEE Computer Society Press, June
    • N. Li and J. C. Mitchell. Understanding SPKI/SDSI using first-order logic. In Proceedings of the 16th. IEEE Computer Security Foundations Workshop, pages 89-108. CSFW 2003, Pacific Grove, California, USA, IEEE Computer Society Press, June 2003.
    • (2003) Proceedings of the 16th. IEEE Computer Security Foundations Workshop , pp. 89-108
    • Li, N.1    Mitchell, J.C.2
  • 17
    • 2642573551 scopus 로고    scopus 로고
    • A compositional framework for access control policies enforcement
    • FMSE 2003, Washington, DC, USA, ACM Press, October
    • F. Siede, A. Cau, and H. Zedan. A compositional framework for access control policies enforcement. In Proceedings of the ACM Workshop on Formal Methods in Security Engineering, pages 32-42. FMSE 2003, Washington, DC, USA, ACM Press, October 2003.
    • (2003) Proceedings of the ACM Workshop on Formal Methods in Security Engineering , pp. 32-42
    • Siede, F.1    Cau, A.2    Zedan, H.3
  • 19
    • 84974750564 scopus 로고
    • Authorizations in distributed systems: A new approach
    • T. Y. C. Woo and S. S. Lam. Authorizations in distributed systems: A new approach. Journal of Computer Security, 2:107-136, 1993.
    • (1993) Journal of Computer Security , vol.2 , pp. 107-136
    • Woo, T.Y.C.1    Lam, S.S.2
  • 20
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • February
    • T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security (TISSEC), 6(1):1-42, February 2003.
    • (2003) ACM Transactions on Information and System Security (TISSEC) , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.