메뉴 건너뛰기




Volumn 9, Issue , 2004, Pages 1-10

A logical specification for usage control

Author keywords

Access control; Logic specification; Security policy; Usage control

Indexed keywords

COMPUTER OPERATING SYSTEMS; CUSTOMER SATISFACTION; DATABASE SYSTEMS; DECISION MAKING; FORMAL LOGIC; MARKETING; MATHEMATICAL MODELS; NETWORK PROTOCOLS; ONLINE SYSTEMS; PUBLIC POLICY;

EID: 4143074723     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/990036.990038     Document Type: Conference Paper
Times cited : (70)

References (22)
  • 1
    • 0003400251 scopus 로고    scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • Bedford, Mass.
    • D. E. Bell and L. J. Lapadula, Secure Computer Systems: Mathematical Foundations and Model. Mitre Corp. Report No.M74-244, Bedford, Mass.
    • Mitre Corp. Report No. M74-244 , vol.M74-244
    • Bell, D.E.1    Lapadula, L.J.2
  • 4
    • 0032153903 scopus 로고    scopus 로고
    • An access control model supporting periodicity constraints and temporal reasoning
    • September
    • E. Bertino, C. Bettini, E. Ferrari, and P. Samarati, An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning, ACM Transaction on Database Systems, Vol.23, No.3, September 1998.
    • (1998) ACM Transaction on Database Systems , vol.23 , Issue.3
    • Bertino, E.1    Bettini, C.2    Ferrari, E.3    Samarati, P.4
  • 20
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • November
    • R. Sandhu, Lattice-Based Access Control Models, IEEE Computer, Vol.26, No.11, November 1993.
    • (1993) IEEE Computer , vol.26 , Issue.11
    • Sandhu, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.