메뉴 건너뛰기




Volumn 9, Issue , 2004, Pages 126-135

Security analysis in role-based access control

Author keywords

Delegation; Role based access control; Role based administration; Trust management

Indexed keywords

ALGORITHMS; COMPUTATIONAL COMPLEXITY; COMPUTATIONAL METHODS; COMPUTER OPERATING PROCEDURES; INFORMATION MANAGEMENT; MATHEMATICAL MODELS; PROBLEM SOLVING; QUERY LANGUAGES; SOCIETIES AND INSTITUTIONS;

EID: 4143094794     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/990036.990058     Document Type: Conference Paper
Times cited : (52)

References (23)
  • 2
    • 3142653715 scopus 로고    scopus 로고
    • PhD thesis, Birbeck College, University of London, UK
    • J. Crampton. Authorizations and Antichains. PhD thesis, Birbeck College, University of London, UK, 2002.
    • (2002) Authorizations and Antichains
    • Crampton, J.1
  • 12
    • 3142654848 scopus 로고
    • Reprinted in , Jan
    • B. W. Lampson. Protection. In Proceedings of the 5th Princeton Conference on Information Sciences and Systems, 1971. Reprinted in ACM Operating Systems Review, 8(1):18-24, Jan 1974.
    • (1974) ACM Operating Systems Review , vol.8 , Issue.1 , pp. 18-24
  • 15
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • Feb.
    • N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, Feb. 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.1 , pp. 35-86
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 16
    • 0017512599 scopus 로고
    • A linear time algorithm for deciding subject security
    • R. J. Lipton and L. Snyder. A linear time algorithm for deciding subject security. Journal of the ACM, 24(3):455-464, 1977.
    • (1977) Journal of the ACM , vol.24 , Issue.3 , pp. 455-464
    • Lipton, R.J.1    Snyder, L.2
  • 20
    • 0023999796 scopus 로고
    • The schematic protection model: Its definition and analysis for acyclic attenuating systems
    • R. S. Sandhu. The schematic protection model: Its definition and analysis for acyclic attenuating systems. Journal of the ACM, 35(2):404-432, 1988.
    • (1988) Journal of the ACM , vol.35 , Issue.2 , pp. 404-432
    • Sandhu, R.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.