메뉴 건너뛰기




Volumn 9, Issue , 2004, Pages 21-30

Role-based access control in ambient and remote space

Author keywords

Petri Nets; Spatial; Work flow

Indexed keywords

COMMUNICATION CHANNELS (INFORMATION THEORY); COMPUTER OPERATING SYSTEMS; COMPUTER SOFTWARE; DECISION MAKING; DISTRIBUTED COMPUTER SYSTEMS; INFORMATION ANALYSIS; MOBILE COMPUTING; ONLINE SYSTEMS; PETRI NETS; SECURITY OF DATA;

EID: 4143110148     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/990036.990040     Document Type: Conference Paper
Times cited : (19)

References (24)
  • 3
    • 0032153903 scopus 로고    scopus 로고
    • An access control model supporting periodicity constraints and temporal reasoning
    • September
    • Elisa Bertino, Claudio Bettini, Elena Ferrari, and Pierangela Samarati. An access control model supporting periodicity constraints and temporal reasoning. ACM Transactions on Database Systems, 23(3);231-285, September 1998.
    • (1998) ACM Transactions on Database Systems , vol.23 , Issue.3 , pp. 231-285
    • Bertino, E.1    Bettini, C.2    Ferrari, E.3    Samarati, P.4
  • 8
    • 84874800178 scopus 로고
    • A public-key cryptosystem and a signature scheme bases on discrete logarithms
    • T. ElGamal. A public-key cryptosystem and a signature scheme bases on discrete logarithms. IEEE Transactions on Information Theory, IT 31(4):469-472, 1985.
    • (1985) IEEE Transactions on Information Theory, IT , vol.31 , Issue.4 , pp. 469-472
    • ElGamal, T.1
  • 11
    • 0018780030 scopus 로고
    • The analysis of distributed systems by means of predicate/transition-nets
    • G. Kahn, editor, Berlin - Heidelberg - New York. Springer Verlag
    • H. J. Genrich and K. Lautenbach. The analysis of distributed systems by means of predicate/transition-nets. In G. Kahn, editor, Semantic of Concurrent Computation, volume 70 of Lecture Notes in Computer Science, pages 123-146, Berlin - Heidelberg - New York, 1979. Springer Verlag.
    • (1979) Semantic of Concurrent Computation, Volume 70 of Lecture Notes in Computer Science , vol.70 , pp. 123-146
    • Genrich, H.J.1    Lautenbach, K.2
  • 16
    • 0242625198 scopus 로고    scopus 로고
    • An approach to engineer and enforce context constraints in an rbac environment
    • Elena Ferrari and David Ferraiolo, editors. . ACM Press
    • Gustaf Neumann and Mark Strembeck. An approach to engineer and enforce context constraints in an rbac environment. In Elena Ferrari and David Ferraiolo, editors. Proceedings of the eighth ACM symposium on Access control models and technologies, pages 65-79. ACM Press, 2003.
    • (2003) Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies , pp. 65-79
    • Neumann, G.1    Strembeck, M.2
  • 17
    • 0242491000 scopus 로고    scopus 로고
    • A model for role administration using organization structure
    • Ravi Sandhu and Elisa Bertino, editors, Monterey, CA, USA, June 3-4 . ACM SIGSAC, ACM Press
    • Sejong Oh and Ravi Sandhu. A model for role administration using organization structure. In Ravi Sandhu and Elisa Bertino, editors, Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT), pages 155-162, Monterey, CA, USA, June 3-4 2002. ACM SIGSAC, ACM Press.
    • (2002) Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT) , pp. 155-162
    • Oh, S.1    Sandhu, R.2
  • 18
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb.
    • Ronald L. Rivest, A. Shamir, and L.M Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, Feb. 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 20
    • 0042181282 scopus 로고    scopus 로고
    • July, 21
    • The U.S. Department of Commerce. Safe Harbor Privacy Principles, July, 21 2000. http://www.export.gov/safeharbor/ SHPRINCIPLESFINAL.htm.
    • (2000) Safe Harbor Privacy Principles
  • 21
    • 0242655853 scopus 로고
    • Infinitive behaviour of petri nets
    • R. Valk. Infinitive behaviour of petri nets. Theoretical Computer Science, 25:311-341, 1983.
    • (1983) Theoretical Computer Science , vol.25 , pp. 311-341
    • Valk, R.1
  • 23
    • 4143062615 scopus 로고    scopus 로고
    • Composing heterogenous access policies between organizations
    • Lisbon/ Portuagal, June, 3-6 . International Association for Development of the Information Society
    • Horst F. Wedde and Mario Lischka. Composing Heterogenous Access Policies between Organizations. In Proceedings of the IADIS International Conference e-Society 2003, Lisbon/ Portuagal, June, 3-6 2003. International Association for Development of the Information Society.
    • (2003) Proceedings of the IADIS International Conference E-Society 2003
    • Wedde, H.F.1    Lischka, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.