메뉴 건너뛰기




Volumn 7, Issue 3, 2004, Pages 392-427

An integrated approach to engineer and enforce context constraints in RBAC environments

Author keywords

Constraints engineering; Context constraints; Context dependent access control; Role based access control

Indexed keywords

CONSTRAINT ENGINEERING; CONTEXT CONSTRAINTS; CONTEXT-DEPENDENT ACCESS CONTROL; ROLE-BASED ACCESS CONTROL;

EID: 4444246080     PISSN: 10949224     EISSN: None     Source Type: Journal    
DOI: 10.1145/1015040.1015043     Document Type: Article
Times cited : (104)

References (55)
  • 2
    • 84956993736 scopus 로고    scopus 로고
    • Role-based authorization constraints specification
    • AHN, G. AND SANDHU, R. 2000. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3, 4 (Nov.).
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.4 NOV.
    • Ahn, G.1    Sandhu, R.2
  • 5
    • 0008724838 scopus 로고    scopus 로고
    • An authorization model for temporal and derived data: Securing information portals
    • ATLUKI, V. AND GAL, A. 2002. An authorization model for temporal and derived data: Securing information portals. ACM Trans. Inf. Syst. Secur. 5, 1 (Feb.).
    • (2002) ACM Trans. Inf. Syst. Secur. , vol.5 , Issue.1 FEB.
    • Atluki, V.1    Gal, A.2
  • 10
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • BERTINO, E., FERRARI, E., AND ATLURI, V. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur. 2, 1 (Feb.).
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 FEB.
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 13
  • 16
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • DENNING, D. 1976. A lattice model of secure information flow. Commun. ACM 19, 5 (May).
    • (1976) Commun. ACM , vol.19 , Issue.5 MAY
    • Denning, D.1
  • 19
    • 0002422823 scopus 로고    scopus 로고
    • A role-based access control model and reference implementation within a corporate Intranet
    • FERRAIOLO, D., BARKLEY, J., AND KUHN, D. 1999. A role-based access control model and reference implementation within a corporate Intranet. ACM Trans. Inf. Syst. Secur. 2, 1 (Feb.).
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 FEB.
    • Ferraiolo, D.1    Barkley, J.2    Kuhn, D.3
  • 34
    • 2342502819 scopus 로고    scopus 로고
    • Preserving privacy in environments with location-based applications
    • MYLES, G., FRIDAY, A., AND DAVIES, N. 2003. Preserving privacy in environments with location-based applications. IEEE Pervasive Comput. 2, 1 (Jan.-Mar.).
    • (2003) IEEE Pervasive Comput. , vol.2 , Issue.1 JAN.-MAR.
    • Myles, G.1    Friday, A.2    Davies, N.3
  • 43
    • 0033337366 scopus 로고    scopus 로고
    • There is more to context than location
    • SCHMIDT, A., BEIGL, M., AND GELLERSEN, H. 1999. There is more to context than location. Comput. Graphics 23, 6 (Dec.).
    • (1999) Comput. Graphics , vol.23 , Issue.6 DEC.
    • Schmidt, A.1    Beigl, M.2    Gellersen, H.3
  • 45
    • 0031387996 scopus 로고    scopus 로고
    • Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments
    • THOMAS, R. 1997. Team-based access control (TMAC): A primitive for applying role-based access controls in collaborative environments. In Proceedings of the ACM Workshop on Role Based Access Control.
    • (1997) Proceedings of the ACM Workshop on Role Based Access Control
    • Thomas, R.1
  • 46
    • 0002841051 scopus 로고    scopus 로고
    • Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management
    • THOMAS, R. AND SANDHU, R. 1997. Task-based authorization controls (TBAC): A family of models for active and enterprise-oriented authorization management. In Proceedings of the IFIP WG11.3 Conference on Database Security.
    • (1997) Proceedings of the IFIP WG11.3 Conference on Database Security
    • Thomas, R.1    Sandhu, R.2
  • 48
    • 0034291619 scopus 로고    scopus 로고
    • Handling obstacles in goal-oriented requirements engineering
    • VAN LAMSWEERDE, A. AND LETIER, E. 2000. Handling obstacles in goal-oriented requirements engineering. IEEE Trans. Softw. Eng. 26, 10 (Oct.).
    • (2000) IEEE Trans. Softw. Eng. , vol.26 , Issue.10 OCT.
    • Van Lamsweerde, A.1    Letier, E.2
  • 49
    • 0032620331 scopus 로고    scopus 로고
    • Team-and-role-based organizational context and access control for cooperative hypermedia environments
    • WANG, W. 1999. Team-and-role-based organizational context and access control for cooperative hypermedia environments. In Proceedings of the ACM Conference on Hypertext and Hypermedia.
    • (1999) Proceedings of the ACM Conference on Hypertext and Hypermedia
    • Wang, W.1
  • 51
    • 0001853125 scopus 로고
    • The computer for the 21st Century
    • WEISER, M. 1991. The computer for the 21st Century. Sci. Am. 265, 3 (Sep.).
    • (1991) Sci. Am. , vol.265 , Issue.3 SEP.
    • Weiser, M.1
  • 52
    • 84976653144 scopus 로고
    • Some computer science issues in ubiquitous computing
    • WEISER, M. 1993. Some computer science issues in ubiquitous computing. Commun. ACM 36, 7 (July).
    • (1993) Commun. ACM , vol.36 , Issue.7 JULY
    • Weiser, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.