메뉴 건너뛰기




Volumn 20, Issue 7, 2008, Pages 924-939

Analyzing and managing role-based access control policies

Author keywords

Authorization constraints; Linear temporal logic; Object constraint language; Role based access control policy

Indexed keywords

(R ,S ,S) POLICY; AUTHORIZATION CONSTRAINTS; BASED SPECIFICATION; CRITICAL BUSINESS; DIGITAL COUNTERPARTS; DIGITAL GOVERNMENT; FIRST ORDERS; HEALTHCARE INDUSTRIES; LINEAR TEMPORAL LOGIC (LTL); OBJECT CONSTRAINT LANGUAGE (OCL); ORGANIZATIONAL RULES; ROLE-BASED ACCESS CONTROL (RBAC); SECURITY REQUIREMENTS; SENSITIVE DATA; SYSTEMATIC (CO);

EID: 44649149548     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2008.28     Document Type: Article
Times cited : (52)

References (46)
  • 1
    • 44649147524 scopus 로고    scopus 로고
    • KPMG Int'l Canada
    • KPMG, 1996-2002
    • KPMG, Fraud Survey Reports 1996-2002. KPMG Int'l Canada, 2006.
    • (2006) Fraud Survey Reports
  • 2
    • 44649178404 scopus 로고    scopus 로고
    • EU, Directive on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, Directive 95/46/EC, http://www.privacy.org/pi/intl_orgs/ec/eudp.html, 1995.
    • EU, Directive on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of Such Data, Directive 95/46/EC, http://www.privacy.org/pi/intl_orgs/ec/eudp.html, 1995.
  • 4
    • 0023266943 scopus 로고
    • A Comparison of Commercial and Military Computer Security Policies
    • 87, pp
    • D.D. Clark and D.R. Wilson, "A Comparison of Commercial and Military Computer Security Policies," Proc. IEEE Symp. Security and Privacy (SSP '87), pp. 184-194, 1987.
    • (1987) Proc. IEEE Symp. Security and Privacy (SSP , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 5
    • 0030086382 scopus 로고    scopus 로고
    • Role-Based Access Control Models
    • Feb
    • R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-Based Access Control Models," Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996.
    • (1996) Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Youman, C.4
  • 6
    • 0011044328 scopus 로고    scopus 로고
    • The RCL 2000 Language for Specifying Role-Based Authorization Constraints,
    • PhD dissertation, George Mason Univ
    • G.-J. Ahn, "The RCL 2000 Language for Specifying Role-Based Authorization Constraints," PhD dissertation, George Mason Univ., 1999.
    • (1999)
    • Ahn, G.-J.1
  • 7
    • 21144450607 scopus 로고    scopus 로고
    • Am. Nat'l Standards Inst. Incorporated, ANSI-INCITS 359-2004
    • Role Based Access Control, Am. Nat'l Standards Inst. Incorporated, ANSI-INCITS 359-2004, 2004.
    • (2004) Role Based Access Control
  • 8
    • 85006937063 scopus 로고    scopus 로고
    • Practical Safety in Flexible Access Control Models
    • May
    • T. Jaeger and J. Tidswell, "Practical Safety in Flexible Access Control Models," ACM Trans. Information and System Security, vol. 4, no. 2, pp. 158-190, May 2001.
    • (2001) ACM Trans. Information and System Security , vol.4 , Issue.2 , pp. 158-190
    • Jaeger, T.1    Tidswell, J.2
  • 10
    • 0142161295 scopus 로고    scopus 로고
    • A Precise Approach to Validating UML Models and OCL Constraints,
    • PhD dissertation, BISS Monographs No. 14, Fachbereich Math. und Informatik, Universität Bremen
    • M. Richters, "A Precise Approach to Validating UML Models and OCL Constraints," PhD dissertation, BISS Monographs No. 14, Fachbereich Math. und Informatik, Universität Bremen, 2002.
    • (2002)
    • Richters, M.1
  • 12
    • 0003258017 scopus 로고
    • Logics of Time and Computation
    • CSLI, Stanford Univ, second ed, revised and expanded, first ed., distributed by Univ. of Chicago Press
    • R. Goldblatt, Logics of Time and Computation, vol. 7, CSLI, Stanford Univ., second ed., revised and expanded, CSLI Lecture Notes, (first ed. 1987), distributed by Univ. of Chicago Press, 1992.
    • (1987) CSLI Lecture Notes , vol.7
    • Goldblatt, R.1
  • 13
  • 22
    • 0002848811 scopus 로고    scopus 로고
    • The Specification and Enforcement of Authorization Constraints in Workflow Management Systems
    • E. Bertino, E. Ferrari, and V. Atluri, "The Specification and Enforcement of Authorization Constraints in Workflow Management Systems," ACM Trans. Information and System Security, vol. 2, no. 1, pp. 65-104, 1999.
    • (1999) ACM Trans. Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 27
    • 0031118725 scopus 로고    scopus 로고
    • Access Control for Large Collections
    • H.M. Gladney, "Access Control for Large Collections," ACM Trans. Information Systems, vol. 15, no. 2, pp. 154-194, 1997.
    • (1997) ACM Trans. Information Systems , vol.15 , Issue.2 , pp. 154-194
    • Gladney, H.M.1
  • 30
    • 3042684910 scopus 로고    scopus 로고
    • A Rule-Based Framework for Role-Based Delegation and Revocation
    • Aug
    • L. Zhang, G.-J. Ahn, and B.-T. Chu, "A Rule-Based Framework for Role-Based Delegation and Revocation," ACM Trans. Information and System Security, vol. 6, no. 3, pp. 404-441, Aug. 2003.
    • (2003) ACM Trans. Information and System Security , vol.6 , Issue.3 , pp. 404-441
    • Zhang, L.1    Ahn, G.-J.2    Chu, B.-T.3
  • 33
    • 84960561455 scopus 로고
    • Proc. London Math. Soc. (2)
    • A. Turing, "On Computable Numbers with an Application to the Entscheidungs Problem," Proc. London Math. Soc. (2), vol. 42, pp. 230-265, www.abelard.org/turpap2, 1936.
    • (1936) , vol.42 , pp. 230-265
    • Turing, A.1
  • 36
    • 0003547470 scopus 로고    scopus 로고
    • The Unified Modeling Language Reference Manual
    • second ed, Addison Wesley Longman
    • J. Rumbaugh, I. Jacobson, and G. Booch, "The Unified Modeling Language Reference Manual," Object Technology Series, second ed., Addison Wesley Longman, 2004.
    • (2004) Object Technology Series
    • Rumbaugh, J.1    Jacobson, I.2    Booch, G.3
  • 40
    • 44649116899 scopus 로고    scopus 로고
    • OASIS, eXtensible Access Control Markup Language (XACML) Version 2.0, 2005
    • OASIS, eXtensible Access Control Markup Language (XACML) Version 2.0, http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core- spec-os.pdf, 2005.
  • 41
    • 33646121424 scopus 로고    scopus 로고
    • An OCL Extension for Formulating Temporal Constraints,
    • 1/03, Universität Bremen
    • P. Ziemann and M. Gogolla, "An OCL Extension for Formulating Temporal Constraints," Research Report 1/03, Universität Bremen, 2003.
    • (2003) Research Report
    • Ziemann, P.1    Gogolla, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.