메뉴 건너뛰기




Volumn 2002-January, Issue , 2002, Pages 73-87

Methods and limitations of security policy reconciliation

Author keywords

Privacy; Security

Indexed keywords

COMPUTATIONAL LINGUISTICS; DATA PRIVACY;

EID: 4544277634     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPRI.2002.1004363     Document Type: Conference Paper
Times cited : (12)

References (33)
  • 4
    • 84982899264 scopus 로고    scopus 로고
    • The Role of Trust Management in Distributed Systems Security
    • Secure Internet Programming: Issues in Distributed and Mobile Object Systems, Springer-Verlag New York, NY
    • M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The Role of Trust Management in Distributed Systems Security. In Secure Internet Programming: Issues in Distributed and Mobile Object Systems, volume 1603, pages 185-210. Springer-Verlag Lecture Notes in Computer Science State-of-the-Art series, 1999. New York, NY.
    • (1999) Lecture Notes in Computer Science State-of-the-Art Series , vol.1603 , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.4
  • 9
    • 0030705406 scopus 로고    scopus 로고
    • Analyzing Consistancy of Security Policies
    • IEEE, May Oakland, CA
    • L. Cholvy and F. Cuppens. Analyzing Consistancy of Security Policies. In 1997 IEEE Symposium on Security and Privacy, pages 103-112. IEEE, May 1997. Oakland, CA.
    • (1997) 1997 IEEE Symposium on Security and Privacy , pp. 103-112
    • Cholvy, L.1    Cuppens, F.2
  • 20
    • 0032182406 scopus 로고    scopus 로고
    • Configuration Management for Highly-Customizable Software
    • M. Hiltunen. Configuration Management for Highly-Customizable Software. IEE Proceedings: Software, 145(5):180-188, 1998.
    • (1998) IEE Proceedings: Software , vol.145 , Issue.5 , pp. 180-188
    • Hiltunen, M.1
  • 24
    • 0005986692 scopus 로고
    • Secret-key Agreement without Public-Key Cryptography
    • August
    • T. Leighton and S. Micali. Secret-key Agreement without Public-Key Cryptography. In Proceedings of Crypto 93, pages 456-479, August 1994.
    • (1994) Proceedings of Crypto , vol.93 , pp. 456-479
    • Leighton, T.1    Micali, S.2
  • 29
    • 84962274513 scopus 로고    scopus 로고
    • Representation and Evaluation of Security Policies for Distributed System Services
    • Hilton Head, South Carolina, January DARPA
    • T. Ryutov and C. Neuman. Representation and Evaluation of Security Policies for Distributed System Services. In Proceedings of DARPA Information Survivability Conference and Exposition, pages 172-183, Hilton Head, South Carolina, January 2000. DARPA.
    • (2000) Proceedings of DARPA Information Survivability Conference and Exposition , pp. 172-183
    • Ryutov, T.1    Neuman, C.2
  • 31
    • 84974750564 scopus 로고
    • Authorization in Distributed Systems; A New Approach
    • T. Woo and S. Lam. Authorization in Distributed Systems; A New Approach. Journal of Computer Security, 2(2-3):107-136, 1993.
    • (1993) Journal of Computer Security , vol.2 , Issue.2-3 , pp. 107-136
    • Woo, T.1    Lam, S.2
  • 32
    • 0031704255 scopus 로고    scopus 로고
    • Designing a Distributed Authorization Service
    • San Francisco, March IEEE
    • T. Woo and S. Lam. Designing a Distributed Authorization Service. In Proceedings of INFOCOM '98, San Francisco, March 1998. IEEE.
    • (1998) Proceedings of INFOCOM '98
    • Woo, T.1    Lam, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.