메뉴 건너뛰기




Volumn , Issue , 2007, Pages 209-216

Dynamic, context-aware, least-privilege grid delegation

Author keywords

[No Author keywords available]

Indexed keywords

DECISION MAKING; MECHANISMS; PROBLEM SOLVING;

EID: 47249133315     PISSN: 15505510     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GRID.2007.4354135     Document Type: Conference Paper
Times cited : (3)

References (27)
  • 4
    • 47249161837 scopus 로고    scopus 로고
    • Delegation issuing service for x.509
    • USA: NIST Technical Publication, IR 7224, April
    • D. W. Chadwick, "Delegation issuing service for x.509," in Proceedings of the 4th Annual PKI R&D Workshop. USA: NIST Technical Publication, IR 7224, April 2005, pp. 66-77.
    • (2005) Proceedings of the 4th Annual PKI R&D Workshop , pp. 66-77
    • Chadwick, D.W.1
  • 5
    • 84988603769 scopus 로고
    • Towards a task-based paradigm for flexible and adaptable access control in distributed applications
    • New York, NY, USA: ACM Press
    • R. K. Thomas and R. S. Sandhu, "Towards a task-based paradigm for flexible and adaptable access control in distributed applications," in NSPW '92-93: Proceedings on the 1992-1993 workshop on New security paradigms. New York, NY, USA: ACM Press, 1993, pp. 138-142.
    • (1993) NSPW '92-93: Proceedings on the 1992-1993 workshop on New security paradigms , pp. 138-142
    • Thomas, R.K.1    Sandhu, R.S.2
  • 7
    • 0031118725 scopus 로고    scopus 로고
    • Access control for large collections
    • H. M. Gladney, "Access control for large collections," ACM Trans. Inf. Syst., vol. 15, no. 2, pp. 154-194, 1997.
    • (1997) ACM Trans. Inf. Syst , vol.15 , Issue.2 , pp. 154-194
    • Gladney, H.M.1
  • 8
    • 0016984825 scopus 로고
    • Protection in operating systems
    • M. A. Harrison, W. L. Ruzzo, and J. D. Ullman, "Protection in operating systems," Commun. ACM, vol. 19, no. 8, pp. 461-471, 1976.
    • (1976) Commun. ACM , vol.19 , Issue.8 , pp. 461-471
    • Harrison, M.A.1    Ruzzo, W.L.2    Ullman, J.D.3
  • 11
    • 33744977269 scopus 로고    scopus 로고
    • A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments,
    • Ph.D. dissertation, University of Maryland Baltimore County, Baltimore MD 21250, September
    • L. Kagal, "A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments," Ph.D. dissertation, University of Maryland Baltimore County, Baltimore MD 21250, September 2004.
    • (2004)
    • Kagal, L.1
  • 12
    • 47249160525 scopus 로고    scopus 로고
    • IBM, Microsoft, RSA andVeriSign, May, Online, Available
    • WS-Trust, "Web service trust language." IBM, Microsoft, RSA andVeriSign, May 2004. [Online], Available: http://www-106.ibm.com/ developerworks/webservices/library/specification/ws-trust/
    • (2004) Web service trust language
    • Trust, W.1
  • 13
    • 47249148252 scopus 로고    scopus 로고
    • S. Tuecke, V. Welch, D. Engen, L. Pearlman, and M. Thompson, Internet x.509 public key infrastructure (pki) proxy certificate profile. RFC 3820 (Proposed Standard), jun 2004. [Online], Available: http://www.ietf.org/rfc/rfc3820.txt
    • S. Tuecke, V. Welch, D. Engen, L. Pearlman, and M. Thompson, "Internet x.509 public key infrastructure (pki) proxy certificate profile." RFC 3820 (Proposed Standard), jun 2004. [Online], Available: http://www.ietf.org/rfc/rfc3820.txt
  • 14
  • 15
    • 47249142223 scopus 로고    scopus 로고
    • V. Welch, I. Foster, K. C. M. O., P. L., T. S., G. J., and M. S. S. F., X.509 proxy certificate for dynamic delegation. in Proceedings of the 3rd Annual PKI Workshop, Gaithersburg MD, USA, April 2004, pp. 20-25.
    • V. Welch, I. Foster, K. C. M. O., P. L., T. S., G. J., and M. S. S. F., "X.509 proxy certificate for dynamic delegation." in Proceedings of the 3rd Annual PKI Workshop, Gaithersburg MD, USA, April 2004, pp. 20-25.
  • 18
    • 2942654406 scopus 로고    scopus 로고
    • Certificate-based authorization policy in a pki environment
    • M. R. Thompson, A. Essiari, and S. Mudumbai, "Certificate-based authorization policy in a pki environment," ACM Trans. Inf. Syst. Secur., vol. 6, no. 4, pp. 566-588, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.4 , pp. 566-588
    • Thompson, M.R.1    Essiari, A.2    Mudumbai, S.3
  • 19
    • 0037362986 scopus 로고    scopus 로고
    • Role-based access control with x.509 attribute certificates
    • D. W. Chadwick, A. Otenko, and E. Ball, "Role-based access control with x.509 attribute certificates," IEEE Internet Computing, vol. 7, no. 2, pp. 62-69, 2003.
    • (2003) IEEE Internet Computing , vol.7 , Issue.2 , pp. 62-69
    • Chadwick, D.W.1    Otenko, A.2    Ball, E.3
  • 21
    • 47249095581 scopus 로고    scopus 로고
    • O. TC, extensible access control markup language (xacml) version 2.0, February 2005, Online, Available
    • O. TC, "extensible access control markup language (xacml) version 2.0," February 2005. [Online]. Available: http://docs.oasis-open.org/xacml/ 2.0/
  • 23
    • 0031387996 scopus 로고    scopus 로고
    • Team-based access control (tmac): A primitive for applying role-based access controls in collaborative environments
    • New York, NY, USA: ACM Press
    • R. K. Thomas, "Team-based access control (tmac): a primitive for applying role-based access controls in collaborative environments," in RBAC '97: Proceedings of the second ACM workshop on Role-based access control. New York, NY, USA: ACM Press, 1997, pp. 13-19.
    • (1997) RBAC '97: Proceedings of the second ACM workshop on Role-based access control , pp. 13-19
    • Thomas, R.K.1
  • 25
    • 0002841051 scopus 로고    scopus 로고
    • Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management
    • London, UK, UK: Chapman & Hall, Ltd
    • R. K. Thomas and R. S. Sandhu, "Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management," in Proceedings of the IFIP TCII WGI 1.3 Eleventh International Conference on Database Securty XI. London, UK, UK: Chapman & Hall, Ltd., 1998, pp. 166-181.
    • (1998) Proceedings of the IFIP TCII WGI 1.3 Eleventh International Conference on Database Securty XI , pp. 166-181
    • Thomas, R.K.1    Sandhu, R.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.