메뉴 건너뛰기




Volumn 7, Issue 4, 2008, Pages 285-305

Modeling contextual security policies

Author keywords

Access control; Context awareness; OrBAC; Security policy

Indexed keywords

ARSENIC COMPOUNDS; SECURITY SYSTEMS;

EID: 47649083260     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-007-0051-9     Document Type: Article
Times cited : (114)

References (47)
  • 1
    • 0032027597 scopus 로고    scopus 로고
    • Modeling and analysis of workflows using petri nets
    • Adam N., Atluri V. and Huang W.-K. (1998). Modeling and analysis of workflows using petri nets. J Int. Inf. Syst. 10(2): 131-158
    • (1998) J Int. Inf. Syst. , vol.10 , Issue.2 , pp. 131-158
    • Adam, N.1    Atluri, V.2    Huang, W.-K.3
  • 2
    • 84956993736 scopus 로고    scopus 로고
    • Role-based authorization constraints specification
    • Ahn G.-J. and Sandhu R. (2000). Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur. 3(4): 207-226
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.4 , pp. 207-226
    • Ahn, G.-J.1    Sandhu, R.2
  • 5
    • 84949747356 scopus 로고    scopus 로고
    • An authorization model for workflows
    • In: LNCS
    • Atluri, V., Huang, W.-K.: An authorization model for workflows. In: ESORICS'96, vol. 1146. LNCS (1996)
    • (1996) ESORICS'96 , vol.1146
    • Atluri, V.1    Huang, W.-K.2
  • 6
    • 4944223328 scopus 로고    scopus 로고
    • Cassandra: Flexible trust management, applied to eelctronic health records
    • In: Pacific Grove, CA, June
    • BeckeF, M., Sewell, P.: Cassandra: flexible trust management, applied to eelctronic health records. In: The Computer Security Foundations Workshop (CSFW), Pacific Grove, CA, June 2004
    • (2004) The Computer Security Foundations Workshop (CSFW)
    • Becker, M.1    Sewell, P.2
  • 7
    • 0003400251 scopus 로고
    • Secure computer systems: Unified exposition and multics interpretation
    • Technical Report ESD-TR-75-306, MTR-2997, Rev. 1, MITRE Corporation, Bedfort, MA, March
    • Bell, D.E., La PaduUa, L.J.: Secure computer systems: unified exposition and multics interpretation. Technical Report ESD-TR-75-306, MTR-2997, Rev. 1, MITRE Corporation, Bedfort, MA, March 1976
    • (1976)
    • Bell, D.E.1    La Padula, L.J.2
  • 10
    • 0002848811 scopus 로고    scopus 로고
    • An Authorization Model for Supporting the Specification and Enforcement of Authorization Constraints in Workflow Management Systems
    • Bertino E., Ferrari E. and Atluri V. (1999). An Authorization Model for Supporting the Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Trans. Inf. Syst. Secur. 2(1): 65-104
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 17
    • 33746441974 scopus 로고    scopus 로고
    • Inheritance hierarchies in the Or-BAC Model and Application in a network environnement
    • In: Turku, Finlande, July
    • Cuppens, F., Cuppens-Boulahia, N., Miège, A.: Inheritance hierarchies in the Or-BAC Model and Application in a network environnement. In: 2nd Foundation of Computer Security Workshop, Turku, Finlande, July (2004)
    • (2004) 2nd Foundation of Computer Security Workshop
    • Cuppens, F.1    Cuppens-Boulahia, N.2    Miège, A.3
  • 28
    • 0016984825 scopus 로고
    • Protection in operating systems
    • Harrison M., Ruzzo W. and Ullman J. (1976). Protection in operating systems. CACM 19(8): 461-471
    • (1976) CACM , vol.19 , Issue.8 , pp. 461-471
    • Harrison, M.1    Ruzzo, W.2    Ullman, J.3
  • 32
    • 24344502331 scopus 로고    scopus 로고
    • Analysis of expressiveness and design issues for a temporal role based access control model
    • Joshi J.B.D., Bertino E. and Ghafoor A. (2005). Analysis of expressiveness and design issues for a temporal role based access control model. IEEE Trans. Dependable Secur. Comput. 2(2): 157-175
    • (2005) IEEE Trans. Dependable Secur. Comput. , vol.2 , Issue.2 , pp. 157-175
    • Joshi, J.B.D.1    Bertino, E.2    Ghafoor, A.3
  • 39
    • 3142523603 scopus 로고    scopus 로고
    • The UCON ABC usage control model
    • Park J. and Sandhu R.S. (2004). The UCON ABC usage control model. ACM Trans. Inf. Sys. Secur. 7(1): 128-174
    • (2004) ACM Trans. Inf. Sys. Secur. , vol.7 , Issue.1 , pp. 128-174
    • Park, J.1    Sandhu, R.S.2
  • 42
    • 4444246080 scopus 로고    scopus 로고
    • An integrated approach to engineer and enforce context constraints in RBAC environements
    • Strembeck M. and Neumann G. (2004). An integrated approach to engineer and enforce context constraints in RBAC environements. ACM Trans. Inf. Sys. Secur. 7(3): 392-427
    • (2004) ACM Trans. Inf. Sys. Secur. , vol.7 , Issue.3 , pp. 392-427
    • Strembeck, M.1    Neumann, G.2
  • 43
    • 0031387996 scopus 로고    scopus 로고
    • TMAC: A primitive for applying RBAC in collaborative environment
    • In: FairFax, VA
    • Thomas, R.K.: TMAC: A primitive for applying RBAC in collaborative environment. In: 2nd ACM, Workshop on RBAC, pp. 13-19. FairFax, VA (1997)
    • (1997) 2nd ACM, Workshop on RBAC , pp. 13-19
    • Thomas, R.K.1
  • 44
    • 0242453160 scopus 로고    scopus 로고
    • Memoing evaluation for constraint extensions of datalog
    • Toman D. (1997). Memoing evaluation for constraint extensions of datalog. Constraints 2(3/4): 337-359
    • (1997) Constraints , vol.2 , Issue.3-4 , pp. 337-359
    • Toman, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.