메뉴 건너뛰기




Volumn , Issue , 2007, Pages 219-226

Anitya: An ephemeral data management service and secure data access protocols for dynamic collaborations

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; APPLICATIONS; COMMUNICATION; DISTRIBUTED COMPUTER SYSTEMS; INFORMATION SERVICES; INTERNET PROTOCOLS; MANAGEMENT INFORMATION SYSTEMS;

EID: 48049097247     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PDCAT.2007.4420174     Document Type: Conference Paper
Times cited : (4)

References (16)
  • 2
    • 10444254086 scopus 로고    scopus 로고
    • H. Khurana, V.D. Gligor. A Model for Access Negotiations in Dynamic Collaborations. Proc. of the 13th IEEE WETICE, pp. 205-210, 2004.
    • H. Khurana, V.D. Gligor. A Model for Access Negotiations in Dynamic Collaborations. Proc. of the 13th IEEE WETICE, pp. 205-210, 2004.
  • 3
    • 0036376894 scopus 로고    scopus 로고
    • dRBAC: Distributed Role-Based Access Control for Dynamic Collaboration Environments
    • E. Freudenthal, T. Pesin, E. Keenan, L. Port, and V. Karamcheti. dRBAC: Distributed Role-Based Access Control for Dynamic Collaboration Environments, Proc. of the ICDCS, pp. 411-420, 2002.
    • (2002) Proc. of the ICDCS , pp. 411-420
    • Freudenthal, E.1    Pesin, T.2    Keenan, E.3    Port, L.4    Karamcheti, V.5
  • 10
    • 46449094830 scopus 로고    scopus 로고
    • Enterprise Collaborative Contexts and their Provisioning for Secure Managed Extranets
    • J. Chan, G. Rogers, D. Agahari, D. Moreland and J. Zic. Enterprise Collaborative Contexts and their Provisioning for Secure Managed Extranets. Proc. of the 15th IEEE WETICE, pp. 313-318, 2006.
    • (2006) Proc. of the 15th IEEE WETICE , pp. 313-318
    • Chan, J.1    Rogers, G.2    Agahari, D.3    Moreland, D.4    Zic, J.5
  • 12
    • 57349142855 scopus 로고    scopus 로고
    • Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems
    • Middleware, pp
    • A. Rowstron and P. Druschel, Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), pp. 329-350, 2001.
    • (2001) IFIP/ACM International Conference on Distributed Systems Platforms , pp. 329-350
    • Rowstron, A.1    Druschel, P.2
  • 14
    • 48049114502 scopus 로고    scopus 로고
    • IETF Authentication, AAA Working Group
    • IETF Authentication, Authorization and Accounting (AAA) Working Group, http://www.ietf.org/html.charters/aaacharter.html
    • Authorization and Accounting
  • 15
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • S. Osborn, R. Sandhu and Q. Munawer. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Transactions on Information and System Security. Vol. 3 (2): 85-106, 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.