메뉴 건너뛰기




Volumn 278, Issue , 2008, Pages 173-187

Negotiation of prohibition: An approach based on policy rewriting

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA;

EID: 48249105083     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-09699-5_12     Document Type: Conference Paper
Times cited : (4)

References (15)
  • 1
    • 48249124718 scopus 로고    scopus 로고
    • Towards Filtering and Alerting Rule Rewriting on Single-Component Policies
    • Gdansk, Poland, September
    • J. G. Alfaro, F. Cuppens, and N. Cuppens-Boulahia. Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. In SAFECOMP, Gdansk, Poland, September 2006.
    • (2006) SAFECOMP
    • Alfaro, J.G.1    Cuppens, F.2    Cuppens-Boulahia, N.3
  • 5
    • 84944754330 scopus 로고    scopus 로고
    • Modelling Contexts in the Or-BAC Model
    • F. Cuppens and A. Miège. Modelling Contexts in the Or-BAC Model. ACSAC, page 416, 2003.
    • (2003) ACSAC , pp. 416
    • Cuppens, F.1    Miège, A.2
  • 6
    • 48249153525 scopus 로고    scopus 로고
    • Negotiation of prohibition: An approach based on policy rewriting
    • Technical report, TELECOM Bretagne, 2008
    • N. Cuppens-Boulahia, F. Cuppens, D. Abi Haidar, and H. Debar. Negotiation of prohibition: An approach based on policy rewriting. Technical report, TELECOM Bretagne, 2008.
    • Cuppens-Boulahia, N.1    Cuppens, F.2    Abi Haidar, D.3    Debar, H.4
  • 12
    • 85056545124 scopus 로고    scopus 로고
    • Limiting the Disclosure of Access Control Policies During Automated Trust Negotiation
    • San Diego, CA, April
    • K. Seamons, M. Winslett, and T. Yu. Limiting the Disclosure of Access Control Policies During Automated Trust Negotiation. In Network and Distributed System Security Symposium, San Diego, CA, April 2001.
    • (2001) Network and Distributed System Security Symposium
    • Seamons, K.1    Winslett, M.2    Yu, T.3
  • 13
    • 84942433458 scopus 로고    scopus 로고
    • K.E. Seamons, T. Chan, E. Child, M. Halcrow, A. Hess, J. Holt, J. Jacobson, R. Jarvis, A. Patty, B. Smith, T. Sundelin, and L. Yu. TrustBuilder: Negotiating trust in dynamic coalitions. Proceedings DARPA Information Survivability Conference and Exposition, 2:49-51, April 2003.
    • K.E. Seamons, T. Chan, E. Child, M. Halcrow, A. Hess, J. Holt, J. Jacobson, R. Jarvis, A. Patty, B. Smith, T. Sundelin, and L. Yu. TrustBuilder: Negotiating trust in dynamic coalitions. Proceedings DARPA Information Survivability Conference and Exposition, 2:49-51, April 2003.
  • 15
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • February
    • T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security (TISSEC)(1):1-42, February 2003.
    • (2003) ACM Transactions on Information and System Security (TISSEC) , vol.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.