메뉴 건너뛰기




Volumn 55, Issue 3, 2008, Pages

Beyond separation of duty: An algebra for specifying high-level security policies

Author keywords

Access control; Policy design; Separation of duty

Indexed keywords

ALGEBRAIC PROPERTIES; COMPUTATIONAL PROBLEMS; FORMAL SPECIFICATIONS; HIGH-LEVEL POLICIES; POLICY ANALYSIS; POLICY DESIGN; POTENTIAL MECHANISMS; SCHEME DESIGN; SECURITY CONSTRAINTS; SECURITY CONTROLS; SECURITY POLICIES; SEPARATION OF DUTIES; SEPARATION OF DUTY; TASK DESIGN; WORK-FLOWS;

EID: 49449083108     PISSN: 00045411     EISSN: 1557735X     Source Type: Journal    
DOI: 10.1145/1379759.1379760     Document Type: Article
Times cited : (30)

References (31)
  • 1
    • 0027667638 scopus 로고    scopus 로고
    • ABADI, M., BURROWS, M., LAMPSON, B., AND PLOTKIN, G. 1993. A calculus for access control in distributed systems. ACM Trans. Prog. Lang. Syst. 15, 4 (Oct.), 706-734.
    • ABADI, M., BURROWS, M., LAMPSON, B., AND PLOTKIN, G. 1993. A calculus for access control in distributed systems. ACM Trans. Prog. Lang. Syst. 15, 4 (Oct.), 706-734.
  • 3
    • 84956993736 scopus 로고    scopus 로고
    • AHN, G.-J., AND SANDHU, R. S. 2000. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Sec. 3, 4 (Nov.), 207-226.
    • AHN, G.-J., AND SANDHU, R. S. 2000. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Sec. 3, 4 (Nov.), 207-226.
  • 6
    • 49449083516 scopus 로고    scopus 로고
    • BERTINO, E., FERRARI, E., AND ATLURI, V. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Sec. 2, 1 (Feb.), 65-104.
    • BERTINO, E., FERRARI, E., AND ATLURI, V. 1999. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Sec. 2, 1 (Feb.), 65-104.
  • 9
    • 85025424440 scopus 로고    scopus 로고
    • BONATTI, P., DE CAPITANIDI VLMERCATL, S., AND SAMARATI, P. 2002. An algebra for composing access control policies. ACM Trans. Inf. Syst. Sec. (TISSEC) 5, 1 (Feb.), 1-35.
    • BONATTI, P., DE CAPITANIDI VLMERCATL, S., AND SAMARATI, P. 2002. An algebra for composing access control policies. ACM Trans. Inf. Syst. Sec. (TISSEC) 5, 1 (Feb.), 1-35.
  • 10
    • 0023266943 scopus 로고    scopus 로고
    • CLARK, D. D., AND WILSON, D. R. 1987. A comparision of commercial and military computer security policies. In Proceedings of the 1987 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA, 184-194.
    • CLARK, D. D., AND WILSON, D. R. 1987. A comparision of commercial and military computer security policies. In Proceedings of the 1987 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA, 184-194.
  • 14
  • 16
    • 85006937063 scopus 로고    scopus 로고
    • JAEGER, T., AND TIDSWELL, J. E. 2001. Practical safety in flexible access control models. ACM Trans. Inf. Syst. Sec. 4, 2 (May), 158-190.
    • JAEGER, T., AND TIDSWELL, J. E. 2001. Practical safety in flexible access control models. ACM Trans. Inf. Syst. Sec. 4, 2 (May), 158-190.
  • 18
    • 34249745790 scopus 로고    scopus 로고
    • LI, N., TRIPUNITARA, M. V., AND BIZRI, Z. 2007. On mutually exclusive roles and separation-of-duty. ACM Trans. Inf. Syst. Sec. (TISSEC) 10, 2, 5.
    • LI, N., TRIPUNITARA, M. V., AND BIZRI, Z. 2007. On mutually exclusive roles and separation-of-duty. ACM Trans. Inf. Syst. Sec. (TISSEC) 10, 2, 5.
  • 22
    • 26444483379 scopus 로고    scopus 로고
    • Towards an algebra for security policies (extended abstract)
    • Proceedings of ICATPN 2005, Springer-Verlag, New York
    • PINCUS, J., AND WING, J. M. 2005. Towards an algebra for security policies (extended abstract). In Proceedings of ICATPN 2005. Lecture Notes in Computer Science, vol. 3536. Springer-Verlag, New York, 17-25.
    • (2005) Lecture Notes in Computer Science , vol.3536 , pp. 17-25
    • PINCUS, J.1    WING, J.M.2
  • 23
    • 0016555241 scopus 로고    scopus 로고
    • SALTZER, J. H., AND SCHROEDER, M. D. 1975. The protection of information in computer systems. Proc. IEEE 63, 9 (Sep.), 1278-1308.
    • SALTZER, J. H., AND SCHROEDER, M. D. 1975. The protection of information in computer systems. Proc. IEEE 63, 9 (Sep.), 1278-1308.
  • 26
    • 0030086382 scopus 로고    scopus 로고
    • SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Comput. 29, 2 (Feb.), 38-47.
    • SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Comput. 29, 2 (Feb.), 38-47.
  • 28
  • 31
    • 3142523600 scopus 로고    scopus 로고
    • WUESEKERA, D., AND JAJODIA, S. 2003. A propositional policy algebra for access control. ACM Trans. Inf. Syst. Sec. 6, 2 (May), 286-325.
    • WUESEKERA, D., AND JAJODIA, S. 2003. A propositional policy algebra for access control. ACM Trans. Inf. Syst. Sec. 6, 2 (May), 286-325.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.