메뉴 건너뛰기




Volumn 40, Issue 3, 2008, Pages

Authorization in trust management: Features and foundations

Author keywords

Distributed authorization; Trust management systems

Indexed keywords

ACCESS RIGHTS; DISTRIBUTED AUTHORIZATION; DISTRIBUTED SYSTEMS; GENERIC STRUCTURES; SECURITY PROPERTIES; TRUST MANAGEMENT; TRUST MANAGEMENT SYSTEMS;

EID: 49449101262     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/1380584.1380587     Document Type: Article
Times cited : (58)

References (94)
  • 1
    • 0031637195 scopus 로고    scopus 로고
    • On SDSI's linked local name spaces
    • ABADI, M. 1998. On SDSI's linked local name spaces. J. Comput. Secur. 6, 1-2, 3-21.
    • (1998) J. Comput. Secur , vol.6 , Issue.1-2 , pp. 3-21
    • ABADI, M.1
  • 6
    • 84865788031 scopus 로고    scopus 로고
    • A model of OASIS role-based access control and its support for active security
    • BACON, J., MOODY, K., AND YAO, W. 2002. A model of OASIS role-based access control and its support for active security. ACM Trans. Inform. Syst. Secur. 5, 4, 492-540.
    • (2002) ACM Trans. Inform. Syst. Secur , vol.5 , Issue.4 , pp. 492-540
    • BACON, J.1    MOODY, K.2    YAO, W.3
  • 8
    • 85084162149 scopus 로고    scopus 로고
    • BAUER, L., SCHNEIDER, M. A., AND FELTEN, E. W. 2002. A general and flexible access-control system for the Web. In Proceedings of the 11th USENIX Security Symposium. 93-108.
    • BAUER, L., SCHNEIDER, M. A., AND FELTEN, E. W. 2002. A general and flexible access-control system for the Web. In Proceedings of the 11th USENIX Security Symposium. 93-108.
  • 9
    • 33947674219 scopus 로고    scopus 로고
    • Cassandra: Flexible trust management and its application to electronic health records
    • Tech. rep. 648, University of Cambridge
    • BECKER, M. Y. 2005. Cassandra: Flexible trust management and its application to electronic health records. Tech. rep. 648, University of Cambridge.
    • (2005)
    • BECKER, M.Y.1
  • 13
    • 49449089594 scopus 로고    scopus 로고
    • BLAZE, M, FEIGENBAUM, J, IOANNIDIS, J, AND KEROMYTIS, A. D. 1999a. RFC-2704: The keyNote trustmanagement system version 2. Internet Engineering Task Force
    • BLAZE, M., FEIGENBAUM, J., IOANNIDIS, J., AND KEROMYTIS, A. D. 1999a. RFC-2704: The keyNote trustmanagement system version 2. Internet Engineering Task Force.
  • 19
    • 33744993674 scopus 로고    scopus 로고
    • Policy language specification
    • BONATTI, P. AND OLMEDILLA, D. 2005a. Policy language specification. REWERSE Deliverable I2-D2, http://rewerse.net/ deliverables.html.
    • (2005) REWERSE Deliverable
    • BONATTI, P.1    OLMEDILLA, D.2
  • 21
    • 0036311802 scopus 로고    scopus 로고
    • A unified framework for regulating access and information release on the Web
    • BONATTI, P. AND SAMARATI, P. 2002. A unified framework for regulating access and information release on the Web. J. Comput. Secur. 10, 3, 241-272.
    • (2002) J. Comput. Secur , vol.10 , Issue.3 , pp. 241-272
    • BONATTI, P.1    SAMARATI, P.2
  • 22
    • 26444484308 scopus 로고    scopus 로고
    • Logics for authorizations and security
    • J. Chomicki, R. van der Meyden, and G. Saake, Eds. Springer-Verlag
    • BONATTI, P. AND SAMARATI, P. 2003. Logics for authorizations and security. In Logics for Emerging Applications of Databases, J. Chomicki, R. van der Meyden, and G. Saake, Eds. Springer-Verlag.
    • (2003) Logics for Emerging Applications of Databases
    • BONATTI, P.1    SAMARATI, P.2
  • 32
    • 49449105200 scopus 로고    scopus 로고
    • ELLISON, C., FRANTZ, B., LAMPSON, B., RIVEST, R., THOMAS, B., AND YLONEN, T. 1999. RFC-2693: SPKI certificate theory. Internet Engineering Task Force.
    • ELLISON, C., FRANTZ, B., LAMPSON, B., RIVEST, R., THOMAS, B., AND YLONEN, T. 1999. RFC-2693: SPKI certificate theory. Internet Engineering Task Force.
  • 34
    • 34547260252 scopus 로고    scopus 로고
    • No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic Web
    • Proceedings of the 1st European Semantic Web Symposium, Springer
    • GAVRILOAIE, R., NEJDL, W., OLMEDILLA, D., SEAMONS, K. E., AND WINSLETT, M. 2004. No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic Web. In Proceedings of the 1st European Semantic Web Symposium. Lecture Notes in Computer Science, vol. 3053. Springer, 342-356.
    • (2004) Lecture Notes in Computer Science , vol.3053 , pp. 342-356
    • GAVRILOAIE, R.1    NEJDL, W.2    OLMEDILLA, D.3    SEAMONS, K.E.4    WINSLETT, M.5
  • 37
    • 0034428960 scopus 로고    scopus 로고
    • Policy-directed certificate retrieval
    • GUNTER, C. A. AND JIM, T. 2000b. Policy-directed certificate retrieval. Softw. Prac. Exper. 30, 15, 1609-1640.
    • (2000) Softw. Prac. Exper , vol.30 , Issue.15 , pp. 1609-1640
    • GUNTER, C.A.1    JIM, T.2
  • 38
    • 49449093032 scopus 로고    scopus 로고
    • GUNTER, C. A., JIM, T., AND WANG, B.-Y. 1997. Authenticated data distribution using query certificate managers, unpublished extended abstract.
    • GUNTER, C. A., JIM, T., AND WANG, B.-Y. 1997. Authenticated data distribution using query certificate managers, unpublished extended abstract.
  • 39
    • 0032681483 scopus 로고    scopus 로고
    • HALPERN, J. AND VAN DER MEYDEN, R. 1999. A logic for SDSI's linked local name spaces. In Proceedings of the 12th IEEE Computer Security Foundations Workshop. 111-122.
    • HALPERN, J. AND VAN DER MEYDEN, R. 1999. A logic for SDSI's linked local name spaces. In Proceedings of the 12th IEEE Computer Security Foundations Workshop. 111-122.
  • 40
    • 0034822798 scopus 로고    scopus 로고
    • HALPERN, J. Y AND VAN DER MEYDEN, R. 2001. A logical reconstruction of SPKI. In Proceedings of the 14th IEEE Computer Security Foundations Workshop. 59-70.
    • HALPERN, J. Y AND VAN DER MEYDEN, R. 2001. A logical reconstruction of SPKI. In Proceedings of the 14th IEEE Computer Security Foundations Workshop. 59-70.
  • 45
    • 0003623954 scopus 로고    scopus 로고
    • A formal semantics for SPKI
    • Tech. rep. 2000-363, Dartmouth College
    • HOWELL, J. AND KOTZ, D. 2000. A formal semantics for SPKI. Tech. rep. 2000-363, Dartmouth College.
    • (2000)
    • HOWELL, J.1    KOTZ, D.2
  • 48
    • 4243532938 scopus 로고
    • Constraint logic programming: A survey
    • JAFFAR, J. AND MAHER, M. J. 1994. Constraint logic programming: A survey. J. Logic Program. 19/20, 503-581.
    • (1994) J. Logic Program , vol.19-20 , pp. 503-581
    • JAFFAR, J.1    MAHER, M.J.2
  • 54
    • 84949191488 scopus 로고    scopus 로고
    • LI, N. AND FEIGENBAUM, J. 2002. Nonmonotonicity, user interfaces, and risk assessment in certificate revocation. In Proceedings of the 5th International Conference on Financial Cryptography. Springer-Verlag, 166-177.
    • LI, N. AND FEIGENBAUM, J. 2002. Nonmonotonicity, user interfaces, and risk assessment in certificate revocation. In Proceedings of the 5th International Conference on Financial Cryptography. Springer-Verlag, 166-177.
  • 55
    • 0041524661 scopus 로고    scopus 로고
    • Delegation logic: A logic-based approach to distributed authorization
    • LI, N., GROSOF, B. N., AND FEIGENBAUM, J. 2003. Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inform. Syst. Secur. 6, 1, 128-171.
    • (2003) ACM Trans. Inform. Syst. Secur , vol.6 , Issue.1 , pp. 128-171
    • LI, N.1    GROSOF, B.N.2    FEIGENBAUM, J.3
  • 56
    • 33646242539 scopus 로고    scopus 로고
    • Understanding spki/sdsi using first-order logic
    • LI, N. AND MITCHELL, C. 2006. Understanding spki/sdsi using first-order logic. Int. J. Inform. Secur. 5, 1, 48-64.
    • (2006) Int. J. Inform. Secur , vol.5 , Issue.1 , pp. 48-64
    • LI, N.1    MITCHELL, C.2
  • 60
    • 30544438141 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Security analysis in trust management
    • LI, N., MITCHELL, J. C., AND WINSBOROUGH, W. H. 2005. Beyond proof-of-compliance: Security analysis in trust management. J. ACM 52, 3, 474-514.
    • (2005) J. ACM , vol.52 , Issue.3 , pp. 474-514
    • LI, N.1    MITCHELL, J.C.2    WINSBOROUGH, W.H.3
  • 61
    • 0037243196 scopus 로고    scopus 로고
    • Distributed chain discovery in trust management
    • LI, N., WINSBOROUGH, W. H., AND MITCHELL, J. C. 2003. Distributed chain discovery in trust management. J. Comput. Secur. 11, 1, 35-86.
    • (2003) J. Comput. Secur , vol.11 , Issue.1 , pp. 35-86
    • LI, N.1    WINSBOROUGH, W.H.2    MITCHELL, J.C.3
  • 69
    • 49449091723 scopus 로고    scopus 로고
    • OFFICE OF TECHNOLOGY ASSESSMENT. 1993. Protecting Privacy in Computerized Medical Information. OTA-TCT-576. U.S. Government Printing Office.
    • OFFICE OF TECHNOLOGY ASSESSMENT. 1993. Protecting Privacy in Computerized Medical Information. OTA-TCT-576. U.S. Government Printing Office.
  • 71
    • 0030258432 scopus 로고    scopus 로고
    • PICS: Internet access controls without censorship
    • RESNICK, P. AND MILLER, J. 1996. PICS: Internet access controls without censorship. Comm. ACM 39, 10, 87-93.
    • (1996) Comm. ACM , vol.39 , Issue.10 , pp. 87-93
    • RESNICK, P.1    MILLER, J.2
  • 73
    • 49449085092 scopus 로고    scopus 로고
    • RIVEST, R. L. AND LAMPSON, B. 1996a. SDSI-A simple distributed security infrastructure. version 1.0
    • RIVEST, R. L. AND LAMPSON, B. 1996a. SDSI-A simple distributed security infrastructure. version 1.0. http://theory.les.mit. edu/~rivest/sdsi10.html.
  • 74
    • 49449111475 scopus 로고    scopus 로고
    • RIVEST, R. L. AND LAMPSON, B. 1996b. SDSI-A simple distributed security infrastructure. version 1.1
    • RIVEST, R. L. AND LAMPSON, B. 1996b. SDSI-A simple distributed security infrastructure. version 1.1. http://theory.lcs.mit. edu/~rivest/sdsi11.html.
  • 80
    • 34249881318 scopus 로고    scopus 로고
    • Risk management for distributed authorization
    • SKALKA, C., WANG, X. S., AND CHAPIN, P. 2007. Risk management for distributed authorization. J. Comput. Secur. 15, 4, 447-489.
    • (2007) J. Comput. Secur , vol.15 , Issue.4 , pp. 447-489
    • SKALKA, C.1    WANG, X.S.2    CHAPIN, P.3
  • 81
    • 0029210673 scopus 로고
    • Recent-secure authentication: Enforcing revocation in distributed systems
    • IEEE Computer Society
    • STUBBLEBINE, S. 1995. Recent-secure authentication: Enforcing revocation in distributed systems. In Proceedings of the 1995 IEEE Symposium on Security and Privacy. IEEE Computer Society, 224-235.
    • (1995) Proceedings of the 1995 IEEE Symposium on Security and Privacy , pp. 224-235
    • STUBBLEBINE, S.1
  • 83
    • 0242453160 scopus 로고    scopus 로고
    • Memoing evaluation for constraint extensions of datalog
    • TOMAN, D. 1997. Memoing evaluation for constraint extensions of datalog. Constraints 2, 337-359.
    • (1997) Constraints , vol.2 , pp. 337-359
    • TOMAN, D.1
  • 89
    • 0036871183 scopus 로고    scopus 로고
    • WINSLETT, M., YU, T., SEAMONS, K. E., HESS, A., JACOBSON, J., JARVIS, R., SMITH, B., ANDYU, L. 2002. Negotiating trust on the Web. IEEE Intern. Comput. 6, 6, 30-37.
    • WINSLETT, M., YU, T., SEAMONS, K. E., HESS, A., JACOBSON, J., JARVIS, R., SMITH, B., ANDYU, L. 2002. Negotiating trust on the Web. IEEE Intern. Comput. 6, 6, 30-37.
  • 91
    • 84974750564 scopus 로고
    • Authorizations in distributed systems: A new approach
    • WOO, T. Y. C. AND LAM, S. S. 1993. Authorizations in distributed systems: A new approach. J. Comput. Secur. 2, 2-3, 107-136.
    • (1993) J. Comput. Secur , vol.2 , Issue.2-3 , pp. 107-136
    • WOO, T.Y.C.1    LAM, S.S.2
  • 92
    • 49449102469 scopus 로고    scopus 로고
    • XSB INC. 2006. XSB home page, http://xsb.sourceforge.net.
    • XSB INC. 2006. XSB home page, http://xsb.sourceforge.net.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.