메뉴 건너뛰기




Volumn 23, Issue 3, 2008, Pages 193-207

Request-driven role mapping framework for secure interoperation in multi-domain environments

Author keywords

Conflict resolution; Minimal unique set; Multi domain; Privilege query; Role mapping; Secure interoperation

Indexed keywords

CONFLICT RESOLUTION; EXTERNAL-; INTER-DOMAIN; INTER-OPERATION; MINIMAL UNIQUE SET; MULTI DOMAINS; MULTI-DOMAIN; PRIVILEGE QUERY; ROLE HIERARCHIES; ROLE MAPPING; SECURE INTEROPERATION;

EID: 49549111832     PISSN: 02676192     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Conference Paper
Times cited : (13)

References (32)
  • 1
    • 0035251598 scopus 로고    scopus 로고
    • Digital Government Security Infrastructure Design Challenges
    • J. B. D. Joshi, A. Ghafoor, W. Aref, and E. H. Spafford, "Digital Government Security Infrastructure Design Challenges," IEEE Computer, vol. 34, no. 2, pp. 66-72, 2001.
    • (2001) IEEE Computer , vol.34 , Issue.2 , pp. 66-72
    • Joshi, J.B.D.1    Ghafoor, A.2    Aref, W.3    Spafford, E.H.4
  • 2
    • 0042348513 scopus 로고    scopus 로고
    • Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace
    • Macmillan Publishing, August
    • R. Power, "Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace," Que/Macmillan Publishing, August 2000.
    • (2000) Que
    • Power, R.1
  • 13
    • 0033884687 scopus 로고    scopus 로고
    • Providing Security and Interoperation of Heterogeneous Systems
    • S. Dawson, S. Qian, and P. Samarati, "Providing Security and Interoperation of Heterogeneous Systems," Distributed and Parallel Databases, vol. 8, no. 1, pp. 119-145, 2000.
    • (2000) Distributed and Parallel Databases , vol.8 , Issue.1 , pp. 119-145
    • Dawson, S.1    Qian, S.2    Samarati, P.3
  • 16
    • 0033333334 scopus 로고    scopus 로고
    • Conflicts in Policy-Based Distributed Systems Management
    • E. Lupu, and M. Sloman, "Conflicts in Policy-Based Distributed Systems Management," IEEE Transactions on Software Engineering, vol. 25, no. 6, pp. 852-869, 1999.
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.6 , pp. 852-869
    • Lupu, E.1    Sloman, M.2
  • 20
    • 0036387050 scopus 로고    scopus 로고
    • J. B. D. Joshi, E. Bertino, and A. Ghafoor, Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model, Proceedings of the 26th Annual International Computer Software and Applications Conference COMPSAC'02, Oxford, England, pp. 951-956, 2002
    • J. B. D. Joshi, E. Bertino, and A. Ghafoor, "Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model," Proceedings of the 26th Annual International Computer Software and Applications Conference (COMPSAC'02), Oxford, England, pp. 951-956, 2002.
  • 25
    • 28244460211 scopus 로고    scopus 로고
    • Secure Interoperation in a Multidomain Environment Employing RBAC Policies
    • B. Shafiq, J. B. D. Joshi, and E. Bertino, "Secure Interoperation in a Multidomain Environment Employing RBAC Policies," IEEE Transactions on Knowledge and Data Engineering, vol. 17, no. 11, pp. 1557-1577, 2005.
    • (2005) IEEE Transactions on Knowledge and Data Engineering , vol.17 , Issue.11 , pp. 1557-1577
    • Shafiq, B.1    Joshi, J.B.D.2    Bertino, E.3
  • 27
    • 0010032891 scopus 로고    scopus 로고
    • Computational Issues in Secure Interoperation
    • L. Gong, and X. Qian, "Computational Issues in Secure Interoperation," IEEE Transactions on Software Engineering, vol. 22, no.1, pp. 43-52, 1996.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 43-52
    • Gong, L.1    Qian, X.2
  • 30
    • 24344502331 scopus 로고    scopus 로고
    • An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model
    • J. B. D. Joshi, E. Bertino, and A. Ghafoor, "An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model," IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 2, pp. 157-175, 2005.
    • (2005) IEEE Transactions on Dependable and Secure Computing , vol.2 , Issue.2 , pp. 157-175
    • Joshi, J.B.D.1    Bertino, E.2    Ghafoor, A.3
  • 32
    • 33745472982 scopus 로고    scopus 로고
    • X-GTRBAC Admin: A Decentralized Administration Model for Enterprise-Wide Access Control
    • J. B. D. Joshi, "X-GTRBAC Admin: A Decentralized Administration Model for Enterprise-Wide Access Control," ACM Transactions on Information and System Security, vol. 8, no. 4, pp. 388-423, 2005.
    • (2005) ACM Transactions on Information and System Security , vol.8 , Issue.4 , pp. 388-423
    • Joshi, J.B.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.