메뉴 건너뛰기




Volumn , Issue , 2006, Pages

An integrated framework for trust-based access control for open systems

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL POLICIES; APPLICATION DOMAINS; INTEGRATED FRAMEWORKS; INTER-DOMAIN; INTERNATIONAL CONFERENCES; MAPPING MECHANISMS; MOBILE ENVIRONMENTS; MULTIMEDIA TECHNOLOGIES; NEGOTIATION PROCESSES; OPEN ENVIRONMENTS; PEER-TO-PEER; PROTECTION REQUIREMENTS; ROLE-BASED ACCESS CONTROL; SECURE INTEROPERATION; TRUST-BASED ACCESS CONTROL; WORK-SHARING;

EID: 50249180177     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COLCOM.2006.361881     Document Type: Conference Paper
Times cited : (4)

References (39)
  • 4
    • 1942532238 scopus 로고    scopus 로고
    • XML-Based Specification for Web Services Document Security
    • Bhatti, R., Bertino, E., Ghafoor, A., and Joshi, J. B. D., "XML-Based Specification for Web Services Document Security," IEEE Computer, Vol. 37, 2004, pp. 41-49.
    • (2004) IEEE Computer , vol.37 , pp. 41-49
    • Bhatti, R.1    Bertino, E.2    Ghafoor, A.3    Joshi, J.B.D.4
  • 13
    • 33947679958 scopus 로고    scopus 로고
    • A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks
    • Washington, DC, USA
    • Damiani, E., di Vimercati, S. de C., Paraboschi, S., Samarati, P., Violante, F., "A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks," ACM CCS'02, Washington, DC, USA, 2002.
    • (2002) ACM CCS'02
    • Damiani, E.1    di Vimercati, S.2    de, C.3    Paraboschi, S.4    Samarati, P.5    Violante, F.6
  • 19
    • 0000985630 scopus 로고
    • An Examination of Federal and Commercial Access Control Policy Needs
    • Ferraiolo, D. F., Gilbert, D. M., Lynch, N., "An Examination of Federal and Commercial Access Control Policy Needs," NIST-NCSC, 1993, pp. 107-116.
    • (1993) NIST-NCSC , pp. 107-116
    • Ferraiolo, D.F.1    Gilbert, D.M.2    Lynch, N.3
  • 21
    • 0016349356 scopus 로고
    • Approximation algorithms for combinatorial problems
    • Johnson, D.S., "Approximation algorithms for combinatorial problems," Journal of Computer System Science, 1974, pp.256-278.
    • (1974) Journal of Computer System Science , pp. 256-278
    • Johnson, D.S.1
  • 23
    • 0035251598 scopus 로고    scopus 로고
    • Digital Government Security Infrastructure Design Challenges
    • Joshi, J.B.D., Ghafoor, A., Aref, W. G., and Spafford, E. H., "Digital Government Security Infrastructure Design Challenges," IEEE Computer, vol. 34, 2001, pp. 66-72.
    • (2001) IEEE Computer , vol.34 , pp. 66-72
    • Joshi, J.B.D.1    Ghafoor, A.2    Aref, W.G.3    Spafford, E.H.4
  • 27
    • 24344502331 scopus 로고    scopus 로고
    • An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model
    • Joshi, J.B.D., Bertino, E., Ghafoor, A., "An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model," IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 2, 2005.
    • (2005) IEEE Transactions on Dependable and Secure Computing , vol.2 , Issue.2
    • Joshi, J.B.D.1    Bertino, E.2    Ghafoor, A.3
  • 29
    • 50249137587 scopus 로고    scopus 로고
    • Joshi, J.B.D., Du, Siqing, Joshi, Saubhagya R., A Trust Based Access Control Management Framework for a Secure Grid Environment, Security in Distributed, Grid, and Pervasive Computing, 2006 (In Print).
    • Joshi, J.B.D., Du, Siqing, Joshi, Saubhagya R., "A Trust Based Access Control Management Framework for a Secure Grid Environment," Security in Distributed, Grid, and Pervasive Computing, 2006 (In Print).
  • 30
    • 10944261046 scopus 로고    scopus 로고
    • Negotiating context Information in Context-Aware Systems
    • Nov-Dec
    • Khedr, M., Karmouch, A., "Negotiating context Information in Context-Aware Systems," IEEE Intelligent Systems, Vol. 19, No. 6, Nov-Dec 2004.
    • (2004) IEEE Intelligent Systems , vol.19 , Issue.6
    • Khedr, M.1    Karmouch, A.2
  • 32
    • 84884311106 scopus 로고    scopus 로고
    • Configuring Role-based Access Control to Enforce Mandatory and Discretionary Access Control Policies
    • Osborn, S., Sandhu, R., Munawer, Q., "Configuring Role-based Access Control to Enforce Mandatory and Discretionary Access Control Policies," ACM Transactions on Information and System Security, 2000, pp. 85-106.
    • (2000) ACM Transactions on Information and System Security , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 34
    • 50249183308 scopus 로고    scopus 로고
    • Computer Security - Esorics'96
    • LNCSN. 1146
    • Sandhu, R., "Role hierarchies and constraints for lattice-based access controls," Computer Security - Esorics'96, LNCSN. 1146, 1996, pp. 65-79.
    • (1996) , pp. 65-79
    • Sandhu, R.1
  • 35
    • 0008759125 scopus 로고    scopus 로고
    • Sen, S., Minimal Cost Set Covering Using Probabilistic Methods, Proceedings of the 1993 ACM/SIGAPP symposium on Applied computing: states of the art and practice. IN, USA, 1993, pp. 157-164.
    • Sen, S., "Minimal Cost Set Covering Using Probabilistic Methods," Proceedings of the 1993 ACM/SIGAPP symposium on Applied computing: states of the art and practice. IN, USA, 1993, pp. 157-164.
  • 37
    • 30644461515 scopus 로고    scopus 로고
    • Shehab, M., Bertino, E., Ghafoor, A, SERAT: SEcure Role mApping Technique for Decentralized Secure Interoperability, In Proceedings of the ACM Symposium on Access Control, Models and Technologies, Stockholm, Sweden, 2005.
    • Shehab, M., Bertino, E., Ghafoor, A, "SERAT: SEcure Role mApping Technique for Decentralized Secure Interoperability," In Proceedings of the ACM Symposium on Access Control, Models and Technologies, Stockholm, Sweden, 2005.
  • 39
    • 50249164677 scopus 로고    scopus 로고
    • Joint policy management and auditing in virtual organizations
    • Smith, T.J. and Ramakrishnan, L., "Joint policy management and auditing in virtual organizations," Grid Computing, 2003, pp. 117-124.
    • (2003) Grid Computing , pp. 117-124
    • Smith, T.J.1    Ramakrishnan, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.