메뉴 건너뛰기




Volumn , Issue , 2008, Pages 10-18

Security enforcement model for distributed usage control

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; CONTROL SYSTEMS; MECHANISMS; SECURITY SYSTEMS; SENSOR NETWORKS; SENSORS; UBIQUITOUS COMPUTING;

EID: 50949130846     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SUTC.2008.79     Document Type: Conference Paper
Times cited : (22)

References (28)
  • 1
    • 50949107802 scopus 로고    scopus 로고
    • Fairplay. http://en.wikipedia.org/wiki/FairPlay.
    • Fairplay
  • 2
    • 50949132142 scopus 로고    scopus 로고
    • Windows media digital rights management DRM
    • Windows media digital rights management (DRM). http://www.microsoft.com/ windows/windowsmedia/drm/default.aspx.
  • 3
    • 50949097568 scopus 로고    scopus 로고
    • Web Services Security: SOAP Message Security 1.1. OASIS Web Service Security TC, 2004.
    • Web Services Security: SOAP Message Security 1.1. OASIS Web Service Security TC, 2004.
  • 5
    • 50949112228 scopus 로고    scopus 로고
    • J. P. Anderson. Computer security technology planning study II, ESD-TR-73-51, II, electronic systems division, air force systems command, hanscom field, bedford, MA 01730. http://csrc.nist.gov/publications/history/ ande72.pdf, Oct. 1972.
    • J. P. Anderson. Computer security technology planning study volume II, ESD-TR-73-51, vol. II, electronic systems division, air force systems command, hanscom field, bedford, MA 01730. http://csrc.nist.gov/publications/history/ ande72.pdf, Oct. 1972.
  • 7
    • 0003400257 scopus 로고
    • Mitre Corp. Report No.M74-244, Bedford, Mass
    • D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations and model. Mitre Corp. Report No.M74-244, Bedford, Mass., 1975.
    • (1975)
    • Bell, D.E.1    LaPadula, L.J.2
  • 8
    • 0003400255 scopus 로고
    • Integrity consideration for secure computer system
    • Technical report, Mitre Corp. Report TR-3153, Bedford, Mass
    • K. J. Biba. Integrity consideration for secure computer system. Technical report, Mitre Corp. Report TR-3153, Bedford, Mass., 1977.
    • (1977)
    • Biba, K.J.1
  • 10
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • May
    • D. E. Denning. A lattice model of secure information flow. Communications of the ACM, 19(5), May 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5
    • Denning, D.E.1
  • 11
    • 0003969635 scopus 로고
    • Department of Defense Trusted Computer Systems Evaluation Criteria
    • Department of Defense National Computer Security Center, December
    • Department of Defense National Computer Security Center. Department of Defense Trusted Computer Systems Evaluation Criteria, December 1985. DoD 5200.28-STD.
    • (1985) DoD 5200.28-STD
  • 17
    • 17544394392 scopus 로고    scopus 로고
    • Computer security in the real world
    • June
    • B. Lampson. Computer security in the real world. IEEE Computer, (6):37-46, June 2004.
    • (2004) IEEE Computer , vol.6 , pp. 37-46
    • Lampson, B.1
  • 25
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In USENIX Security Symposium, pages 223-238, 2004.
    • (2004) USENIX Security Symposium , pp. 223-238
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    van Doorn, L.4
  • 26
    • 0037252218 scopus 로고    scopus 로고
    • Good-enough security: Toward a pragmatic business-driven discipline
    • R. Sandhu. Good-enough security: Toward a pragmatic business-driven discipline. IEEE Internet Computing, (1):66-68, 2003.
    • (2003) IEEE Internet Computing , vol.1 , pp. 66-68
    • Sandhu, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.