메뉴 건너뛰기




Volumn , Issue , 2008, Pages 177-191

Evidence-based audit

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL POLICIES; COMPUTER SECURITY; METATHEORETIC PROPERTIES;

EID: 51749116017     PISSN: 19401434     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSF.2008.24     Document Type: Conference Paper
Times cited : (46)

References (33)
  • 8
    • 33750236737 scopus 로고    scopus 로고
    • Consumable credentials in logic-based access control
    • Technical Report CMU-CYLAB-06-002, Carnegie Mellon University, February
    • Lujo Bauer, Kevin D. Bowers, Frank Pfenning, and Michael K. Reiter. Consumable credentials in logic-based access control. Technical Report CMU-CYLAB-06-002, Carnegie Mellon University, February 2006.
    • (2006)
    • Bauer, L.1    Bowers, K.D.2    Pfenning, F.3    Reiter, M.K.4
  • 11
    • 51749089241 scopus 로고    scopus 로고
    • Mihir Bellare and Bennet Yee. Forward integrity for secure audit logs. Technical report, Computer Science and Engineering Department, U. California at San Diego, 1997.
    • Mihir Bellare and Bennet Yee. Forward integrity for secure audit logs. Technical report, Computer Science and Engineering Department, U. California at San Diego, 1997.
  • 12
    • 0346236349 scopus 로고    scopus 로고
    • Art and Science. Addison-Wesley Professional
    • Matt Bishop. Computer Security: Art and Science. Addison-Wesley Professional, 2002.
    • (2002) Computer Security
    • Bishop, M.1
  • 15
    • 0003180840 scopus 로고
    • A formulation of the simple theory of types
    • June
    • Alonzo Church. A formulation of the simple theory of types. The Journal of Symbolic Logic, 5(2):56-68, June 1940.
    • (1940) The Journal of Symbolic Logic , vol.5 , Issue.2 , pp. 56-68
    • Church, A.1
  • 23
    • 0016984825 scopus 로고
    • Protection in operating systems
    • M. A. Harrison, W. L Ruzzo, and J. D. Ullman. Protection in operating systems. Comm. ACM, 19(8):461-471, 1976.
    • (1976) Comm. ACM , vol.19 , Issue.8 , pp. 461-471
    • Harrison, M.A.1    Ruzzo, W.L.2    Ullman, J.D.3
  • 25
    • 51749091892 scopus 로고    scopus 로고
    • Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianzhou Zhao, Luke Zarko, Joseph Schorr, and Steve Zdancewic. Aura: A programming language for authorization and audit, preliminary technical results. Technical Report MS-CIS-08-10, U. Pennsylvania, 2008.
    • Limin Jia, Jeffrey A. Vaughan, Karl Mazurak, Jianzhou Zhao, Luke Zarko, Joseph Schorr, and Steve Zdancewic. Aura: A programming language for authorization and audit, preliminary technical results. Technical Report MS-CIS-08-10, U. Pennsylvania, 2008.
  • 26
    • 0030677523 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: A specification-based approach
    • Washington, DC, USA, IEEE Computer Society
    • C. Ko, M. Ruschitzka, and K. Levitt. Execution monitoring of security-critical programs in distributed systems: a specification-based approach. In SP '97: Proceedings of the 1997 IEEE Symposium on Security and Privacy, page 175, Washington, DC, USA, 1997. IEEE Computer Society.
    • (1997) SP '97: Proceedings of the 1997 IEEE Symposium on Security and Privacy , pp. 175
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.3
  • 27
    • 0041524661 scopus 로고    scopus 로고
    • Delegation logic: A logic-based approach to distributed authorization
    • Ninghui Li, Benjamin N. Grosof, and Joan Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur., 6(1), 2003.
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.1
    • Li, N.1    Grosof, B.N.2    Feigenbaum, J.3
  • 29
  • 31
    • 51749108341 scopus 로고    scopus 로고
    • Jeffrey C. Vaughan, Limin Jia, Karl Mazurak, and Steve Zdancewic. Evidence-based audit, technical appendix. Technical Report MS-CIS-08-09, U. Pennsylvania, 2008.
    • Jeffrey C. Vaughan, Limin Jia, Karl Mazurak, and Steve Zdancewic. Evidence-based audit, technical appendix. Technical Report MS-CIS-08-09, U. Pennsylvania, 2008.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.