메뉴 건너뛰기




Volumn , Issue , 2008, Pages 211-220

A security model for mobile processes

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; CONTROL SYSTEMS; CUSTOMER SATISFACTION; HELIUM; INFORMATION SCIENCE; INFORMATION SYSTEMS; MOBILE COMPUTING; MOBILE DEVICES; TELECOMMUNICATION EQUIPMENT; TELECOMMUNICATION SYSTEMS; WEIGHT CONTROL;

EID: 52149099011     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICMB.2008.13     Document Type: Conference Paper
Times cited : (5)

References (20)
  • 2
    • 0003400251 scopus 로고
    • Secure Computer System: Unified Exposition and Multics Interpretation
    • Technical Report MTR-2997, The MITRE Corporation
    • D. E. Bell and L. J. LaPadula. Secure Computer System: Unified Exposition and Multics Interpretation. Technical Report MTR-2997, The MITRE Corporation, 1976.
    • (1976)
    • Bell, D.E.1    LaPadula, L.J.2
  • 3
    • 0002848811 scopus 로고    scopus 로고
    • The Specification and Enforcement of Authorization Constraints in Workflow Management Systems
    • E. Bertino, E. Ferrari, and V. Atluri. The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Transactions on Information and System Security, 2(1):65-104, 1999.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 4
    • 0034810791 scopus 로고    scopus 로고
    • Separation of Duties for Access Control Enforcement in Workflow Environments
    • R. A. Botha and J. H. Eloff. Separation of Duties for Access Control Enforcement in Workflow Environments. IBM Systems Journal, 40(3):666-682, 2001.
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 666-682
    • Botha, R.A.1    Eloff, J.H.2
  • 7
    • 1542341270 scopus 로고    scopus 로고
    • Location-Based Authentication: Grounding Cyberspace for Better Security
    • D. E. Denning and P. F. MacDoran. Location-Based Authentication: Grounding Cyberspace for Better Security. Computer Fraud & Security, 1996(2):12-16, 1996.
    • (1996) Computer Fraud & Security , vol.1996 , Issue.2 , pp. 12-16
    • Denning, D.E.1    MacDoran, P.F.2
  • 14
    • 52149120362 scopus 로고    scopus 로고
    • Mobility and Context-Awareness in Workflow Systems
    • Technical report, University of Trondheim, Norway
    • J. O. Nødtvedt. Mobility and Context-Awareness in Workflow Systems. Technical report, University of Trondheim, Norway, 2003.
    • (2003)
    • Nødtvedt, J.O.1
  • 16
    • 85015437589 scopus 로고    scopus 로고
    • I. Ray, M. Kumar, and L. Yu. LRBAC: A Location-Aware Role-Based Access Control Model. In Second International Conference on Information Systems Security (ICISS), pages 147-161, Kolkata, India, 2006.
    • I. Ray, M. Kumar, and L. Yu. LRBAC: A Location-Aware Role-Based Access Control Model. In Second International Conference on Information Systems Security (ICISS), pages 147-161, Kolkata, India, 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.