메뉴 건너뛰기




Volumn 4, Issue 1, 2007, Pages 69-80

Virtual private services: Coordinated policy enforcement for distributed applications

Author keywords

Distributed access control; Security policy; Trust management

Indexed keywords

COMPUTATIONAL ELEMENTS; DISTRIBUTED ACCESS CONTROLS; DISTRIBUTED APPLICATIONS; LARGE-SCALE DISTRIBUTED APPLICATIONS; POLICY ENFORCEMENT POINTS; SECURITY AND PRIVACY; SECURITY POLICY; TRUST MANAGEMENT;

EID: 56649125033     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (7)

References (55)
  • 1
    • 85084161234 scopus 로고    scopus 로고
    • Mapbox: Using parame-terized behavior classes to confine applications
    • Denver, CO, Aug
    • A. Acharya and M. Raje, "Mapbox: Using parame-terized behavior classes to confine applications," in Proceedings of the 2000 USENIX Security Sympo-sium, pp. 1-17, Denver, CO, Aug. 2000.
    • (2000) Proceedings of the 2000 USENIX Security Sympo-sium , pp. 1-17
    • Acharya, A.1    Raje, M.2
  • 2
    • 1642387377 scopus 로고    scopus 로고
    • "Consh: A confined execution environment for internet com-putations
    • available at,Dec
    • A. Alexandrov, P. Kmiec, and K. Schauser, "Consh: A confined execution environment for internet com-putations," available at http://www.cs.ucsb.edu/,berto/papers/99-usenix-consh.ps, Dec. 1998.
    • (1998)
    • Alexandrov, A.1    Kmiec, P.2    Schauser, K.3
  • 6
    • 85084161168 scopus 로고
    • TRON: Process-specific file protection for the UNIX oper-ating system
    • New Orleans, Louisiana, Jan
    • A. Berman, V. Bourassa, and E. Selberg, "TRON: Process-specific file protection for the UNIX oper-ating system," in Proceedings of the USENIX 1995 Technical Conference, pp. 165-175, New Orleans, Louisiana, Jan. 1995.
    • (1995) Proceedings of the USENIX 1995 Technical Conference , pp. 165-175
    • Berman, A.1    Bourassa, V.2    Selberg, E.3
  • 7
    • 84982899264 scopus 로고    scopus 로고
    • The role of trust management in dis-tributed systems security
    • Springer-Verlag, New York, NY, USA
    • M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, "The role of trust management in dis-tributed systems security," in Secure Internet Pro-gramming, LNCS 1603, pp. 185-210, Springer-Verlag, New York, NY, USA, 1999.
    • (1999) Secure Internet Pro-gramming, LNCS 1603 , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.4
  • 9
    • 0003437009 scopus 로고
    • Firewalls and In-ternet Security: Repelling the Wily Hacker
    • W. R. Cheswick and S. M. Bellovin, Firewalls and In-ternet Security: Repelling the Wily Hacker, Addison-Wesley, 1994.
    • (1994) Addison-Wesley
    • Cheswick, W.R.1    Bellovin, S.M.2
  • 19
    • 0007935332 scopus 로고
    • The KeyKOS architecture
    • Oct
    • N. Hardy, "The KeyKOS architecture," in Operating Systems Review, pp. 8-25, Oct. 1985.
    • (1985) Operating Systems Review , pp. 8-25
    • Hardy, N.1
  • 26
    • 84874904489 scopus 로고
    • Automatic software distribution
    • Salt Lake City, UT, Summer
    • A. Koenig, "Automatic software distribution," in USENIX Conference Proceedings, pp. 312-322, Salt Lake City, UT, Summer 1984.
    • (1984) USENIX Conference Proceedings , pp. 312-322
    • Koenig, A.1
  • 27
    • 0038150463 scopus 로고
    • Le système Caml Special Light: modules et compilation efficace en Caml
    • INRIA, Nov
    • X. Leroy, Le système Caml Special Light: modules et compilation efficace en Caml, Research report 2721, INRIA, Nov. 1995.
    • (1995) Research report 2721
    • Leroy, X.1
  • 31
    • 0036086451 scopus 로고    scopus 로고
    • Methods and lim-itations of security policy reconciliation
    • IEEE, Oakland, CA, May
    • P. McDaniel and A. Prakash, "Methods and lim-itations of security policy reconciliation, in 2002 IEEE Symposium on Security and Privacy, pp. 73-87, IEEE, Oakland, CA, May 2002.
    • (2002) 2002 IEEE Symposium on Security and Privacy , pp. 73-87
    • McDaniel, P.1    Prakash, A.2
  • 32
    • 0003680553 scopus 로고    scopus 로고
    • Java Security: Hostile Applets
    • Wiley, New York, NY
    • G. McGraw and E. W. Felten, Java Security: Hostile Applets, Holes and Antidotes, Wiley, New York, NY, 1997.
    • (1997) Holes and Antidotes
    • McGraw, G.1    Felten, E.W.2
  • 35
    • 0005008274 scopus 로고
    • Simple and flexible datagram access controls for UNIX-based gateways
    • J. C. Mogul, "Simple and flexible datagram access controls for UNIX-based gateways," in Proceedings of the USENIX Summer 1989 Conference, pp. 203-221, 1989.
    • (1989) Proceedings of the USENIX Summer 1989 Conference , pp. 203-221
    • Mogul, J.C.1
  • 38
    • 0031539874 scopus 로고    scopus 로고
    • The design, implemen-tation and evaluation of SMART: A scheduler for mult imedia applications
    • Oct
    • J. Nieh and M. S. Lam, "The design, implemen-tation and evaluation of SMART: A scheduler for mult imedia applications," in Proceedings of the 16th ACM Symposium on Operating Systems Principles, pp. 184-197, Oct. 1997.
    • (1997) Proceedings of the 16th ACM Symposium on Operating Systems Principles , pp. 184-197
    • Nieh, J.1    Lam, M.S.2
  • 45
    • 84874925030 scopus 로고    scopus 로고
    • The KeyKOS Operating System
    • The KeyKOS Operating System, http://www.cis.upenn.edu/~KeyKOS/.
  • 46
    • 84874888298 scopus 로고    scopus 로고
    • The OpenBSD Operating System
    • The OpenBSD Operating System, http://www.openbsd.org/.
  • 55
    • 0004694565 scopus 로고
    • Hydra/C.mmp: An Experimental Computer System
    • W. Wulf, R. Levin, and P. Harbison, Hydra/C.mmp: An Experimental Computer System, McGraw-Hill, 1981.
    • (1981) McGraw-Hill
    • Wulf, W.1    Levin, R.2    Harbison, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.