메뉴 건너뛰기




Volumn 5283 LNCS, Issue , 2008, Pages 317-332

On the security of delegation in access control systems

Author keywords

[No Author keywords available]

Indexed keywords

CONTROL SYSTEMS; SECURITY SYSTEMS;

EID: 57049089483     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-88313-5_21     Document Type: Conference Paper
Times cited : (24)

References (16)
  • 4
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Bertino, E., Ferrari, E., Atluri, V.: The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security 2(1), 65-104 (1999)
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 10
    • 4944250730 scopus 로고    scopus 로고
    • Tan, K.. Crampton. J., Gunter, C.: The consistency of task-based authorization constraints in workflow systems. In: Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW), pp. 155-169 (2004)
    • Tan, K.. Crampton. J., Gunter, C.: The consistency of task-based authorization constraints in workflow systems. In: Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW), pp. 155-169 (2004)
  • 12
    • 57049161970 scopus 로고    scopus 로고
    • Wang, Q.. Li, N.: Satisfiability and resiliency in workflow systems. In: Proc. European Symp. on Research in Computer Security (September 2007)
    • Wang, Q.. Li, N.: Satisfiability and resiliency in workflow systems. In: Proc. European Symp. on Research in Computer Security (September 2007)
  • 13
    • 57049163039 scopus 로고    scopus 로고
    • On the security of delegation in access control systems
    • July
    • Wang, Q.. Li, N.: On the security of delegation in access control systems. CERIAS Technical Report (July 2008), http://www.cs.purdue.edu/homes/ wangq/papers/delegation.pdf
    • (2008) CERIAS Technical Report
    • Wang, Q.1    Li, N.2
  • 15
    • 3042684910 scopus 로고    scopus 로고
    • Zhang, L.. Ahn. G.-J.. Chu. B.-T.: A rule-based framework for role-based delegation and revocation. ACM Trans. Inf. Syst. Secur. 6(3), 404-441 (2003)
    • Zhang, L.. Ahn. G.-J.. Chu. B.-T.: A rule-based framework for role-based delegation and revocation. ACM Trans. Inf. Syst. Secur. 6(3), 404-441 (2003)
  • 16
    • 0242540371 scopus 로고    scopus 로고
    • Zhang, X.. Oh. S.. Sandhu. R.: Pbdm: a flexible delegation model in rbac. In: SACMAT 2003: Proceedings of the eighth ACM symposium on Access control models and technologies, pp. 149-157. ACM Press, New York (2003)
    • Zhang, X.. Oh. S.. Sandhu. R.: Pbdm: a flexible delegation model in rbac. In: SACMAT 2003: Proceedings of the eighth ACM symposium on Access control models and technologies, pp. 149-157. ACM Press, New York (2003)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.