메뉴 건너뛰기




Volumn , Issue , 2008, Pages 103-112

Policy decomposition for collaborative access control

Author keywords

Collaborative access control; Policy decomposition

Indexed keywords

ACCESS CONTROL DECISIONS; ACCESS CONTROL MODELS; ACCESS CONTROL SYSTEMS; CHAIN ARRANGEMENTS; COLLABORATIVE ACCESS CONTROL; COLLABORATIVE ACCESSES; COLLABORATIVE ACTIVITIES; COLLABORATIVE APPLICATIONS; GLOBAL POLICIES; GOVERNMENT AGENCIES; POLICY DECOMPOSITION; REFERENCE ARCHITECTURES;

EID: 57349171335     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1377836.1377853     Document Type: Conference Paper
Times cited : (38)

References (16)
  • 3
    • 57349175665 scopus 로고    scopus 로고
    • Extensible access control markup language (XACML) version 2.0. OASIS Standard, 2005
    • Extensible access control markup language (XACML) version 2.0. OASIS Standard, 2005.
  • 4
    • 33244479658 scopus 로고    scopus 로고
    • Evaluating XACML as a policy language
    • Technical report, OASIS
    • A. Anderson. Evaluating XACML as a policy language. Technical report, OASIS, 2003.
    • (2003)
    • Anderson, A.1
  • 9
    • 33748485156 scopus 로고    scopus 로고
    • Attribute-based access control with hidden policies and hidden credentials
    • K. Frikken, M. Atallah, and J. Li. Attribute-based access control with hidden policies and hidden credentials, IEEE Transaction on Computers, 55(10):1259-1270, 2006.
    • (2006) IEEE Transaction on Computers , vol.55 , Issue.10 , pp. 1259-1270
    • Frikken, K.1    Atallah, M.2    Li, J.3
  • 11
    • 1142293102 scopus 로고    scopus 로고
    • N. Li, W. Du, and D. Boneh. Oblivious signature-based envelope. In In Proc. of ACM Symposium on Principles of Distributed Computing, 2003.
    • N. Li, W. Du, and D. Boneh. Oblivious signature-based envelope. In In Proc. of ACM Symposium on Principles of Distributed Computing, 2003.
  • 16
    • 2942654406 scopus 로고    scopus 로고
    • Certificate-based authorization policy in a pki environment
    • M. Thompson, A. Essiari, and S. Mudumbai. Certificate-based authorization policy in a pki environment. ACM Trans. Inf. Syst. Secur., 6(4):566-588, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.4 , pp. 566-588
    • Thompson, M.1    Essiari, A.2    Mudumbai, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.