메뉴 건너뛰기




Volumn , Issue , 2008, Pages 73-82

RCWLBAC - representing role based access control in OWL

Author keywords

Access control model; Ontology; OWL; RBAC; Semantic Web

Indexed keywords

ACCESS CONTROL MODEL; ACCESS CONTROL MODELS; APPLICATION DOMAINS; AUTHORIZATION POLICIES; CONTROL CONCEPTS; CONTROL PROBLEMS; MANAGEMENT FRAMEWORKS; ONE HANDS; OWL; POLICY LANGUAGES; RBAC; RBAC MODELS; REAL WORLDS; ROLE-BASED ACCESS CONTROLS; SECURITY ANALYSES; WEB ONTOLOGY LANGUAGES;

EID: 57349182523     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1377836.1377849     Document Type: Conference Paper
Times cited : (172)

References (35)
  • 2
    • 84880738920 scopus 로고    scopus 로고
    • Restricted role-value-maps in a description logic with existential restrictions and terminological cycles
    • F. Baader. Restricted role-value-maps in a description logic with existential restrictions and terminological cycles. Proc. DL 2003.
    • Proc. DL 2003
    • Baader, F.1
  • 11
    • 57349186673 scopus 로고    scopus 로고
    • S. Godik and T. Moses. OASIS extensible access control markup language (XACML). OASIS Committee Secification cs-xacml-specification-1.0, November 2002.
    • S. Godik and T. Moses. OASIS extensible access control markup language (XACML). OASIS Committee Secification cs-xacml-specification-1.0, November 2002.
  • 21
    • 30544438141 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Security analysis in trust management
    • N. Li, J. Mitchell, and W. Winsborough. Beyond proof-of-compliance: security analysis in trust management. Journal of the ACM (JACM), 52(3):474-514, 2005.
    • (2005) Journal of the ACM (JACM) , vol.52 , Issue.3 , pp. 474-514
    • Li, N.1    Mitchell, J.2    Winsborough, W.3
  • 23
    • 57349177700 scopus 로고    scopus 로고
    • T. Moses et al. extensible Access Control Markup Language (XACML) Version 2.0. OASIS Standard, 200502, 2005
    • T. Moses et al. extensible Access Control Markup Language (XACML) Version 2.0. OASIS Standard, 200502, 2005.
  • 29
    • 19344364618 scopus 로고    scopus 로고
    • Role-based access control
    • M. Zerkowitz, editor, Academic Press
    • R. S. Sandhu. Role-based access control. In M. Zerkowitz, editor, Advances in Computers, volume 48. Academic Press, 1998.
    • (1998) Advances in Computers , vol.48
    • Sandhu, R.S.1
  • 30
    • 57349180766 scopus 로고    scopus 로고
    • M. Schmidt-Schauss. Subsumption in KL-one is undecidable. Fachber. Informatik, Univ, 1988.
    • M. Schmidt-Schauss. Subsumption in KL-one is undecidable. Fachber. Informatik, Univ, 1988.
  • 31
    • 40149096827 scopus 로고    scopus 로고
    • Analysis of dynamic policies
    • A. P. Sistla and M. Zhou. Analysis of dynamic policies. Inf. Comput., 206(2-4):185-212, 2008.
    • (2008) Inf. Comput , vol.206 , Issue.2-4 , pp. 185-212
    • Sistla, A.P.1    Zhou, M.2
  • 32
    • 32844474610 scopus 로고    scopus 로고
    • A. C. Squicciarini, E. Bertino, E. Ferrari, and I. Ray. Achieving privacy in trust negotiations with an ontology-based approach. IEEE Transactions on Dependable Sec. Comput., 3(l):13-30, 2006.
    • A. C. Squicciarini, E. Bertino, E. Ferrari, and I. Ray. Achieving privacy in trust negotiations with an ontology-based approach. IEEE Transactions on Dependable Sec. Comput., 3(l):13-30, 2006.
  • 33
    • 57349119982 scopus 로고    scopus 로고
    • B. Thuraisingham. Assured information sharing. Technical Report UTDCS-43-06, Computer Science Department, University of Texas Dallas, 2006. to appear as Book Chapter in Security Informatics by Springer, editor: H. Chen.
    • B. Thuraisingham. Assured information sharing. Technical Report UTDCS-43-06, Computer Science Department, University of Texas Dallas, 2006. to appear as Book Chapter in Security Informatics by Springer, editor: H. Chen.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.