메뉴 건너뛰기




Volumn , Issue , 2008, Pages 41-50

Enforcing security properties in task-Based systems

Author keywords

Policy; Security properties; Task based access control

Indexed keywords

GENERAL MODELS; POLICY; SECURITY PROPERTIES; SEQUENCE OF ACTIONS; TASK-BASED ACCESS CONTROL; TEMPORAL AVAILABILITIES;

EID: 57349200518     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1377836.1377843     Document Type: Conference Paper
Times cited : (9)

References (21)
  • 2
    • 0023558367 scopus 로고
    • Recognizing safety and liveness
    • Bowen Alpern and Fred B. Schneider. Recognizing safety and liveness. Distributed Computing, 2(3): 117-126, 1987.
    • (1987) Distributed Computing , vol.2 , Issue.3 , pp. 117-126
    • Alpern, B.1    Schneider, F.B.2
  • 5
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • February
    • Elisa Bertino, Elena Ferrari, and Vijay Atluri. The specification and enforcement of authorization constraints in workflow management systems. ACM Transactions on Information and System Security, 2(1):65-104, February 1999.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 6
    • 33749558954 scopus 로고    scopus 로고
    • Specifying and reasoning about dynamic access-control policies
    • Daniel J. Dougherty, Kathi Fisler, and Shriram Krishnamurthi. Specifying and reasoning about dynamic access-control policies. In IJCAR, pages 632-646, 2006.
    • (2006) IJCAR , pp. 632-646
    • Dougherty, D.J.1    Fisler, K.2    Krishnamurthi, S.3
  • 7
    • 0036090387 scopus 로고    scopus 로고
    • Statl: An attack language for state-based intrusion detection
    • Steven T. Eckmann, Giovanni Vigna, and Richard A. Kemmerer. Statl: an attack language for state-based intrusion detection. J. Comput. Secur., 10(1-2):71-103, 2002.
    • (2002) J. Comput. Secur , vol.10 , Issue.1-2 , pp. 71-103
    • Eckmann, S.T.1    Vigna, G.2    Kemmerer, R.A.3
  • 9
    • 33646187475 scopus 로고    scopus 로고
    • Extending the take-grant protection system
    • Department of Computer Science, University of California at Davis
    • Jeremy Frank and Matt Bishop. Extending the take-grant protection system. Technical Report Technical Report, Department of Computer Science, University of California at Davis, 1996.
    • (1996) Technical Report Technical Report
    • Frank, J.1    Bishop, M.2
  • 12
    • 0038825043 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Safety and availability analysis in trust management
    • IEEE Computer Society Press, May
    • Ninghui Li, William H. Winsborough, and John C. Mitchell. Beyond proof-of-compliance: Safety and availability analysis in trust management. In Proceedings of IEEE Symposium on Security and Privacy, pages 123-139. IEEE Computer Society Press, May 2003.
    • (2003) Proceedings of IEEE Symposium on Security and Privacy , pp. 123-139
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 13
    • 33845332032 scopus 로고    scopus 로고
    • Towards continuous usage control on grid computational services
    • 0:82
    • Fabio Martinelli, Paolo Mori, and Anna Vaccarelli. Towards continuous usage control on grid computational services. icas-icns, 0:82, 2005.
    • (2005) icas-icns
    • Martinelli, F.1    Mori, P.2    Vaccarelli, A.3
  • 17
    • 84881225236 scopus 로고    scopus 로고
    • Enforceable security policies
    • Fred B. Schneider. Enforceable security policies. ACM Trans. Inf. Syst. Secur., 3(1):30-50, 2000.
    • (2000) ACM Trans. Inf. Syst. Secur , vol.3 , Issue.1 , pp. 30-50
    • Schneider, F.B.1
  • 19
    • 84988603769 scopus 로고
    • Towards a task-based paradigm for flexible and adaptable access control in distributed applications
    • New York, NY, USA, ACM Press
    • R. K. Thomas and R. S. Sandhu. Towards a task-based paradigm for flexible and adaptable access control in distributed applications. In NSPW '92-93: Proceedings on the 1992-1993 workshop on New security paradigms, pages 138-142, New York, NY, USA, 1993. ACM Press.
    • (1993) NSPW '92-93: Proceedings on the 1992-1993 workshop on New security paradigms , pp. 138-142
    • Thomas, R.K.1    Sandhu, R.S.2
  • 20
    • 0002841051 scopus 로고    scopus 로고
    • Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management
    • London, UK, UK, Chapman & Hall, Ltd
    • Roshan K. Thomas and Ravi S. Sandhu. Task-based authorization controls (tbac): A family of models for active and enterprise-oriented autorization management. In Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI, pages 166-181, London, UK, UK, 1998. Chapman & Hall, Ltd.
    • (1998) Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI , pp. 166-181
    • Thomas, R.K.1    Sandhu, R.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.