메뉴 건너뛰기




Volumn , Issue , 2008, Pages 240-244

Mechanisms for usage control

Author keywords

Access control; DRM; Usage control

Indexed keywords

DIFFERENT MECHANISMS; DRM; FORMAL MODEL; USAGE CONTROL;

EID: 57849100172     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1368310.1368344     Document Type: Conference Paper
Times cited : (51)

References (5)
  • 2
    • 67651155598 scopus 로고    scopus 로고
    • Enforcement for usage control: A system model and a policy language for distributed usage control
    • DoCoMo Euro-Labs
    • M. Hilty, A. Pretschner, C. Schaefer, and T. Walter. Enforcement for Usage Control: A System Model and a Policy Language for Distributed Usage Control. Technical Report I-ST-20, DoCoMo Euro-Labs, 2006.
    • (2006) Technical Report I-ST-20
    • Hilty, M.1    Pretschner, A.2    Schaefer, C.3    Walter, T.4
  • 3
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • J. Ligatti, L. Bauer, and D. Walker. Edit Automata: Enforcement Mechanisms for Run-time Security Policies. Intl. J. of Inf. Security, 4 (1-2): 2-16, 2005.
    • (2005) Intl. J. of Inf. Security , vol.4 , Issue.1-2 , pp. 2-16
    • Ligatti, J.1    Bauer, L.2    Walker, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.