메뉴 건너뛰기




Volumn 234, Issue C, 2009, Pages 37-54

Rewrite Based Specification of Access Control Policies

Author keywords

Access Control Policies; Information Flow; Model Checking; Term Rewriting

Indexed keywords

ACCESS CONTROL MECHANISMS; ACCESS CONTROL POLICIES; AUTHORIZED USERS; BASED SPECIFICATIONS; DATA PROTECTIONS; INFORMATION FLOW; INFORMATION LEAKAGES; POLICY SPECIFICATIONS; SECURITY LEVELS; TERM REWRITING;

EID: 62849120146     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2009.02.071     Document Type: Article
Times cited : (3)

References (16)
  • 1
    • 38049178772 scopus 로고    scopus 로고
    • Tom: Piggybacking rewriting on java
    • Proceedings of the 18th Conference on Rewriting Techniques and Applications, Springer-Verlag
    • Balland E., Brauner P., Kopetz R., Moreau P.-E., and Reilles A. Tom: Piggybacking rewriting on java. Proceedings of the 18th Conference on Rewriting Techniques and Applications. Lecture Notes in Computer Science volume 4533 (2007), Springer-Verlag 36-47
    • (2007) Lecture Notes in Computer Science , vol.4533 , pp. 36-47
    • Balland, E.1    Brauner, P.2    Kopetz, R.3    Moreau, P.-E.4    Reilles, A.5
  • 2
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations
    • ESD-TR-73-278 I-III, Mitre Corporation
    • D.E. Bell and L.J. LaPadula. Secure computer systems: Mathematical foundations. Technical Report Mitre Report ESD-TR-73-278 (Vol. I-III), Mitre Corporation, 1974
    • (1974) Technical Report Mitre Report
    • Bell, D.E.1    LaPadula, L.J.2
  • 3
    • 49049100147 scopus 로고    scopus 로고
    • Secure computer systems: A mathematical model, volume II
    • Elliot Bell D., and LaPadula L.J. Secure computer systems: A mathematical model, volume II. Journal of Computer Security 4 2/3 (1996) 229-263
    • (1996) Journal of Computer Security , vol.4 , Issue.2-3 , pp. 229-263
    • Elliot Bell, D.1    LaPadula, L.J.2
  • 4
    • 33749558954 scopus 로고    scopus 로고
    • Specifying and reasoning about dynamic access-control policies
    • IJCAR. Furbach U., and Shankar N. (Eds), Springer
    • Dougherty D.J., Fisler K., and Krishnamurthi S. Specifying and reasoning about dynamic access-control policies. In: Furbach U., and Shankar N. (Eds). IJCAR. Lecture Notes in Computer Science volume 4130 (2006), Springer 632-646
    • (2006) Lecture Notes in Computer Science , vol.4130 , pp. 632-646
    • Dougherty, D.J.1    Fisler, K.2    Krishnamurthi, S.3
  • 5
    • 35048849152 scopus 로고    scopus 로고
    • Model-checking access control policies
    • ISC. Zhang K., and Zheng Y. (Eds), Springer
    • Guelev D.P., Ryan M., and Schobbens P.-Y. Model-checking access control policies. In: Zhang K., and Zheng Y. (Eds). ISC. Lecture Notes in Computer Science volume 3225 (2004), Springer 219-230
    • (2004) Lecture Notes in Computer Science , vol.3225 , pp. 219-230
    • Guelev, D.P.1    Ryan, M.2    Schobbens, P.-Y.3
  • 10
    • 21144432063 scopus 로고    scopus 로고
    • A Pattern Matching Compiler for Multiple Target Languages
    • 12th Conference on Compiler Construction. Hedin G. (Ed). Warsaw, Poland, Springer-Verlag
    • Moreau P.-E., Ringeissen C., and Vittek M. A Pattern Matching Compiler for Multiple Target Languages. In: Hedin G. (Ed). 12th Conference on Compiler Construction. Warsaw, Poland. LNCS volume 2622 (May 2003), Springer-Verlag 61-76
    • (2003) LNCS , vol.2622 , pp. 61-76
    • Moreau, P.-E.1    Ringeissen, C.2    Vittek, M.3
  • 12
    • 34547327908 scopus 로고    scopus 로고
    • NETRA: seeing through access control
    • Winslett M., Gordon A.D., and Sands D. (Eds), ACM
    • Naldurg P., Schwoon S., Rajamani S.K., and Lambert J. NETRA: seeing through access control. In: Winslett M., Gordon A.D., and Sands D. (Eds). FMSE (2006), ACM 55-66
    • (2006) FMSE , pp. 55-66
    • Naldurg, P.1    Schwoon, S.2    Rajamani, S.K.3    Lambert, J.4
  • 13
    • 34447618954 scopus 로고    scopus 로고
    • Canonical abstract syntax trees
    • Proceedings of WRLA 2006, Vienna, Austria. Denker G., and Talcott C. (Eds)
    • Reilles A. Canonical abstract syntax trees. In: Denker G., and Talcott C. (Eds). Proceedings of WRLA 2006, Vienna, Austria. Electronic Notes in Theoretical Computer Science 176 (2006) 165-179
    • (2006) Electronic Notes in Theoretical Computer Science , vol.176 , pp. 165-179
    • Reilles, A.1
  • 14
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • Sandhu R.S. Lattice-based access control models. IEEE Computer 26 11 (1993) 9-19
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.