메뉴 건너뛰기




Volumn , Issue , 2007, Pages 71-80

Weaving rewrite-based access control policies

Author keywords

Access control; Aspect oriented programming; Execution monitoring; Strategic rewriting; Term rewriting

Indexed keywords

ACCESS CONTROL POLICIES; ASPECT-ORIENTED PROGRAMMING; DYNAMIC ACCESS CONTROL; DYNAMIC POLICY; EXECUTION MONITORING; FORMAL PROPERTIES; HIGH LEVEL DESCRIPTION; LARGE SYSTEM; REFERENCE MONITORS; SECURITY GOALS; SYSTEMATIC METHODOLOGY; SYSTEMATIC PROCESS; TERM REWRITING; TERM REWRITING SYSTEMS; TEST CASE;

EID: 62849128528     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1314436.1314446     Document Type: Conference Paper
Times cited : (17)

References (28)
  • 3
    • 33746070058 scopus 로고    scopus 로고
    • Formal islands
    • M. Johnson and V. Vene, editors, of Lecture Notes in Computer Science, Springer-Verlag, July
    • E. Balland, C. Kirchner, and P.-E. Moreau. Formal Islands. In M. Johnson and V. Vene, editors, AMAST, Kuressaare (Estonia), volume 4019 of Lecture Notes in Computer Science, pages 51-65. Springer-Verlag, July 2006.
    • (2006) AMAST, Kuressaare (Estonia) , vol.4019 , pp. 51-65
    • Balland, E.1    Kirchner, C.2    Moreau, P.-E.3
  • 4
    • 84859750621 scopus 로고    scopus 로고
    • Optimizing pattern matching compilation by program transformation
    • J.-M. Favre, R. Heckel, and T. Mens, editors, Electronic Communications of EASST, To appear
    • E. Balland and P.-E. Moreau. Optimizing pattern matching compilation by program transformation. In J.-M. Favre, R. Heckel, and T. Mens, editors, 3rd Workshop on Software Evolution through Transformations (SeTra'06). Electronic Communications of EASST, 2006. To appear.
    • (2006) 3rd Workshop on Software Evolution Through Transformations (SeTra'06)
    • Balland, E.1    Moreau, P.-E.2
  • 5
    • 33746684330 scopus 로고    scopus 로고
    • Term rewriting for access control
    • E. Damiani and P. Liu, editors, of Lecture Notes in Computer Science, Springer
    • S. Barker and M. Fernández. Term rewriting for access control. In E. Damiani and P. Liu, editors, DBSec, volume 4127 of Lecture Notes in Computer Science, pages 179-193. Springer, 2006.
    • (2006) DBSec , vol.4127 , pp. 179-193
    • Barker, S.1    Fernández, M.2
  • 8
    • 33750959395 scopus 로고    scopus 로고
    • Availability enforcement by obligations and aspects identification
    • IEEE Computer Society
    • F. Cuppens, N. Cuppens-Boulahia, and T. Ramard. Availability enforcement by obligations and aspects identification. In ARES, pages 229-239. IEEE Computer Society, 2006.
    • (2006) ARES , pp. 229-239
    • Cuppens, F.1    Cuppens-Boulahia, N.2    Ramard, T.3
  • 9
    • 24644431553 scopus 로고    scopus 로고
    • Policies, models, and languages for access control
    • S. Bhalla, editor, of Lecture Notes in Computer Science, Springer
    • S. D. C. di Vimercati, P. Samarati, and S. Jajodia. Policies, models, and languages for access control. In S. Bhalla, editor, DNIS, volume 3433 of Lecture Notes in Computer Science, pages 225-237. Springer, 2005.
    • (2005) DNIS , vol.3433 , pp. 225-237
    • Di Vimercati, S.D.C.1    Samarati, P.2    Jajodia, S.3
  • 10
    • 33749558954 scopus 로고    scopus 로고
    • Specifying and reasoning about dynamic access-control policies
    • U. Furbach and N. Shankar, editors, of Lecture Notes in Computer Science, Springer
    • D. J. Dougherty, K. Fisler, and S. Krishnamurthi. Specifying and reasoning about dynamic access-control policies. In U. Furbach and N. Shankar, editors, IJCAR, volume 4130 of Lecture Notes in Computer Science, pages 632-646. Springer, 2006.
    • (2006) IJCAR , vol.4130 , pp. 632-646
    • Dougherty, D.J.1    Fisler, K.2    Krishnamurthi, S.3
  • 11
    • 38049036409 scopus 로고    scopus 로고
    • Modular access control via strategic rewriting
    • of Lecture Notes in Computer Science, Springer
    • D. J. Dougherty, C. Kirchner, H. Kirchner, and A. Santana de Oliveira. Modular access control via strategic rewriting. ESORICS, volume 4734 of Lecture Notes in Computer Science, pages 578-593. Springer, 2007.
    • (2007) ESORICS , vol.4734 , pp. 578-593
    • Dougherty, D.J.1    Kirchner, C.2    Kirchner, H.3    De Oliveira, A.S.4
  • 14
    • 35048887144 scopus 로고    scopus 로고
    • Automated termination proofs with AProVE
    • V. van Oostrom, editor, of Lecture Notes in Computer Science, Springer
    • J. Giesl, R. Thiemann, P. Schneider-Kamp, and S. Falke. Automated termination proofs with AProVE. In V. van Oostrom, editor, RTA, volume 3091 of Lecture Notes in Computer Science, pages 210-220. Springer, 2004.
    • (2004) RTA , vol.3091 , pp. 210-220
    • Giesl, J.1    Thiemann, R.2    Schneider-Kamp, P.3    Falke, S.4
  • 18
    • 82955230066 scopus 로고    scopus 로고
    • An overview of aspectj
    • J. L. Knudsen, editor, of Lecture Notes in Computer Science, Springer
    • G. Kiczales, E. Hilsdale, J. Hugunin, M. Kersten, J. Palm, and W. G. Griswold. An overview of aspectj. In J. L. Knudsen, editor, ECOOP, volume 2072 of Lecture Notes in Computer Science, pages 327-353. Springer, 2001.
    • (2001) ECOOP , vol.2072 , pp. 327-353
    • Kiczales, G.1    Hilsdale, E.2    Hugunin, J.3    Kersten, M.4    Palm, J.5    Griswold, W.G.6
  • 20
    • 33746051723 scopus 로고    scopus 로고
    • Formal validation of pattern matching code
    • P. Barahona and A. P. Felty, editors, ACM
    • C. Kirchner, P.-E. Moreau, and A. Reilles. Formal validation of pattern matching code. In P. Barahona and A. P. Felty, editors, PPDP, pages 187-197. ACM, 2005.
    • (2005) PPDP , pp. 187-197
    • Kirchner, C.1    Moreau, P.-E.2    Reilles, A.3
  • 22
    • 33646066871 scopus 로고    scopus 로고
    • Enforcing non-safety security policies with program monitors
    • S. D. C. di Vimercati, P. F. Syverson, and D. Gollmann, editors, of Lecture Notes in Computer Science, Springer
    • J. Ligatti, L. Bauer, and D. Walker. Enforcing non-safety security policies with program monitors. In S. D. C. di Vimercati, P. F. Syverson, and D. Gollmann, editors, ESORICS, volume 3679 of Lecture Notes in Computer Science, pages 355-373. Springer, 2005.
    • (2005) ESORICS , vol.3679 , pp. 355-373
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 27
  • 28
    • 30644467106 scopus 로고    scopus 로고
    • Verifiable composition of access control and application features
    • E. Ferrari and G.-J. Ahn, editors, ACM
    • E. Song, R. Reddy, R. B. France, I. Ray, G. Georg, and R. Alexander. Verifiable composition of access control and application features. In E. Ferrari and G.-J. Ahn, editors, SACMAT, pages 120-129. ACM, 2005.
    • (2005) SACMAT , pp. 120-129
    • Song, E.1    Reddy, R.2    France, R.B.3    Ray, I.4    Georg, G.5    Alexander, R.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.