메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1-8

An algebraic-functional framework for distributed access control

Author keywords

[No Author keywords available]

Indexed keywords

INTERNET; MODEL CHECKING; SECURITY SYSTEMS;

EID: 63249099981     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CRISIS.2008.4757458     Document Type: Conference Paper
Times cited : (5)

References (41)
  • 1
    • 0027667638 scopus 로고
    • A calculus for access control in distributed systems
    • M. Abadi, M. Burrows, B. Lampson and G. Plotkin. A calculus for access control in distributed systems. ACM TOPLAS, 15(4):706-734, 1993.
    • (1993) ACM TOPLAS , vol.15 , Issue.4 , pp. 706-734
    • Abadi, M.1    Burrows, M.2    Lampson, B.3    Plotkin, G.4
  • 2
    • 3042601656 scopus 로고    scopus 로고
    • Protocol analysis in intrusion detection using decision tree
    • T. Abbes, A. Bouhoula, and M. Rusinowitch. Protocol analysis in intrusion detection using decision tree. In Proc. ITCC'04, pages 404- 408, 2004.
    • (2004) Proc. ITCC'04 , pp. 404-408
    • Abbes, T.1    Bouhoula, A.2    Rusinowitch, M.3
  • 3
    • 0037999031 scopus 로고    scopus 로고
    • A unified security mechanism for networked applications
    • J. Abendroth and C. Jensen. A unified security mechanism for networked applications. In SAC'03, pages 351-357, 2003.
    • (2003) SAC'03 , pp. 351-357
    • Abendroth, J.1    Jensen, C.2
  • 5
    • 84865788031 scopus 로고    scopus 로고
    • A model of OASIS RBAC and its support for active security
    • J. Bacon, K. Moody, and W. Yao. A model of OASIS RBAC and its support for active security. TISSEC, 5(4):492-540, 2002.
    • (2002) TISSEC , vol.5 , Issue.4 , pp. 492-540
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 6
    • 0011111917 scopus 로고    scopus 로고
    • Normalization results for typeable rewrite systems
    • S. van Bakel and M. Fernández. Normalization results for typeable rewrite systems. Inf. and Comp., 133(2):73-116, 1997.
    • (1997) Inf. and Comp , vol.133 , Issue.2 , pp. 73-116
    • van Bakel, S.1    Fernández, M.2
  • 7
    • 19244381332 scopus 로고
    • Logic programming and knowledge representation
    • C. Baral and M. Gelfond. Logic programming and knowledge representation. JLP, 19/20:73-148, 1994.
    • (1994) JLP , vol.19-20 , pp. 73-148
    • Baral, C.1    Gelfond, M.2
  • 8
    • 0030408303 scopus 로고    scopus 로고
    • Intersection type assignment systems with higher-order algebraic rewriting
    • F. Barbanera and M. Fernández. Intersection type assignment systems with higher-order algebraic rewriting. TCS, 170:173-207, 1996.
    • (1996) TCS , vol.170 , pp. 173-207
    • Barbanera, F.1    Fernández, M.2
  • 10
    • 33746684330 scopus 로고    scopus 로고
    • Term rewriting for access control
    • Proc. of DBSec'06, of, Springer
    • S. Barker and M. Fernández. Term rewriting for access control. In Proc. of DBSec'06, volume 4127 of LNCS, pages 179-193. Springer, 2006.
    • (2006) LNCS , vol.4127 , pp. 179-193
    • Barker, S.1    Fernández, M.2
  • 11
    • 3042584122 scopus 로고    scopus 로고
    • Flexible access control policy specification with constraint logic programming
    • S. Barker and P. Stuckey. Flexible access control policy specification with constraint logic programming. ACM Trans. Inf. Syst. Secur., 6(4):501-546, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.4 , pp. 501-546
    • Barker, S.1    Stuckey, P.2
  • 12
    • 34548031162 scopus 로고    scopus 로고
    • Action-status access control
    • ACM
    • S. Barker. Action-status access control. In Proceedings of SACMAT'07, pages 195-204. ACM, 2007.
    • (2007) Proceedings of SACMAT'07 , pp. 195-204
    • Barker, S.1
  • 13
    • 33746720635 scopus 로고    scopus 로고
    • Jakarta: A toolset to reason about the JavaCard platform
    • Proc. of e-SMART'01, of, Springer-Verlag
    • G. Barthe, G. Dufay, M. Huisman, and S. Melo de Sousa. Jakarta: a toolset to reason about the JavaCard platform. In Proc. of e-SMART'01, volume 2140 of LNCS. Springer-Verlag, 2002.
    • (2002) LNCS , vol.2140
    • Barthe, G.1    Dufay, G.2    Huisman, M.3    Melo de Sousa, S.4
  • 14
    • 35048879241 scopus 로고    scopus 로고
    • Design and semantics of a decentralized authorization language
    • IEEE Comp. Society
    • M. Y. Becker C. Fournet and A. D. Gordon. Design and semantics of a decentralized authorization language. In Proc. of CSF'07, pages 3-15, IEEE Comp. Society, 2007.
    • (2007) Proc. of CSF'07 , pp. 3-15
    • Becker, M.Y.1    Fournet, C.2    Gordon, A.D.3
  • 15
    • 11244331795 scopus 로고    scopus 로고
    • Cassandra: Distributed access control policies with tunable expressiveness
    • M. Becker and P. Sewell. Cassandra: Distributed access control policies with tunable expressiveness. In POLICY 2004, pages 159-168, 2004.
    • (2004) POLICY 2004 , pp. 159-168
    • Becker, M.1    Sewell, P.2
  • 17
    • 57549084474 scopus 로고    scopus 로고
    • A Rewriting Framework for the Composition of Access Control Policies
    • ACM Press
    • C. Bertolissi and M. Fernández. A Rewriting Framework for the Composition of Access Control Policies. In Proc. of PPDP 2008, ACM Press.
    • Proc. of PPDP 2008
    • Bertolissi, C.1    Fernández, M.2
  • 18
    • 37849037811 scopus 로고    scopus 로고
    • Dynamic event-based access control as term rewriting
    • Proc. of DBSEC'07, of, Springer-Verlag
    • C. Bertolissi, M. Fernández, and S. Barker. Dynamic event-based access control as term rewriting. In Proc. of DBSEC'07), volume 4602 of LNCS. Springer-Verlag, 2007.
    • (2007) LNCS , vol.4602
    • Bertolissi, C.1    Fernández, M.2    Barker, S.3
  • 19
    • 3042982103 scopus 로고
    • Polymorphic rewriting conserves algebraic confluence
    • V. Breazu-Tannen and Jean Gallier. Polymorphic rewriting conserves algebraic confluence. Information and Computation, 82:3-28, 1992.
    • (1992) Information and Computation , vol.82 , pp. 3-28
    • Breazu-Tannen, V.1    Gallier, J.2
  • 21
    • 84867167943 scopus 로고    scopus 로고
    • J. DeTreville. Binder, a logic-based security language. In Proc. IEEE Symposium on Security and Privacy, pages 105-113, 2002.
    • J. DeTreville. Binder, a logic-based security language. In Proc. IEEE Symposium on Security and Privacy, pages 105-113, 2002.
  • 22
    • 33749558954 scopus 로고    scopus 로고
    • Specifying and reasoning about dynamic access-control policies
    • Proc. of IJCAR'06, of, Springer
    • D. J. Dougherty, K. Fisler and S. Krishnamurthi. Specifying and reasoning about dynamic access-control policies. In Proc. of IJCAR'06, volume 4130 of LNCS, pages 632-646. Springer, 2006.
    • (2006) LNCS , vol.4130 , pp. 632-646
    • Dougherty, D.J.1    Fisler, K.2    Krishnamurthi, S.3
  • 23
    • 38049036409 scopus 로고    scopus 로고
    • Modular Access Control via Strategic Rewriting
    • Proc. of ES- ORICS'07
    • D. J. Dougherty, C. Kirchner, H. Kirchner, and A. Santana de Oliveira. Modular Access Control via Strategic Rewriting. In Proc. of ES- ORICS'07, LNCS, pages 578-593, 2007.
    • (2007) LNCS , pp. 578-593
    • Dougherty, D.J.1    Kirchner, C.2    Kirchner, H.3    Santana de Oliveira, A.4
  • 24
    • 0346024763 scopus 로고
    • Adding algebraic rewriting to the untyped lambda calculus
    • Proc. of RTA'91
    • D. J. Dougherty. Adding algebraic rewriting to the untyped lambda calculus. In Proc. of RTA'91, LNCS 488, 1991.
    • (1991) LNCS , vol.488
    • Dougherty, D.J.1
  • 25
    • 33746103319 scopus 로고    scopus 로고
    • Security policy in a declarative style
    • ACM Press
    • R. Echahed and F. Prost. Security policy in a declarative style. In Proc. of PPDP'05. ACM Press, 2005.
    • (2005) Proc. of PPDP'05
    • Echahed, R.1    Prost, F.2
  • 26
    • 84947939145 scopus 로고
    • Modular termination of term rewriting systems revisited
    • Proc. of ADT'94, number in
    • M. Fernández and J.-P. Jouannaud. Modular termination of term rewriting systems revisited. In Proc. of ADT'94, number 906 in LNCS, 1995.
    • (1995) LNCS , vol.906
    • Fernández, M.1    Jouannaud, J.-P.2
  • 27
    • 63249121003 scopus 로고    scopus 로고
    • P. Hudak, J. Peterson, and J. Fasel. A gentle introduction to Haskell 98. http://www.haskell.org/tutorial, 1999.
    • P. Hudak, J. Peterson, and J. Fasel. A gentle introduction to Haskell 98. http://www.haskell.org/tutorial, 1999.
  • 28
    • 0001619596 scopus 로고    scopus 로고
    • Flexible support for multiple access control policies
    • S. Jajodia, P. Samarati, M. Sapino, and V.S. Subrahmaninan. Flexible support for multiple access control policies. ACM TODS, 26(2):214-260, 2001.
    • (2001) ACM TODS , vol.26 , Issue.2 , pp. 214-260
    • Jajodia, S.1    Samarati, P.2    Sapino, M.3    Subrahmaninan, V.S.4
  • 29
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A trust management system with certified evaluation
    • T. Jim. SD3: A trust management system with certified evaluation. In IEEE Symp. Security and Privacy, pages 106-115, 2001.
    • (2001) IEEE Symp. Security and Privacy , pp. 106-115
    • Jim, T.1
  • 30
    • 0026190438 scopus 로고
    • Executable higher-order algebraic specification languages
    • IEEE Computer Society Press
    • J.-P. Jouannaud and M. Okada. Executable higher-order algebraic specification languages. In Proc, of LICS'91, pages 350-361. IEEE Computer Society Press, 1991.
    • (1991) Proc, of LICS'91 , pp. 350-361
    • Jouannaud, J.-P.1    Okada, M.2
  • 31
    • 84893084758 scopus 로고    scopus 로고
    • A policy language for pervasive computing environment
    • L. Kagal, T. Finin, and A. Johshi. A policy language for pervasive computing environment. In POLICY'03, pages 63-78, 2003.
    • (2003) POLICY'03 , pp. 63-78
    • Kagal, L.1    Finin, T.2    Johshi, A.3
  • 32
    • 0027910814 scopus 로고
    • Combinatory reduction systems, introduction and survey
    • J.-W. Klop, V. van Oostrom, and F. van Raamsdonk. Combinatory reduction systems, introduction and survey. TCS, 121:279-308, 1993.
    • (1993) TCS , vol.121 , pp. 279-308
    • Klop, J.-W.1    van Oostrom, V.2    van Raamsdonk, F.3
  • 34
    • 0031071781 scopus 로고    scopus 로고
    • The definition of Extended ML: A gentle introduction
    • D. Sannella S. Kahrs and A. Tarlecki. The definition of Extended ML: A gentle introduction. TCS, 173(2):445-484, 1997.
    • (1997) TCS , vol.173 , Issue.2 , pp. 445-484
    • Sannella, D.1    Kahrs, S.2    Tarlecki, A.3
  • 36
    • 34250823438 scopus 로고    scopus 로고
    • Rewriting-based access control policies
    • ENTCS, Elsevier
    • A. Santana de Oliveira. Rewriting-based access control policies. In Proc. of SECRET'06, ENTCS, Elsevier, 2007.
    • (2007) Proc. of SECRET'06
    • Santana de Oliveira, A.1
  • 39
    • 35048902599 scopus 로고    scopus 로고
    • KAoS semantic policy and domain services
    • A. Uszok, M. Bradshaw, and R. Jeffers. KAoS semantic policy and domain services. In iTrust'04, pages 16-26, 2004.
    • (2004) iTrust'04 , pp. 16-26
    • Uszok, A.1    Bradshaw, M.2    Jeffers, R.3
  • 40
    • 0037673317 scopus 로고    scopus 로고
    • Policy algebras for access control the predicate case
    • ACM Press, IEEE
    • D. Wijesekera and S. Jajodia. Policy algebras for access control the predicate case. In Proc, of CCS'02, ACM Press, pages 171-180, 2002. IEEE.
    • (2002) Proc, of CCS'02 , pp. 171-180
    • Wijesekera, D.1    Jajodia, S.2
  • 41
    • 63249089558 scopus 로고    scopus 로고
    • The XSB System, Version 3.1. A Logic Programming and Deductive Database system
    • The XSB System, Version 3.1. A Logic Programming and Deductive Database system. http://xsb.sourceforge.net/


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.