메뉴 건너뛰기




Volumn 13, Issue 4, 2004, Pages 596-599

An approach to enforcing Clark-Wilson model in role-based access control model

Author keywords

Clark Wilson (CW) model; CW triples; Role based access control

Indexed keywords

COMPUTER SIMULATION; CONSTRAINT THEORY; DATA REDUCTION; HIERARCHICAL SYSTEMS; PROBLEM SOLVING; SECURITY SYSTEMS;

EID: 6444234162     PISSN: 10224653     EISSN: 20755597     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (4)

References (7)
  • 1
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • Oakland, CA
    • Clark D., Wilson D., "A comparison of commercial and military computer security policies", 1987 IEEE Symposium on Security and Privacy, Oakland, CA, pp.184-194, 1987.
    • (1987) 1987 IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.1    Wilson, D.2
  • 3
    • 6444239031 scopus 로고
    • Jajodia S. and Landwehr C.E., editors, Database Se curity, IV: Status and Prospects, North-Holland
    • Thomsen D.J., Role-based Application Design and Enforcement, In Jajodia S. and Landwehr C.E., editors, Database Se curity, IV: Status and Prospects, North-Holland, pp.151-168, 1990.
    • (1990) Role-based Application Design and Enforcement , pp. 151-168
    • Thomsen, D.J.1
  • 4
    • 85084164092 scopus 로고    scopus 로고
    • Enforcing well-formed and partially-formed transactions for UNIX
    • USENIX Association, Aug.
    • Povey D., "Enforcing well-formed and partially-formed transactions for UNIX", In Proceedings of the 8th USENIX Security Symposium, USENIX Association, Aug. 1999.
    • (1999) Proceedings of the 8th USENIX Security Symposium
    • Povey, D.1
  • 5
    • 0023859517 scopus 로고
    • Using mandatory integrity to enforce "commercial" security
    • Oakland, CA
    • Lee T., "Using mandatory integrity to enforce "commercial" security", 1988 IEEE Symposium on Security and Privacy, Oakland, CA, pp.140-146, 1988.
    • (1988) 1988 IEEE Symposium on Security and Privacy , pp. 140-146
    • Lee, T.1
  • 6
    • 6444224063 scopus 로고
    • Implementing the Clark/Wilson integrity policy using current technology
    • Gaithersburg, MD
    • Schockley W., "Implementing the Clark/Wilson integrity policy using current technology" In Proceedings of the 11th National Computer Security Conference, Gaithersburg, MD, pp.29-37, 1988.
    • (1988) Proceedings of the 11th National Computer Security Conference , pp. 29-37
    • Schockley, W.1
  • 7
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • S. Osborn, R. Sandhu, Q. Munawer, "Configuring role-based access control to enforce mandatory and discretionary access control policies" ACM Transactions on Information and System, Vol.2, No.5, pp.85-106, 2000.
    • (2000) ACM Transactions on Information and System , vol.2 , Issue.5 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.