메뉴 건너뛰기




Volumn , Issue , 2008, Pages 21-28

Calculus for composite authorities' policy derivation in shared domains of pervasive computing environments

Author keywords

[No Author keywords available]

Indexed keywords

COOPERATIVE SECURITY MANAGEMENT; DEONTIC LOGIC; LOGICAL MODELS; PERVASIVE COMPUTING ENVIRONMENT; POLICY LANGUAGE; POLICY STATEMENTS; SECURITY DOMAINS; SECURITY MANAGEMENT; SECURITY MODEL; SECURITY POLICY;

EID: 66149172248     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCITECHN.2008.4803121     Document Type: Conference Paper
Times cited : (2)

References (22)
  • 1
    • 66149177770 scopus 로고    scopus 로고
    • Nov
    • MIT project Oxygenom' 2004. http://oxygen.csail.mit.edu/' Accessed in Nov 2007.
    • (2004) MIT project Oxygenom
  • 8
    • 66149190137 scopus 로고
    • Reasoning about knowledge and permission in secure distributed systems
    • Franconia' New Hampshire' USA' MITRE Corporation Press
    • J. I. Glasgow' G. H. MacEwen' and P. Panangaden. Reasoning about knowledge and permission in secure distributed systems. In First IEEE Computer Security Foundations Workshop (CSFW'88)' pages 139-146' Franconia' New Hampshire' USA' 1988. MITRE Corporation Press.
    • (1988) In First IEEE Computer Security Foundations Workshop (CSFW'88) , pp. 139-146
    • Glasgow, J.I.1    MacEwen, G.H.2    Panangaden, P.3
  • 11
    • 84872793525 scopus 로고    scopus 로고
    • and R. Au. A method for access authorisation through delegation networks
    • Hobart' Tasmania' Australia' 2006. Australian Computer Society' Inc.
    • A. Josang' D. Gollmann' and R. Au. A method for access authorisation through delegation networks. In The 2006 Australasian Workshops on Grid Computing and E-Research (ACSW Frontiers '06)' pages 165-174' Hobart' Tasmania' Australia' 2006. Australian Computer Society' Inc.
    • (2006) In The 2006 Australasian Workshops on Grid Computing and E-Research (ACSW Frontiers '06) , vol.2006 , pp. 165-174
    • Josang, A.1    Gollmann, D.2
  • 13
    • 0035577649 scopus 로고    scopus 로고
    • Trust-based security in pervasive computing environments
    • L. Kagal' T. Finin' and A. Joshi. Trust-based security in pervasive computing environments. IEEE Computer' 34(12):154-157' 2001.
    • (2001) IEEE Computer , vol.34 , Issue.12 , pp. 154-157
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 20
    • 66149175088 scopus 로고    scopus 로고
    • and L. Li. A mobile access control architecture for multiple security domains environment
    • Shanghai' P.R. China' Springer
    • Y. Tang' S. Zhang' and L. Li. A mobile access control architecture for multiple security domains environment. In the International Conference on High Performance Computing and Applications' pages 457-461' Shanghai' P.R. China' 2004. Springer.
    • (2004) In the International Conference on High Performance Computing and Applications , pp. 457-461
    • Tang, Y.1    Zhang, S.2
  • 22
    • 84974750564 scopus 로고
    • Authorizations in distributed systems: A new approach
    • T. Y. C. Woo and S. S. Lam. Authorizations in distributed systems: A new approach. Journal of Computer Security' 2(2-3):107-136' 1993.
    • (1993) Journal of Computer Security , vol.2 , Issue.2-3 , pp. 107-136
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.