메뉴 건너뛰기




Volumn , Issue , 2007, Pages 386-393

Dynamic context-aware access control - Use of resource hierarchies to define fine-grained, adaptable authorization policies

Author keywords

Access control; Context awareness; Resource hierarchy

Indexed keywords

AUTHORIZATION POLICY; BUSINESS LOGIC; CONTEXT AWARENESS; DYNAMIC CONTEXTS; DYNAMIC POLICY ENFORCEMENT; EXPLICIT NOTATION; RESOURCE HIERARCHY; SECURITY LOGIC;

EID: 67649818507     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (1)

References (16)
  • 1
    • 84867290446 scopus 로고    scopus 로고
    • Beznosov, K. (2002). Object security attributes: Enabling application-specific access control in middleware. In 4th International Symposium on Distributed Objects and Applications (DOA), pages 693-710.
    • Beznosov, K. (2002). Object security attributes: Enabling application-specific access control in middleware. In 4th International Symposium on Distributed Objects and Applications (DOA), pages 693-710.
  • 8
    • 77953994109 scopus 로고    scopus 로고
    • Representing and Reasoning about Context in a Mobile Environment
    • Schulz, S. and Roth-Berghofer, T, editors, MRC
    • Mikalsen, M. and Kofod-Petersen, A. (2004). Representing and Reasoning about Context in a Mobile Environment. In Schulz, S. and Roth-Berghofer, T., editors, Modeling and Retrieval of Context 2004 (MRC), volume 114, pages 25-35.
    • (2004) Modeling and Retrieval of Context 2004 , vol.114 , pp. 25-35
    • Mikalsen, M.1    Kofod-Petersen, A.2
  • 9
    • 67649701263 scopus 로고    scopus 로고
    • MOSQUITO (2006). 1ST 004636 MOSQUITO Project.
    • MOSQUITO (2006). 1ST 004636 MOSQUITO Project.
  • 10
    • 67649717492 scopus 로고    scopus 로고
    • Moyer, M., Covington, M., and Ahamad, M. (2000). Generalized role-based access control for securing future applications. In 23rd National Infromation Systems Security Conference (NISSC 2000).
    • Moyer, M., Covington, M., and Ahamad, M. (2000). Generalized role-based access control for securing future applications. In 23rd National Infromation Systems Security Conference (NISSC 2000).
  • 11
    • 67649752750 scopus 로고    scopus 로고
    • OASIS (2003). extensible Access Control Markup Language (XACML) 1.1.
    • OASIS (2003). extensible Access Control Markup Language (XACML) 1.1.
  • 12
    • 67649683451 scopus 로고    scopus 로고
    • OASIS (2005). Web Service Trust Language (WS-Trust) 1.3.
    • OASIS (2005). Web Service Trust Language (WS-Trust) 1.3.
  • 13
    • 67649685158 scopus 로고    scopus 로고
    • OASIS (2006). Web Service Security: SOAP Message Security 1.1 (WS-Security 2004).
    • OASIS (2006). Web Service Security: SOAP Message Security 1.1 (WS-Security 2004).
  • 15
    • 67649736645 scopus 로고    scopus 로고
    • W3C (1999). W3C XSL transformations (XSLT) 1.0.
    • W3C (1999). W3C XSL transformations (XSLT) 1.0.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.