메뉴 건너뛰기




Volumn , Issue , 2008, Pages 381-390

EON: Modeling and analyzing dynamic access control systems with logic programs

Author keywords

Automatic verification; Dynamic access control; Logic programming

Indexed keywords

AUTOMATIC VERIFICATION; DATALOG; DYNAMIC ACCESS CONTROL; EFFICIENT QUERY EVALUATION; INFORMATION FLOWS; LOGIC PROGRAMS; OPERATING SYSTEMS; PROGRAMMING LANGUAGE; QUERY EVALUATION; RUNTIMES; SATISFIABILITY; SECURITY LABEL; WINDOWS VISTA;

EID: 70349289357     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1455770.1455818     Document Type: Conference Paper
Times cited : (21)

References (21)
  • 3
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations and model
    • Technical Report M74-244, MITRE Corp
    • D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, MITRE Corp., 1975.
    • (1975)
    • Bell, D.E.1    LaPadula, L.J.2
  • 4
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • Technical Report TR-3 153, MITRE Corp
    • K. J. Biba. Integrity considerations for secure computer systems. Technical Report TR-3 153, MITRE Corp., 1977.
    • (1977)
    • Biba, K.J.1
  • 5
    • 0034822279 scopus 로고    scopus 로고
    • An efficient cryptographic protocol verifier based on prolog rules
    • IEEE
    • B. Blanchet. An efficient cryptographic protocol verifier based on prolog rules. In CSFW'01: Computer Security Foundations Workshop, page 82. IEEE, 2001.
    • (2001) CSFW'01: Computer Security Foundations Workshop , pp. 82
    • Blanchet, B.1
  • 7
    • 70349270234 scopus 로고    scopus 로고
    • A. Chaudhuri, P. Naldurg, S. Rajamani, G. Ramalingam, and L. Velaga. EON: Modeling and analyzing dynamic access control systems with logic programs. Technical Report MSR-TR-2008-21, Microsoft Research, 2008. See http: //www.soe.ucsc.edu/̃avik/projects/EON/.
    • A. Chaudhuri, P. Naldurg, S. Rajamani, G. Ramalingam, and L. Velaga. EON: Modeling and analyzing dynamic access control systems with logic programs. Technical Report MSR-TR-2008-21, Microsoft Research, 2008. See http: //www.soe.ucsc.edu/̃avik/projects/EON/.
  • 8
    • 77954397557 scopus 로고    scopus 로고
    • Analysis of the windows vista security model
    • Available at
    • M. Conover. Analysis of the windows vista security model. Symantec Report. Available at www.symantec.com/avcenter/reference/Windows-Vista-Security- Model-Analysis.pdf.
    • Symantec Report
    • Conover, M.1
  • 9
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning, A lattice model of secure information flow. Communications of the ACM, 19(5):236-243, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 15
    • 2942630487 scopus 로고    scopus 로고
    • The inevitability of failure: The flawed assumption of security in modern computing environments
    • Technical report, NSA, 1995
    • P. Loscocco, S. Smalley, P. Muckelbauer, R. Taylor, J. Turner, and J. Farrell. The inevitability of failure: The flawed assumption of security in modern computing environments. Technical report, NSA, 1995.
    • Loscocco, P.1    Smalley, S.2    Muckelbauer, P.3    Taylor, R.4    Turner, J.5    Farrell, J.6
  • 17
    • 0030147450 scopus 로고    scopus 로고
    • On temporal deductive databases
    • M. A. Orgun. On temporal deductive databases. Computational Intelligence, 12:235-259, 1996.
    • (1996) Computational Intelligence , vol.12 , pp. 235-259
    • Orgun, M.A.1
  • 20
    • 85040876695 scopus 로고    scopus 로고
    • J. D. Ullman. Principles of Database and Knowledge-base Systems, II: The New Technologies. Computer Science Press, New York, 1989.
    • J. D. Ullman. Principles of Database and Knowledge-base Systems, Volume II: The New Technologies. Computer Science Press, New York, 1989.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.