메뉴 건너뛰기




Volumn 5429 LNCS, Issue , 2009, Pages 16-31

From formal access control policies to runtime enforcement aspects

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL POLICIES; APPLICATION SPECIFIC; ASPECT-ORIENTED; AUTOMATICALLY GENERATED; BUSINESS LOGIC; DOMAIN SPECIFIC; FORMAL SPECIFICATION AND VERIFICATION; RUNTIMES; SEPARATION OF DUTY; TEMPORAL SPECIFICATION;

EID: 70350680976     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00199-4_2     Document Type: Conference Paper
Times cited : (10)

References (23)
  • 2
    • 33646066871 scopus 로고    scopus 로고
    • Enforcing non-safety security policies with program monitors
    • de Capitani di Vimercati, S, Syverson, P.F, Gollmann, D, eds, ESORICS 2005, Springer, Heidelberg
    • Ligatti, J., Bauer, L., Walker, D.W.: Enforcing non-safety security policies with program monitors. In: de Capitani di Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 355-373. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3679 , pp. 355-373
    • Ligatti, J.1    Bauer, L.2    Walker, D.W.3
  • 3
    • 0033652039 scopus 로고    scopus 로고
    • The NIST model for Role-based Access Control: Towards a Unified Standard
    • ACM, New York
    • Sandhu, R., Ferraiolo, D., Kuhn, R.: The NIST model for Role-based Access Control: Towards a Unified Standard. In: Proc. of RBAC. ACM, New York (2000)
    • (2000) Proc. of RBAC
    • Sandhu, R.1    Ferraiolo, D.2    Kuhn, R.3
  • 7
    • 26444475843 scopus 로고    scopus 로고
    • Expressive pointcuts for increased modularity
    • Black, A.P, ed, ECOOP 2005, Springer, Heidelberg
    • Ostermann, K., Mezini, M., Bockisch, C.: Expressive pointcuts for increased modularity. In: Black, A.P. (ed.) ECOOP 2005. LNCS, vol. 3586, pp. 214-240. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3586 , pp. 214-240
    • Ostermann, K.1    Mezini, M.2    Bockisch, C.3
  • 8
    • 70350701730 scopus 로고    scopus 로고
    • Meisels, I., Saaltink, M.: The Z/EVES reference manual (v 1.5) (1997)
    • Meisels, I., Saaltink, M.: The Z/EVES reference manual (v 1.5) (1997)
  • 9
    • 33745471209 scopus 로고    scopus 로고
    • Model driven security: From UML models to access control infrastructures
    • Basin, D., Doser, J., Lodderstedt, T.: Model driven security: From UML models to access control infrastructures. ACM Trans. Softw. Eng. Methodol. 15 (2006)
    • (2006) ACM Trans. Softw. Eng. Methodol , vol.15
    • Basin, D.1    Doser, J.2    Lodderstedt, T.3
  • 10
    • 0242625198 scopus 로고    scopus 로고
    • An approach to engineer and enforce context constraints in an RBAC environment
    • ACM Press, New York
    • Neumann, G., Strembeck, M.: An approach to engineer and enforce context constraints in an RBAC environment. In: Proc. of SACMAT. ACM Press, New York (2003)
    • (2003) Proc. of SACMAT
    • Neumann, G.1    Strembeck, M.2
  • 11
    • 33748067444 scopus 로고    scopus 로고
    • A model-checking approach to analysing organisational controls in a loan origination process
    • ACM, New York
    • Schaad, A., Lotz, V., Sohr, K.: A model-checking approach to analysing organisational controls in a loan origination process. In: Proc. of SACMAT. ACM, New York (2006)
    • (2006) Proc. of SACMAT
    • Schaad, A.1    Lotz, V.2    Sohr, K.3
  • 12
    • 33646034317 scopus 로고    scopus 로고
    • Towards a formal methodology for designing multiagent applications
    • Eymann, T, Klugl, F, Lamersdorf, W, Klusch, M, Huhns, M.N, eds, MATES 2005, Springer, Heidelberg
    • Regayeg, A., Kacem, A.H., Jmaiel, M.: Towards a formal methodology for designing multiagent applications. In: Eymann, T., Klugl, F., Lamersdorf, W., Klusch, M., Huhns, M.N. (eds.) MATES 2005. LNCS, vol. 3550, pp. 153-164. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3550 , pp. 153-164
    • Regayeg, A.1    Kacem, A.H.2    Jmaiel, M.3
  • 13
    • 35248828504 scopus 로고    scopus 로고
    • Aspect-Oriented Programming
    • Aksit, M, Matsuoka, S, eds, ECOOP 1997, Springer, Heidelberg
    • Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C.V., Loingtier, J.-M., Irwin, J.: Aspect-Oriented Programming. In: Aksit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol. 1241, pp. 220-242. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1241 , pp. 220-242
    • Kiczales, G.1    Lamping, J.2    Mendhekar, A.3    Maeda, C.4    Lopes, C.V.5    Loingtier, J.-M.6    Irwin, J.7
  • 14
    • 84944399014 scopus 로고    scopus 로고
    • Specification and Classification of Role-based Authorization Policies
    • IEEE, Los Alamitos
    • Ahn, G.J.: Specification and Classification of Role-based Authorization Policies. In: Proc. of WETICE. IEEE, Los Alamitos (2003)
    • (2003) Proc. of WETICE
    • Ahn, G.J.1
  • 15
    • 37149015490 scopus 로고    scopus 로고
    • Combining formal methods and aspects for specifying and enforcing architectural invariants
    • Murphy, A.L, Vitek, J, eds, COORDINATION 2007, Springer, Heidelberg
    • Kallel, S., Charfi, A., Mezini, M., Jmaiel, M.: Combining formal methods and aspects for specifying and enforcing architectural invariants. In: Murphy, A.L., Vitek, J. (eds.) COORDINATION 2007. LNCS, vol. 4467, pp. 211-230. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4467 , pp. 211-230
    • Kallel, S.1    Charfi, A.2    Mezini, M.3    Jmaiel, M.4
  • 16
    • 63249090772 scopus 로고    scopus 로고
    • Aspect-based enforcement of formal delegation policies
    • IEEE, Los Alamitos
    • Kallel, S., Charfi, A., Mezini,M., Jmaiel,M.: Aspect-based enforcement of formal delegation policies. In: Proc. of CRISIS. IEEE, Los Alamitos (2008)
    • (2008) Proc. of CRISIS
    • Kallel, S.1    Charfi, A.2    Mezini, M.3    Jmaiel, M.4
  • 17
  • 18
    • 4143147399 scopus 로고    scopus 로고
    • Using UML to visualize role-based access control constraints
    • ACM Press, New York
    • Ray, I., Li, N., France, R., Kim, D.K.: Using UML to visualize role-based access control constraints. In: Proc. of SACMAT. ACM Press, New York (2004)
    • (2004) Proc. of SACMAT
    • Ray, I.1    Li, N.2    France, R.3    Kim, D.K.4
  • 19
  • 20
    • 0002496994 scopus 로고    scopus 로고
    • Enforcing trace properties by program transformation
    • ACM Press, New York
    • Colcombet, T., Fradet, P.: Enforcing trace properties by program transformation. In: Proc. of POPL. ACM Press, New York (2000)
    • (2000) Proc. of POPL
    • Colcombet, T.1    Fradet, P.2
  • 22
    • 33745677838 scopus 로고    scopus 로고
    • Chen, K., Lin, C.-W.: An aspect-oriented approach to declarative access control for web applications. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y. (eds.) APWeb 2006. LNCS, 3841, pp. 176-188. Springer, Heidelberg (2006).
    • Chen, K., Lin, C.-W.: An aspect-oriented approach to declarative access control for web applications. In: Zhou, X., Li, J., Shen, H.T., Kitsuregawa, M., Zhang, Y. (eds.) APWeb 2006. LNCS, vol. 3841, pp. 176-188. Springer, Heidelberg (2006).
  • 23
    • 85051690842 scopus 로고    scopus 로고
    • Implementing a modular access control service to support application-specific policies in caesarJ
    • ACM Press, New York
    • Verhanneman, T., Piessens, F., Win, B.D., et al.: Implementing a modular access control service to support application-specific policies in caesarJ. In: Proc. of AOMD. ACM Press, New York (2005)
    • (2005) Proc. of AOMD
    • Verhanneman, T.1    Piessens, F.2    Win, B.D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.