메뉴 건너뛰기




Volumn 2, Issue , 2009, Pages 416-421

Policy composition based on Petri nets

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SECURITY; EXTENDED PETRI NET; GLOBAL POLICIES; HETEROGENEOUS SYSTEMS; LOCAL POLICIES; RESOURCES SHARING; SECURE INTEROPERATION; SECURITY POLICY; SECURITY PRINCIPLES;

EID: 70449673607     PISSN: 07303157     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COMPSAC.2009.169     Document Type: Conference Paper
Times cited : (5)

References (28)
  • 7
    • 85006239926 scopus 로고
    • The mobility workbench - A tool for the π- Calculus
    • Alur, R., Peled, D., eds.: Proc. 6th International Conference Computer Aided Verification (CAV'94) ., Springer
    • Victor, B., Moller, F.: The mobility workbench - a tool for the π- calculus. In Alur, R., Peled, D., eds.: Proc. 6th International Conference Computer Aided Verification (CAV'94). Volume 818 of Lecture Notes in Computer Science., Springer (1994) 428-440
    • (1994) Lecture Notes in Computer Science , vol.818 , pp. 428-440
    • Victor, B.1    Moller, F.2
  • 9
    • 84988393004 scopus 로고    scopus 로고
    • Classification of security properties (Part I: Information flow)
    • Springer
    • Focardi, R., Gorrieri, R.: Classification of Security Properties (Part I: Information Flow). Volume 2171 of Lecture Notes in Computer Science. Springer (2001
    • (2001) Lecture Notes in Computer Science , vol.2171
    • Focardi, R.1    Gorrieri, R.2
  • 11
    • 84947263112 scopus 로고
    • Automatic code generation method based on coloured petri net models applied on an access control system
    • Mortensen, K.H.: Automatic code generation method based on coloured petri net models applied on an access control system. Lecture Notes in Computer Science 1825 (2000) 367-386
    • (1825) Lecture Notes in Computer Science , vol.2000 , pp. 367-386
    • Mortensen, K.H.1
  • 18
    • 3142523600 scopus 로고    scopus 로고
    • A propositional policy algebra for access control
    • Wijesekera, D., Jajodia, S.: A propositional policy algebra for access control. ACM Trans. Inf. Syst. Secur. 6(2) (2003) 286-325
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.2 , pp. 286-325
    • Wijesekera, D.1    Jajodia, S.2
  • 19
    • 31844457357 scopus 로고    scopus 로고
    • Composing security policies with polymer
    • Bauer, L., Ligatti, J., Walker, D.: Composing security policies with polymer. In: PLDI. (2005) 305-314
    • (2005) PLDI , pp. 305-314
    • Bauer, L.1    Ligatti, J.2    Walker, D.3
  • 20
    • 34547271784 scopus 로고    scopus 로고
    • Defeasible security policy composition for web services
    • Winslett M., Gordon, A.D., Sands, D., eds.
    • Lee, A.J., Boyer, J.P., Olson, L., Gunter, C.A.: Defeasible security policy composition for web services. In Winslett, M., Gordon, A.D., Sands, D., eds.: FMSE, ACM (2006) 45-54
    • (2006) FMSE, ACM , pp. 45-54
    • Lee, A.J.1    Boyer, J.P.2    Olson, L.3    Gunter, C.A.4
  • 22
    • 57549084474 scopus 로고    scopus 로고
    • A rewriting framework for the composition of access control policies
    • Bertolissi, C., Fernndez, M.: A rewriting framework for the composition of access control policies. Proceedings of PPDP'08 (2008
    • (2008) Proceedings of PPDP'08
    • Bertolissi, C.1    Fernndez, M.2
  • 23
    • 0024645936 scopus 로고
    • Petri nets: Properties, analysis, and applications
    • Murata, T.: Petri nets: Properties, analysis, and applications. Proceedings of IEEE 77(4) (1985) 541-580
    • (1985) Proceedings of IEEE , vol.77 , Issue.4 , pp. 541-580
    • Murata, T.1
  • 24
    • 33748055425 scopus 로고    scopus 로고
    • Towards reasonability properties for access-control policy languages
    • In Ferraiolo, D.F., Ray I., eds.
    • Tschantz, M.C., Krishnamurthi, S.: Towards reasonability properties for access-control policy languages. In Ferraiolo, D.F., Ray, I., eds.: SACMAT, ACM (2006) 160-169
    • (2006) SACMAT, ACM , pp. 160-169
    • Tschantz, M.C.1    Krishnamurthi, S.2
  • 25
    • 33746684330 scopus 로고    scopus 로고
    • Term rewriting for access control
    • Barker, S., Fernández, M.: Term rewriting for access control. In: DBSec. (2006) 179-193
    • (2006) DBSec. , pp. 179-193
    • Barker, S.1    Fernández, M.2
  • 27
    • 33846167404 scopus 로고    scopus 로고
    • Deadlock avoidance petri net controller for manufacturing systems with multiple resource service
    • Xing, K.L., Jin, X.J., Feng, Y.: Deadlock avoidance petri net controller for manufacturing systems with multiple resource service. Proc. IEEE Conference on Robotics and Automation (2005) 4757-4761
    • (2005) Proc. IEEE Conference on Robotics and Automation , pp. 4757-4761
    • Xing, K.L.1    Jin, X.J.2    Feng, Y.3
  • 28
    • 70449651935 scopus 로고    scopus 로고
    • Scheduling analysis with resources share using the transitive matrix based on p-invariant
    • Lee, J.K.: Scheduling analysis with resources share using the transitive matrix based on p-invariant. Proc. 41st SICE Annual Conference 2 (2002) 1359-1364
    • (2002) Proc. 41st SICE Annual Conference , vol.2 , pp. 1359-1364
    • Lee, J.K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.