메뉴 건너뛰기




Volumn , Issue , 2009, Pages 150-157

Access control policies for semantic networks

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL MODELS; ACCESS CONTROL POLICIES; ACCESS RIGHTS; DYNAMIC GRAPH; END USERS; NEW MODEL; POLICY SPECIFICATION; ROLE-BASED ACCESS CONTROL; SEMANTIC NETWORK; SEMANTIC RELATIONSHIPS; STATIC AND DYNAMIC; USERS ACCESS; WEB-BASED TECHNOLOGIES;

EID: 71049114381     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/POLICY.2009.11     Document Type: Conference Paper
Times cited : (14)

References (19)
  • 1
    • 84869687610 scopus 로고    scopus 로고
    • http://www.w3.org/RDF/.
  • 2
    • 84869665698 scopus 로고    scopus 로고
    • http://www.w3.org/TR/rdf-sparql-query/.
  • 8
    • 34547260252 scopus 로고    scopus 로고
    • No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web
    • First European Semantic Web Symposium, ESWS 2004 Heraklion, Crete, Greece, May 10-12, 2004 Proceedings
    • [8] R. Gavriloaie, W. Nejdl, D. Olmedilla, K. Seamons, and M. Winslett. No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. Lecture Notes in Computer Science, 3053:342-356, 2004. (Pubitemid 38699485)
    • (2004) LECTURE NOTES in COMPUTER SCIENCE , Issue.3053 , pp. 342-356
    • Gavriloaie, R.1    Nejdl, W.2    Olmedilla, D.3    Seamons, K.E.4    Winslett, M.5
  • 14
    • 0033333334 scopus 로고    scopus 로고
    • Conflicts in policy-based distributed systems management
    • E. C. Lupu and M. Sloman. Conflicts in policy-based distributed systems management. IEEE Transactions on Software Engineering, 25(6):852-869, 1999.
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.6 , pp. 852-869
    • Lupu, E.C.1    Sloman, M.2
  • 19
    • 84974750564 scopus 로고
    • Authorizations in distributed systems: A new approach
    • T. Y. C. Woo and S. S. Lam. Authorizations in distributed systems: A new approach. Journal of Computer Security, 2:107-136, 1993.
    • (1993) Journal of Computer Security , vol.2 , pp. 107-136
    • Woo, T.Y.C.1    Lam, S.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.