메뉴 건너뛰기




Volumn , Issue , 2009, Pages 45-52

Apply measurable risk to strengthen security of a role-based delegation supporting workflow system

Author keywords

[No Author keywords available]

Indexed keywords

DECISION MODULES; DECISION POLICY; PROTECTION MECHANISMS; RISK MITIGATION; ROLE-BASED DELEGATION; SYSTEM SECURITY; WORK-FLOW SYSTEMS;

EID: 71049122450     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/POLICY.2009.26     Document Type: Conference Paper
Times cited : (14)

References (16)
  • 2
    • 33845437573 scopus 로고    scopus 로고
    • Horizontal integration: Broader access models for realizing information dominance
    • JASON, , Tech. Rep. JSR-04-132
    • JASON, "Horizontal integration: Broader access models for realizing information dominance," MITRE Corporation, http://www.fas.org/irp/agency/ dod/jason/classpol.pdf, Tech. Rep. JSR-04-132, 2004.
    • (2004) MITRE Corporation
  • 4
    • 3042684910 scopus 로고    scopus 로고
    • A rule-based framework for role-based delegation and revocation
    • September
    • L. Zhang, G.-J. Ahn, and B.-T. Chu, "A rule-based framework for role-based delegation and revocation," ACM Transaction on Information and System Security, vol.6, no.3, pp. 404-441, September 2003.
    • (2003) ACM Transaction on Information and System Security , vol.6 , Issue.3 , pp. 404-441
    • Zhang, L.1    Ahn, G.-J.2    Chu, B.-T.3
  • 9
    • 0029718539 scopus 로고    scopus 로고
    • Risk analysis modelling with the use of fuzzy logic
    • DOI 10.1016/0167-4048(96)00008-9
    • [9] W. Ru and J. Eloff, "Risk analysis modelling with the use of fuzzy logic," Computers & Security, vol.15, no.3, pp. 239-248, 1996. (Pubitemid 126351696)
    • (1996) Computers and Security , vol.15 , Issue.3 , pp. 239-248
    • De Ru, W.G.1    Eloff, J.H.P.2
  • 10
    • 27644580886 scopus 로고    scopus 로고
    • Using bayesian networks to model expected and unexpected operational losses
    • M. Neil, N. Fenton, and M. Tailor, "Using bayesian networks to model expected and unexpected operational losses," Risk Analysis, vol.25, no.4, pp. 963-972, 2005.
    • (2005) Risk Analysis , vol.25 , Issue.4 , pp. 963-972
    • Neil, M.1    Fenton, N.2    Tailor, M.3
  • 11
    • 33747074188 scopus 로고
    • An overview of workflow management: From process modeling to workflow automation infrastructure
    • D. Georgakopoulos, M. Hornick, and A. Sheth, "An overview of workflow management: From process modeling to workflow automation infrastructure," Distributed and Parallel Databases, vol.3, no.2, pp. 119-153, 1995.
    • (1995) Distributed and Parallel Databases , vol.3 , Issue.2 , pp. 119-153
    • Georgakopoulos, D.1    Hornick, M.2    Sheth, A.3
  • 12
    • 69649097286 scopus 로고    scopus 로고
    • Answers to questions about fuzzy logic and fuzzy expert systems
    • Carnegie Mellon University
    • M. Kantrowitz, "Answers to questions about fuzzy logic and fuzzy expert systems," Carnegie Mellon University, http://www.cs.cmu.edu/Groups/ AI/html/faqs/ai/fuzzy/, Tech. Rep., 1997.
    • (1997) Tech. Rep.
    • Kantrowitz, M.1
  • 14
    • 34548775488 scopus 로고    scopus 로고
    • Fuzzy multilevel security: An experiment on quantified risk.adaptive access control
    • Tech. Rep.
    • P.-C. Cheng, P. Rohatgi, and C. Keser, "Fuzzy multilevel security: An experiment on quantified risk.adaptive access control," IBM Thomas J. Watson Research Center, http://domino.research.ibm.com/comm/research-projects. nsf/pages/system-s-security.index.html/SFILE/ATTH4YZ5.pdf, Tech. Rep., 2007.
    • (2007) IBM Thomas J. Watson Research Center
    • Cheng, P.-C.1    Rohatgi, P.2    Keser, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.