메뉴 건너뛰기




Volumn , Issue , 2009, Pages 158-165

Formalization and management of group obligations

Author keywords

[No Author keywords available]

Indexed keywords

POLICY LANGUAGE; POLICY SPECIFICATION; SECURITY POLICY; SECURITY RULES; SHARED RESPONSIBILITY;

EID: 71049181922     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/POLICY.2009.10     Document Type: Conference Paper
Times cited : (12)

References (16)
  • 8
    • 84893084758 scopus 로고    scopus 로고
    • A policy language for a pervasive computing environment
    • L. Kagal, T. Finin, and A. Joshi, "A policy language for a pervasive computing environment," in POLICY., 2003.
    • (2003) POLICY.
    • Kagal, L.1    Finin, T.2    Joshi, A.3
  • 9
    • 70449344125 scopus 로고    scopus 로고
    • Formal characterizations of active databases: Part ii
    • S. B. . Heidelberg, Ed., [Online]. Available
    • C. Baral, J. Lobo, and G. Trajcevski, "Formal characterizations of active databases: Part ii," in Deductive and Object-Oriented Databases, S. B. . Heidelberg, Ed., 1997. [Online]. Available: http://dx.doi.org/10.1007/3- 540-63792-3-19
    • (1997) Deductive and Object-Oriented Databases
    • Baral, C.1    Lobo, J.2    Trajcevski, G.3
  • 11
    • 47649083260 scopus 로고    scopus 로고
    • Modeling contextual security policies
    • F. Cuppens and N. Cuppens-Boulahia, "Modeling contextual security policies," Int. J. Inf. Secur., vol.7, no.4, pp. 285-305, 2008.
    • (2008) Int. J. Inf. Secur. , vol.7 , Issue.4 , pp. 285-305
    • Cuppens, F.1    Cuppens-Boulahia, N.2
  • 12
    • 84956993736 scopus 로고    scopus 로고
    • Role-based authorization constraints specification
    • G.-J. Ahn and R. Sandhu, "Role-based authorization constraints specification," ACM Trans. Inf. Syst. Secur., vol.3, no.4, pp. 207-226, 2000.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.4 , pp. 207-226
    • Ahn, G.-J.1    Sandhu, R.2
  • 13
    • 0033333334 scopus 로고    scopus 로고
    • Conflicts in policy-based distributed systems management
    • DOI 10.1109/32.824414
    • [13] E. Lupu and M. Sloman, "Conflicts in policy-based distributed systems management," IEEE Trans. Software Eng., vol.25, no.6, pp. 852-869, 1999. (Pubitemid 30583219)
    • (1999) IEEE Transactions on Software Engineering , vol.25 , Issue.6 , pp. 852-869
    • Lupu, E.C.1    Sloman, M.2
  • 14
    • 0000788149 scopus 로고    scopus 로고
    • Law-governed interaction: A coordination and control mechanism for heterogeneous distributed systems
    • N. H. Minsky and V. Ungureanu, "Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems," ACM Trans. Softw. Eng. Methodol, vol.9, pp. 273-305, 2000.
    • (2000) ACM Trans. Softw. Eng. Methodol , vol.9 , pp. 273-305
    • Minsky, N.H.1    Ungureanu, V.2
  • 15
    • 4143096953 scopus 로고    scopus 로고
    • On the role of roles: From role-based to role-sensitive access control
    • X. Ao and N. H. Minsky, "On the role of roles: from role-based to role-sensitive access control," in SACMAT, 2004.
    • (2004) SACMAT
    • Ao, X.1    Minsky, N.H.2
  • 16
    • 28144457207 scopus 로고    scopus 로고
    • Nomad: A security model with non atomic actions and deadlines
    • F. Cuppens, N. Cuppens-Boulahia, and T. Sans, "Nomad: a security model with non atomic actions and deadlines," CSFW, 2005.
    • (2005) CSFW
    • Cuppens, F.1    Cuppens-Boulahia, N.2    Sans, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.