메뉴 건너뛰기




Volumn , Issue , 2009, Pages 270-277

On role mappings for RBAC-based secure interoperation

Author keywords

Administration; RBAC; Role mappings; Secure interoperation

Indexed keywords

ACCESS CONTROL POLICIES; ADMINISTRATIVE COST; INTER-DOMAIN; INTEROPERATIONS; NP COMPLETE; RBAC; RBAC POLICY; ROLE-BASED ACCESS CONTROL; SECURE INTEROPERATION; SEPARATION OF DUTY; SET COVER;

EID: 72849134423     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NSS.2009.76     Document Type: Conference Paper
Times cited : (8)

References (27)
  • 1
    • 84956993736 scopus 로고    scopus 로고
    • Role-based authorization constraints specification
    • G.-J. Ahn and R. S. Sandhu. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Secur., 3(4):207-226, 2000.
    • (2000) ACM Trans. Inf. Syst. Secur , vol.3 , Issue.4 , pp. 207-226
    • Ahn, G.-J.1    Sandhu, R.S.2
  • 2
    • 0346236349 scopus 로고    scopus 로고
    • Art and Science. Addison-Wesley
    • M. Bishop. Computer Security - Art and Science. Addison-Wesley, 2003.
    • (2003) Computer Security
    • Bishop, M.1
  • 3
    • 33748060530 scopus 로고    scopus 로고
    • Constraint generation for separation of duty
    • Lake Tahoe, California, USA, Jun
    • H. Chen and N. Li. Constraint generation for separation of duty. In ACM Symposium on Access Control Models and Technologies, pages 130 - 138, Lake Tahoe, California, USA, Jun. 2006.
    • (2006) ACM Symposium on Access Control Models and Technologies , pp. 130-138
    • Chen, H.1    Li, N.2
  • 5
    • 33745801960 scopus 로고    scopus 로고
    • Understanding and developing role-based administrative models
    • Alexandria, VA, USA, Nov, CCS'05
    • J. Crampton. Understanding and developing role-based administrative models. In ACM Conference on Computer and Communications Security, pages 158 - 167, Alexandria, VA, USA, Nov. 2005. CCS'05.
    • (2005) ACM Conference on Computer and Communications Security , pp. 158-167
    • Crampton, J.1
  • 6
    • 3142510989 scopus 로고    scopus 로고
    • Administrative scope: A foundation for role-based administrative models
    • J. Crampton and G. Loizou. Administrative scope: A foundation for role-based administrative models. ACM Trans. Inf. Syst. Secur., 6(2):201-231, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.2 , pp. 201-231
    • Crampton, J.1    Loizou, G.2
  • 7
    • 33748076789 scopus 로고    scopus 로고
    • Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy
    • S. Du and J. B. D. Joshi. Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy. In SACMAT, pages 228-236, 2006.
    • (2006) SACMAT , pp. 228-236
    • Du, S.1    Joshi, J.B.D.2
  • 10
    • 38149044178 scopus 로고    scopus 로고
    • Establishing rbac-based secure interoperability in decentralized multi-domain environments
    • J. Hu, R. Li, and Z. Lu. Establishing rbac-based secure interoperability in decentralized multi-domain environments. In ICISC, pages 49-63, 2007.
    • (2007) ICISC , pp. 49-63
    • Hu, J.1    Li, R.2    Lu, Z.3
  • 11
    • 33748077108 scopus 로고    scopus 로고
    • Role-based access management for ad-hoc collaborative sharing
    • J. Jin and G.-J. Ahn. Role-based access management for ad-hoc collaborative sharing. In SACMAT, pages 200-209, 2006.
    • (2006) SACMAT , pp. 200-209
    • Jin, J.1    Ahn, G.-J.2
  • 14
    • 47249100212 scopus 로고    scopus 로고
    • A secure policy-enabled collaboration framework for virtual organizations
    • J. Li, J. Huai, and C. Hu. Peace-vo: A secure policy-enabled collaboration framework for virtual organizations. In SRDS, pages 199-208, 2007.
    • (2007) SRDS , pp. 199-208
    • Li, J.1    Huai, J.2    Peace-vo, C.H.3
  • 16
    • 33748043984 scopus 로고    scopus 로고
    • Semantic access control for information interoperation
    • C.-C. Pan, P. Mitra, and P. Liu. Semantic access control for information interoperation. In SACMAT, pages 237-246, 2006.
    • (2006) SACMAT , pp. 237-246
    • Pan, C.-C.1    Mitra, P.2    Liu, P.3
  • 17
    • 0031153122 scopus 로고    scopus 로고
    • A survey of approximately optimal solutions to some covering and packing problems
    • V. T. Paschos. A survey of approximately optimal solutions to some covering and packing problems. ACM Comput. Surv., 29(2):171-209, 1997.
    • (1997) ACM Comput. Surv , vol.29 , Issue.2 , pp. 171-209
    • Paschos, V.T.1
  • 19
    • 0001549660 scopus 로고    scopus 로고
    • The arbac97 model for role-based administration of roles
    • R. S. Sandhu, V. Bhamidipati, and Q. Munawer. The arbac97 model for role-based administration of roles. ACM Trans. Inf. Syst. Secur., 2(1):105-135, 1999.
    • (1999) ACM Trans. Inf. Syst. Secur , vol.2 , Issue.1 , pp. 105-135
    • Sandhu, R.S.1    Bhamidipati, V.2    Munawer, Q.3
  • 21
    • 28244460211 scopus 로고    scopus 로고
    • Secure interoperation in a multidomain environment employing rbac policies
    • B. Shafiq, J. Joshi, E. Bertino, and A. Ghafoor. Secure interoperation in a multidomain environment employing rbac policies. IEEE Trans. Knowl. Data Eng., 17(11):1557-1577, 2005.
    • (2005) IEEE Trans. Knowl. Data Eng , vol.17 , Issue.11 , pp. 1557-1577
    • Shafiq, B.1    Joshi, J.2    Bertino, E.3    Ghafoor, A.4
  • 24
    • 55149083788 scopus 로고    scopus 로고
    • Proactive role discovery in mediator-free environments
    • M. Shehab, E. Bertino, and A. Ghafoor. Proactive role discovery in mediator-free environments. In Peer-to-Peer Computing, pages 150-159, 2008.
    • (2008) Peer-to-Peer Computing , pp. 150-159
    • Shehab, M.1    Bertino, E.2    Ghafoor, A.3
  • 25
    • 36949011422 scopus 로고    scopus 로고
    • M. Shehab, K. Bhattacharya, and A. Ghafoor. Web services discovery in secure collaboration environments. ACM Trans. Internet Techn., 8(1), 2007.
    • M. Shehab, K. Bhattacharya, and A. Ghafoor. Web services discovery in secure collaboration environments. ACM Trans. Internet Techn., 8(1), 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.