메뉴 건너뛰기




Volumn , Issue , 2009, Pages 22-33

Analysing access control specifications

Author keywords

[No Author keywords available]

Indexed keywords

CYBER-CRIMES; INSIDER ATTACK; LOG FILE; NETWORKED SYSTEMS; ON-LINE ANALYSIS; STANDARD ACTION; TECHNICAL APPLICATIONS;

EID: 74549224566     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SADFE.2009.13     Document Type: Conference Paper
Times cited : (9)

References (16)
  • 1
    • 84868079363 scopus 로고    scopus 로고
    • Available from, December 4
    • Stein Bagger. Available from http://en.wikipedia.org/wiki/Stein-Bagger, last visited December 4, 2008.
    • (2008) Bagger, last visited
    • Bagger, S.1
  • 4
    • 34548836760 scopus 로고    scopus 로고
    • The Architecture Analysis and Design Language (AADL): An Introduction
    • Technical report, CMU/SEI
    • P. H. Feiler, D. P. Gluch, and J. J. Hudak. The Architecture Analysis and Design Language (AADL): An Introduction. Technical report, CMU/SEI, 2006.
    • (2006)
    • Feiler, P.H.1    Gluch, D.P.2    Hudak, J.J.3
  • 5
    • 74549137028 scopus 로고    scopus 로고
    • Gorla and Pugliese. Resource access and mobility control with dynamic privileges acquisition. In ICALP: Annual International Colloquium on Automata, Languages and Programming, 2003.
    • Gorla and Pugliese. Resource access and mobility control with dynamic privileges acquisition. In ICALP: Annual International Colloquium on Automata, Languages and Programming, 2003.
  • 6
    • 74549225879 scopus 로고    scopus 로고
    • Master's thesis, Informatics and Mathematical Modelling, Technical University of Denmark, DTU, Richard Petersens Plads, Building, DK-2800 Kgs. Lyngby, Supervised by Christian W. Probst, IMM, DTU
    • D. Gunnarsson. Static analysis of the insider problem. Master's thesis, Informatics and Mathematical Modelling, Technical University of Denmark, DTU, Richard Petersens Plads, Building 321, DK-2800 Kgs. Lyngby, 2007. Supervised by Christian W. Probst, IMM, DTU.
    • (2007) Static analysis of the insider problem , pp. 321
    • Gunnarsson, D.1
  • 9
    • 0017996760 scopus 로고
    • Time, clocks, and the ordering of events in a distributed system
    • July
    • L. Lamport. Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, 21(7):558-565, July 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.7 , pp. 558-565
    • Lamport, L.1
  • 11
    • 45749115403 scopus 로고    scopus 로고
    • From flow logic to static type systems for coordination languages
    • D. Lea and G. Zavattaro, editors, COORDINATION, of, Springer
    • R. D. Nicola, D. Gorla, R. R. Hansen, F. Nielson, H. R. Nielson, C. W. Probst, and R. Pugliese. From flow logic to static type systems for coordination languages. In D. Lea and G. Zavattaro, editors, COORDINATION, volume 5052 of Lecture Notes in Computer Science, pages 100-116. Springer, 2008.
    • (2008) Lecture Notes in Computer Science , vol.5052 , pp. 100-116
    • Nicola, R.D.1    Gorla, D.2    Hansen, R.R.3    Nielson, F.4    Nielson, H.R.5    Probst, C.W.6    Pugliese, R.7
  • 14
    • 38149049950 scopus 로고    scopus 로고
    • Where can an insider attack?
    • T. Dimitrakos, F. Martinelli, P. Y. A. Ryan, and S. A. Schneider, editors, Formal Aspects in Security and Trust, of, Springer
    • C. W. Probst, R. R. Hansen, and F. Nielson. Where can an insider attack? In T. Dimitrakos, F. Martinelli, P. Y. A. Ryan, and S. A. Schneider, editors, Formal Aspects in Security and Trust, volume 4691 of Lecture Notes in Computer Science, pages 127-142. Springer, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4691 , pp. 127-142
    • Probst, C.W.1    Hansen, R.R.2    Nielson, F.3
  • 15
    • 74549217567 scopus 로고    scopus 로고
    • A trader's secrets, a bank's missteps
    • February 5
    • N. D. Schwartz and K. Bennhold. A trader's secrets, a bank's missteps. New York Times, February 5, 2009.
    • (2009) New York Times
    • Schwartz, N.D.1    Bennhold, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.