메뉴 건너뛰기




Volumn 12, Issue 4, 2009, Pages

Resiliency policies in access control

Author keywords

Access control; Fault tolerant; Policy design

Indexed keywords

COMPLEXITY CLASS; CONSISTENCY PROBLEMS; CRITICAL TASKS; DISJOINT SETS; EMERGENCY SITUATION; FAULT-TOLERANT; LINEAR TIME; NP-HARD; POLICY DESIGN; POLYNOMIAL HIERARCHIES; SEPARATION OF DUTY; STATIC SEPARATION OF DUTY;

EID: 76849085284     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1513601.1513602     Document Type: Article
Times cited : (27)

References (27)
  • 1
    • 84956993736 scopus 로고    scopus 로고
    • Role-based authorization constraints specification
    • AHN, G.-J. AND SANDHU, R. S. 2000. Role-based authorization constraints specification. ACM Trans. Inf. Syst. Sec. 3, 4, 207-226.
    • (2000) ACM Trans. Inf. Syst. Sec. , vol.3 , Issue.4 , pp. 207-226
    • Ahn, G.-J.1    Sandhu, R.S.2
  • 4
    • 0010916383 scopus 로고    scopus 로고
    • Satisfiability problem: Theory and applications
    • DU, D., GU, J., AND PARDALOS, P. M., Eds., AMS Press
    • DU, D., GU, J., AND PARDALOS, P. M., Eds. 1997. Satisfiability problem: Theory and applications. In DIMACS Series in Discrete Mathematics and Theoretical Computer Science, 35. AMS Press.
    • (1997) DIMACS Series in Discrete Mathematics and Theoretical Computer Science , vol.35
  • 8
    • 0016984825 scopus 로고
    • Protection in operating systems
    • HARRISON, M. A., RUZZO, W. L., AND ULLMAN, J. D. 1976. Protection in operating systems. Comm. ACM 19, 8, 461-471.
    • (1976) Comm. ACM , vol.19 , Issue.8 , pp. 461-471
    • Harrison, M.A.1    Ruzzo, W.L.2    Ullman, J.D.3
  • 9
    • 85006937063 scopus 로고    scopus 로고
    • Practical safety in flexible access control models
    • JAEGER, T. AND TIDSWELL, J. E. 2001. Practical safety in flexible access control models. ACM Trans. Inf. Syst. Sec. 4, 2, 158-190.
    • (2001) ACM Trans. Inf. Syst. Sec. , vol.4 , Issue.2 , pp. 158-190
    • Jaeger, T.1    Tidswell, J.E.2
  • 15
    • 30544438141 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Security analysis in trust management
    • LI, N., MITCHELL, J. C., AND WINSBOROUGH, W. H. 2005. Beyond proof-of-compliance: Security analysis in trust management. J. ACM 52, 3, 474-514.
    • (2005) J. ACM , vol.52 , Issue.3 , pp. 474-514
    • Li, N.1    Mitchell, J.C.2    Winsborough, W.H.3
  • 17
    • 0017512599 scopus 로고
    • A linear time algorithm for deciding subject security
    • LIPTON, R. J. AND SNYDER, L. 1977. A linear time algorithm for deciding subject security. J. ACM 24, 3, 455-464.
    • (1977) J. ACM , vol.24 , Issue.3 , pp. 455-464
    • Lipton, R.J.1    Snyder, L.2
  • 20
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • SALTZER, J. H. AND SCHROEDER,M. D. 1975. The protection of information in computer systems. Proc. IEEE 63, 9, 1278-1308.
    • (1975) Proc. IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 22
    • 0023999796 scopus 로고
    • The schematic protection model: Its definition and analysis for acyclic attenuating systems
    • SANDHU, R. S. 1988a. The schematic protection model: Its definition and analysis for acyclic attenuating systems. J. ACM 35, 2, 404-432.
    • (1988) J. ACM , vol.35 , Issue.2 , pp. 404-432
    • Sandhu, R.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.