메뉴 건너뛰기




Volumn 6, Issue 1, 2010, Pages 115-123

Lightweight analysis of access control models with description logic

Author keywords

Description logic; Lightweight analysis; Model driven security

Indexed keywords

ACCESS CONTROL MODELS; ACCESS CONTROL POLICIES; ANALYSIS APPROACH; ANALYSIS MODELS; DESCRIPTION LOGIC; MODEL-DRIVEN; MODELING LANGUAGES; ROLE-BASED; ROLE-BASED ACCESS CONTROL; SECURITY POLICY;

EID: 77949300561     PISSN: 16145046     EISSN: 16145054     Source Type: Journal    
DOI: 10.1007/s11334-009-0107-2     Document Type: Article
Times cited : (3)

References (16)
  • 2
    • 60849104397 scopus 로고    scopus 로고
    • Automated analysis of security-design models
    • doi:10.1016/j.infsof.2008.05.011
    • Basin D, Clavel M, Doser J, Egea M (2009) Automated analysis of security-design models. Inf Softw Technol 51(5): 815-831. doi: 10. 1016/j. infsof. 2008. 05. 011.
    • (2009) Inf Softw Technol , vol.51 , Issue.5 , pp. 815-831
    • Basin, D.1    Clavel, M.2    Doser, J.3    Egea, M.4
  • 3
    • 33745471209 scopus 로고    scopus 로고
    • Model driven security: From UML models to access control infrastructures
    • Basin DA, Doser J, Lodderstedt T (2006) Model driven security: from UML models to access control infrastructures. ACM Trans Softw Eng Methodol 15(1): 39-91 http://doi. acm. org/10. 1145/1125808. 1125810.
    • (2006) ACM Trans Softw Eng Methodol , vol.15 , Issue.1 , pp. 39-91
    • Basin, D.A.1    Doser, J.2    Lodderstedt, T.3
  • 4
    • 25144441754 scopus 로고    scopus 로고
    • Reasoning on UML class diagrams
    • doi:10.1016/j.artint.2005.05.003
    • Berardi D, Calvanese D, Giacomo GD (2005) Reasoning on UML class diagrams. Artificial Intelligence 168: 70-118. doi: 10. 1016/j. artint. 2005. 05. 003.
    • (2005) Artificial Intelligence , vol.168 , pp. 70-118
    • Berardi, D.1    Calvanese, D.2    Giacomo, G.D.3
  • 5
    • 67650187962 scopus 로고    scopus 로고
    • From access control policies to aspect code: A metamodel-based approach
    • Workshops and Symposia at MODELS 2008, 28 Sept-3 Oct 2008, Toulouse, France. Lecture Notes on Computer Science, 10.1007/978-3-642-01648-6_26, M. R. V. Chaudron (Ed.), Berlin: Springer
    • Braga C (2008) From access control policies to aspect code: a metamodel-based approach. In: Chaudron MRV (eds) Proceedings of the 11th international conference on model driven engineering languages and systems (MODELS 2008). Workshops and Symposia at MODELS 2008, 28 Sept-3 Oct 2008, Toulouse, France. Lecture notes on computer science, vol 5421. Springer, Berlin, pp 243-256. doi: 10. 1007/978-3-642-01648-6_26.
    • (2008) Proceedings of the 11th International Conference on Model Driven Engineering Languages and Systems (MODELS 2008) , pp. 243-256
    • Braga, C.1
  • 6
    • 33750286091 scopus 로고    scopus 로고
    • A model transformation semantics and analysis methodology for Secure UML
    • Genova, Italy, 1-6 Oct. Lecture Notes on Computer Science, O. Nierstrasz, J. Whittle, D. Harel, and G. Reggio (Eds.), Berlin: Springer
    • Brucker AD, Doser J, Wolff B (2006) A model transformation semantics and analysis methodology for Secure UML. In: Nierstrasz O, Whittle J, Harel D, Reggio G (eds) Proceedings of the 9th international conference on model driven engineering languages and systems, Genova, Italy, 1-6 Oct. Lecture notes on computer science, vol 4199. Springer, Berlin, pp 306-320.
    • (2006) Proceedings of the 9th International Conference on Model Driven Engineering Languages and Systems , vol.4199 , pp. 306-320
    • Brucker, A.D.1    Doser, J.2    Wolff, B.3
  • 9
    • 70349862227 scopus 로고    scopus 로고
    • Model-driven security in practice: An industrial experience
    • Fourth European conference on model driven architecture, foundations and applications, Berlin, Germany. Lecture notes on computer science, 9-12 June, Springer, Berlin. doi: 10. 1007/978-3-540-69100-6_22
    • Clavel M, da Silva V, Braga C, Egea M (2008) Model-driven security in practice: an industrial experience. In: Proceedings of ECMDA 2008. Fourth European conference on model driven architecture, foundations and applications, Berlin, Germany. Lecture notes on computer science, 9-12 June, vol 5095. Springer, Berlin. doi: 10. 1007/978-3-540-69100-6_22.
    • (2008) Proceedings of ECMDA 2008 , vol.5095
    • Clavel, M.1    da Silva, V.2    Braga, C.3    Egea, M.4
  • 11
    • 71049147241 scopus 로고    scopus 로고
    • A temporal description logic based access control model for expressing history constrained policies in semantic web
    • In: IEEE International Workshop on
    • Faghih F, Amini M, Jalili R (2009) A temporal description logic based access control model for expressing history constrained policies in semantic web. Policies for distributed systems and networks. In: IEEE International Workshop on 0: 142-149. http://doi. ieeecomputersociety. org/10. 1109/POLICY. 2009. 15.
    • (2009) Policies for Distributed Systems and Networks , pp. 142-149
    • Faghih, F.1    Amini, M.2    Jalili, R.3
  • 13
    • 0003258017 scopus 로고
    • Logics of time and computation
    • 2nd edn, Center for the Study of Language and Information
    • Goldblatt R (1987) Logics of time and computation, 2nd edn. In: CSLI Lecture Notes, vol 7. Center for the Study of Language and Information.
    • (1987) CSLI Lecture Notes , vol.7
    • Goldblatt, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.