메뉴 건너뛰기




Volumn , Issue , 2009, Pages 425-430

Trust-based access control for privacy protection in collaborative environment

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL MODELS; BUSINESS ENVIRONMENTS; COLLABORATIVE ENVIRONMENTS; PRIVACY LAW; PRIVACY POLICIES; PRIVACY PROTECTION; TRUST VALUES; TRUST-BASED ACCESS CONTROL;

EID: 77951006943     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICEBE.2009.66     Document Type: Conference Paper
Times cited : (17)

References (26)
  • 1
    • 0036190633 scopus 로고    scopus 로고
    • Building trust in e-commerce
    • Atif, Y. (2000). Building trust in e-commerce. IEEE Internet Computing, 6(1), 18-24.
    • (2000) IEEE Internet Computing , vol.6 , Issue.1 , pp. 18-24
    • Atif, Y.1
  • 2
    • 84865788031 scopus 로고    scopus 로고
    • A model of OASIS role-based access control and its support for active security
    • Bacon, J., Moody, K., and Yao, W. (2002). A model of OASIS role-based access control and its support for active security. ACM Transaction Information System Security, 5(4), 492-540.
    • (2002) ACM Transaction Information System Security , vol.5 , Issue.4 , pp. 492-540
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 3
    • 0036311802 scopus 로고    scopus 로고
    • A uniform framework for regulating service access and information release on the Web
    • Bonatti, P., and Samarati, P. (2002). A Unified Framework for Regulating Access and Information Release on the Web. In Journal of Computer Security, 10, 3, 241-271. (Pubitemid 34814466)
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 241-271
    • Bonatti, P.A.1    Samarati, P.2
  • 10
    • 0016949746 scopus 로고
    • A lattice model of secure information
    • 1976
    • Denning, D. E. (1976). A lattice model of secure information. Communications of the ACM, vol.19, no.5, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5
    • Denning, D.E.1
  • 11
    • 84955574746 scopus 로고    scopus 로고
    • Future Directions in Role-Based Access Control Models
    • Information Assurance in Computer Networks Methods, Models and Architectures for Network Security
    • Ferraiolo, D. F., Sandhu, R., Gavrila, S., Richard Kuhn, D., and Chandramouli, R. (2001). Proposed NIST Standard for Role-Based Access Control, ACM Transactions on Information and System Security, Volume 4, Number 3, August 2001. (Pubitemid 33275961)
    • (2001) LECTURE NOTES in COMPUTER SCIENCE , Issue.2052 , pp. 22-26
    • Sandhu, R.1
  • 20
    • 0030086382 scopus 로고    scopus 로고
    • Role-Based Access Control Models
    • February 1996
    • Sandhu, R., Coyne, E., Feinstein, H., and Youman, C. (1996). Role-Based Access Control Models, IEEE Computer, Volume 29, Number 2, February 1996.
    • (1996) IEEE Computer , vol.29 , Issue.2
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Youman, C.4
  • 21
    • 3142738238 scopus 로고    scopus 로고
    • Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities
    • Xiong, L., and Liu, L. (2004). Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transaction Knowledge Data Engineering, 16(7), 843-857.
    • (2004) IEEE Transaction Knowledge Data Engineering , vol.16 , Issue.7 , pp. 843-857
    • Xiong, L.1    Liu, L.2
  • 22
    • 34748878894 scopus 로고    scopus 로고
    • Fine-grained reputation-based routing in wireless ad hoc networks
    • 4258677, ISI 2007: 2007 IEEE Intelligence and Security Informatics
    • Yang, L., Kizza, J. M., Cemerlic, A., and Liu, F. (2007). Finegrained reputation-based routing in wireless ad hoc networks. In Proceedings of IEEE Intelligence and Security Informatics Conference (pp. 75-78). IEEE Computer Society Press. (Pubitemid 47469218)
    • (2007) ISI 2007: 2007 IEEE Intelligence and Security Informatics , pp. 75-78
    • Yang, L.1    Kizza, J.M.2    Cemerlic, A.3    Liu, F.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.