메뉴 건너뛰기




Volumn , Issue , 2010, Pages 293-306

Policy-based access control for weakly consistent replication

Author keywords

eventual consistency; replication; security logic

Indexed keywords

ACCESS CONTROL DECISIONS; ACCESS CONTROL POLICIES; AUTHORIZATION POLICY; DELEGATION OF AUTHORITY; EVENTUAL CONSISTENCY; REPLICATED DATA; SECURITY LOGIC;

EID: 77954593401     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1755913.1755943     Document Type: Conference Paper
Times cited : (19)

References (32)
  • 5
    • 33645995393 scopus 로고    scopus 로고
    • Device-enabled authorization in the Grey system
    • Proceedings of the 8th Information Security Conference, Singapore, Springer Verlag
    • L. Bauer, S. Garriss, J. M. McCune, M. K. Reiter, J. Rouse, and P. Rutenbar. Device-enabled authorization in the Grey system. In Proceedings of the 8th Information Security Conference, Singapore, pages 431-445. Springer Verlag LNCS 3650, 2005.
    • (2005) LNCS , vol.3650 , pp. 431-445
    • Bauer, L.1    Garriss, S.2    McCune, J.M.3    Reiter, M.K.4    Rouse, J.5    Rutenbar, P.6
  • 20
    • 84870828684 scopus 로고    scopus 로고
    • Microsoft Corporation. Microsoft Sync Framework. http://code.msdn. microsoft.com/sync.
    • Microsoft Sync Framework
  • 25
    • 0001821002 scopus 로고
    • Constraint databases: A survey
    • P. Z. Revesz. Constraint databases: a survey. Semantics and Databases, 1358:209-246, 1995.
    • (1995) Semantics and Databases , vol.1358 , pp. 209-246
    • Revesz, P.Z.1
  • 26
    • 0030080924 scopus 로고    scopus 로고
    • Maintaining replicated authorizations in distributed database systems
    • P. Samarati, P. Ammann, and S. Jajodia. Maintaining replicated authorizations in distributed database systems. Data and Knowledge Engineering, 1(18):55-84, 1996.
    • (1996) Data and Knowledge Engineering , vol.1 , Issue.18 , pp. 55-84
    • Samarati, P.1    Ammann, P.2    Jajodia, S.3
  • 27
    • 0024714097 scopus 로고
    • Integrating security in a large distributed system
    • M. Satyanarayanan. Integrating security in a large distributed system. ACM Transactions on Computer Systems, 7(3):247-280, 1989.
    • (1989) ACM Transactions on Computer Systems , vol.7 , Issue.3 , pp. 247-280
    • Satyanarayanan, M.1
  • 28
    • 0025564050 scopus 로고
    • Implementing fault-tolerant services using the state machine approach: A tutorial
    • F. Schneider. Implementing fault-tolerant services using the state machine approach: a tutorial. ACM Computing Surveys, 22(299), 1990.
    • (1990) ACM Computing Surveys , vol.22 , Issue.299
    • Schneider, F.1
  • 29
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Communications of the ACM, 11(22):612-613, 1979.
    • (1979) Communications of the ACM , vol.11 , Issue.22 , pp. 612-613
    • Shamir, A.1
  • 31
    • 78651556127 scopus 로고    scopus 로고
    • Eventually consistent
    • W. Vogels. Eventually consistent. ACM Queue, 6(6):14-19, 2008.
    • (2008) ACM Queue , vol.6 , Issue.6 , pp. 14-19
    • Vogels, W.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.