메뉴 건너뛰기




Volumn , Issue , 2010, Pages 149-158

Personalizing access control by generalizing access control

Author keywords

Access control models; Integrity; Privacy policies

Indexed keywords

ACCESS CONTROL MODELS; ACCESS POLICIES; AXIOMATIZATION; CONCEPTUAL FRAMEWORKS; DATA SUBJECTS; DEGREES-OF-CONTROL; META MODEL; PERSONAL DATA; PERSONAL INFORMATION; PRIVACY POLICIES;

EID: 77954889727     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1809842.1809866     Document Type: Conference Paper
Times cited : (10)

References (29)
  • 2
    • 77954321643 scopus 로고    scopus 로고
    • A comparison of two privacy policy languages: EPAL and XACMl
    • A. H. Anderson. A comparison of two privacy policy languages: EPAL and XACMl. In SWS, pages 53-60, 2006.
    • (2006) SWS , pp. 53-60
    • Anderson, A.H.1
  • 3
    • 77954890832 scopus 로고    scopus 로고
    • ANSI. RBAC, 2004. INCITS 359-2004
    • ANSI. RBAC, 2004. INCITS 359-2004.
  • 4
    • 0025389823 scopus 로고
    • Arithmetic classification of perfect models of stratified programs
    • K. R. Apt and H. Blair. Arithmetic classification of perfect models of stratified programs. Fundamenta Informaticae, XIII:1-17, 1990.
    • (1990) Fundamenta Informaticae , vol.13 , pp. 1-17
    • Apt, K.R.1    Blair, H.2
  • 5
    • 11244302711 scopus 로고    scopus 로고
    • Unification in privacy policy evaluation - Translating EPAL into Prolog
    • M. Backes, M. Dürmuth, and G. Karjoth. Unification in privacy policy evaluation - translating EPAL into Prolog. In POLICY, pages 185-188, 2004.
    • (2004) POLICY , pp. 185-188
    • Backes, M.1    Dürmuth, M.2    Karjoth, G.3
  • 6
    • 70450250101 scopus 로고    scopus 로고
    • The next 700 access control models or a unifying meta-model?
    • S. Barker. The next 700 access control models or a unifying meta-model? In SACMAT, pages 187-196, 2009.
    • (2009) SACMAT , pp. 187-196
    • Barker, S.1
  • 7
    • 44649085096 scopus 로고    scopus 로고
    • Efficient and flexible access control via jones-optimal logic program specialisation
    • S. Barker, M. Leuschel, and M. Varea. Efficient and flexible access control via jones-optimal logic program specialisation. Higher-Order and Symbolic Computation, 21(1):5-35, 2008.
    • (2008) Higher-order and Symbolic Computation , vol.21 , Issue.1 , pp. 5-35
    • Barker, S.1    Leuschel, M.2    Varea, M.3
  • 10
    • 3042584122 scopus 로고    scopus 로고
    • Flexible access control policy specification with constraint logic programming
    • S. Barker and P. Stuckey. Flexible access control policy specification with constraint logic programming. ACM Trans. on Information and System Security, 6(4):501-546, 2003.
    • (2003) ACM Trans. on Information and System Security , vol.6 , Issue.4 , pp. 501-546
    • Barker, S.1    Stuckey, P.2
  • 11
    • 56349097648 scopus 로고
    • Secure computer system: Unified exposition and multics interpretation
    • D. E. Bell and L. J. LaPadula. Secure computer system: Unified exposition and multics interpretation. MITRE-2997, 1976.
    • (1976) MITRE-2997
    • Bell, D.E.1    Lapadula, L.J.2
  • 12
    • 21844524540 scopus 로고
    • The expressiveness of locally stratified programs
    • H. A. Blair, V. W. Marek, and J. S. Schlipf. The expressiveness of locally stratified programs. Ann. Math. Artif. Intell., 15(2):209-229, 1995.
    • (1995) Ann. Math. Artif. Intell. , vol.15 , Issue.2 , pp. 209-229
    • Blair, H.A.1    Marek, V.W.2    Schlipf, J.S.3
  • 13
    • 13244267910 scopus 로고    scopus 로고
    • Design rationale of ruleml: A markup language for semantic web rules
    • H. Boley, S. Tabet, and G. Wagner. Design rationale of ruleml: A markup language for semantic web rules. In SWWS 2001, pages 381-401, 2001.
    • (2001) SWWS 2001 , pp. 381-401
    • Boley, H.1    Tabet, S.2    Wagner, G.3
  • 15
    • 0027702164 scopus 로고
    • A goal-oriented approach to computing the well-founded semantics
    • 3
    • W. Chen and D. S. Warren. A goal-oriented approach to computing the well-founded semantics. J. Log. Program., 17(2/3&4):279-300, 1993.
    • (1993) J. Log. Program , vol.17 , Issue.2-4 , pp. 279-300
    • Chen, W.1    Warren, D.S.2
  • 17
    • 0014797273 scopus 로고
    • A relational model of data for large shared data banks
    • E. F. Codd. A relational model of data for large shared data banks. Commun. ACM, 13(6):377-387, 1970.
    • (1970) Commun. ACM , vol.13 , Issue.6 , pp. 377-387
    • Codd, E.F.1
  • 18
    • 3042822164 scopus 로고    scopus 로고
    • P3P : Making privacy policies more useful
    • L. F. Cranor. P3P : Making privacy policies more useful. IEEE Security & Privacy, 1(6):50-55, 2003.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.6 , pp. 50-55
    • Cranor, L.F.1
  • 23
    • 34548016110 scopus 로고    scopus 로고
    • Privacy-aware role based access control
    • Q. Ni, A. Trombetta, E. Bertino, and J. Lobo. Privacy-aware role based access control. In SACMAT, pages 41-50, 2007.
    • (2007) SACMAT , pp. 41-50
    • Ni, Q.1    Trombetta, A.2    Bertino, E.3    Lobo, J.4
  • 24
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • S. L. Osborn, R. S. Sandhu, and Q. Munawer. Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Secur., 3(2):85-106, 2000.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.L.1    Sandhu, R.S.2    Munawer, Q.3
  • 25
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • M. D. Schroeder and J. H. Saltzer. The protection of information in computer systems. Procs. IEEE 63, 9:1278-1308, 1975.
    • (1975) Procs. IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Schroeder, M.D.1    Saltzer, J.H.2
  • 26
    • 11144322222 scopus 로고    scopus 로고
    • The PING personally controlled electronic medical record system: Technical architecture
    • W. Simons, K. Mandl, and I. Kohane. The PING personally controlled electronic medical record system: Technical architecture. Journal of the American Medical Informatics Association, 12(1):45-54, 2005.
    • (2005) Journal of the American Medical Informatics Association , vol.12 , Issue.1 , pp. 45-54
    • Simons, W.1    Mandl, K.2    Kohane, I.3
  • 27
    • 0348066009 scopus 로고
    • The alternating fixpoint of logic programs with negation
    • A. van Gelder. The alternating fixpoint of logic programs with negation. J. Comput. Syst. Sci., 47(1):185-221, 1993.
    • (1993) J. Comput. Syst. Sci. , vol.47 , Issue.1 , pp. 185-221
    • Van Gelder, A.1
  • 28
    • 84899266027 scopus 로고    scopus 로고
    • Creating the policy-aware web: Discretionary, rules-based access for the world wide web
    • in Elena Ferrari and Bhavani Thuraisingham, editors, IOS. Idea Group Inc
    • D. J. Weitzner, J. Hendler, T. Berners-lee, and D. Connolly. Creating the policy-aware web: Discretionary, rules-based access for the world wide web. In in Elena Ferrari and Bhavani Thuraisingham, editors, Web and Information Security. IOS. Idea Group Inc., 2005.
    • (2005) Web and Information Security
    • Weitzner, D.J.1    Hendler, J.2    Berners-Lee, T.3    Connolly, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.