메뉴 건너뛰기




Volumn , Issue , 2010, Pages 23-33

Monitoring security policies with metric first-order temporal logic

Author keywords

Access control; Compliance; Monitoring; Security policies; Separation of duty; Temporal logic; Usage control

Indexed keywords

COMPLIANCE MONITORING; SECURITY POLICIES; SECURITY POLICY; SEPARATION OF DUTY; USAGE CONTROL;

EID: 77954950728     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1809842.1809849     Document Type: Conference Paper
Times cited : (55)

References (38)
  • 1
    • 77954893367 scopus 로고    scopus 로고
    • Bank Secrecy Act of 1970, 1970. 31 USC 5311-5332 and 31 CFR 103
    • Bank Secrecy Act of 1970, 1970. 31 USC 5311-5332 and 31 CFR 103.
  • 2
    • 0004243736 scopus 로고    scopus 로고
    • The Health Insurance Portability and Accountability Act of 1996 (HIPAA)
    • The Health Insurance Portability and Accountability Act of 1996 (HIPAA), 1996. Public Law 104-191.
    • (1996) Public Law , pp. 104-191
  • 3
    • 22144443678 scopus 로고    scopus 로고
    • USA Patriot Act of 2001, HR 3162 RDS
    • USA Patriot Act of 2001, 2001. Public Law 107-56, HR 3162 RDS.
    • (2001) Public Law 107-56
  • 11
    • 0032153903 scopus 로고    scopus 로고
    • An access control model supportting periodicity and temporal reasoning
    • E. Bertino, C. Bettini, E. Ferrari, and P. Samarati. An access control model supportting periodicity and temporal reasoning. ACM Trans. Database Syst., 23(3):231-285, 1998.
    • (1998) ACM Trans. Database Syst. , vol.23 , Issue.3 , pp. 231-285
    • Bertino, E.1    Bettini, C.2    Ferrari, E.3    Samarati, P.4
  • 14
    • 84976843391 scopus 로고
    • Efficient checking of temporal integrity constraints using bounded history encoding
    • J. Chomicki. Efficient checking of temporal integrity constraints using bounded history encoding. ACM Trans. Database Syst., 20(2):149-186, 1995.
    • (1995) ACM Trans. Database Syst. , vol.20 , Issue.2 , pp. 149-186
    • Chomicki, J.1
  • 25
    • 0001601021 scopus 로고
    • Specifying real-time properties with metric temporal logic
    • R. Koymans. Specifying real-time properties with metric temporal logic. Real-Time Systems, 2(4):255-299, 1990.
    • (1990) Real-Time Systems , vol.2 , Issue.4 , pp. 255-299
    • Koymans, R.1
  • 27
    • 13444275220 scopus 로고    scopus 로고
    • Edit automata: Enforcement mechanisms for run-time security policies
    • J. Ligatti, L. Bauer, and D. Walker. Edit automata: enforcement mechanisms for run-time security policies. Int. J. Inf. Secur., 4(1-2):2-16, 2005.
    • (2005) Int. J. Inf. Secur. , vol.4 , Issue.1-2 , pp. 2-16
    • Ligatti, J.1    Bauer, L.2    Walker, D.3
  • 35
  • 37
    • 11344251138 scopus 로고    scopus 로고
    • Monitoring algorithms for metric temporal logic specifications
    • P. Thati and G. Rosu. Monitoring algorithms for metric temporal logic specifications. Elec. Notes Theo. Comput. Sci., 113:145-162, 2005.
    • (2005) Elec. Notes Theo. Comput. Sci. , vol.113 , pp. 145-162
    • Thati, P.1    Rosu, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.