메뉴 건너뛰기




Volumn 1, Issue 1-2, 2007, Pages 143-168

A geotemporal role-based authorisation system

Author keywords

access control; authorisation systems; geospatial databases; information and computer security

Indexed keywords


EID: 77955962072     PISSN: 17441765     EISSN: 17441773     Source Type: Journal    
DOI: 10.1504/ijics.2007.012247     Document Type: Article
Times cited : (36)

References (38)
  • 3
    • 0008724838 scopus 로고    scopus 로고
    • An authorisation model for temporal and derived data: securing information portals
    • Atluri, V. and Gal, A. (2002) ‘An authorisation model for temporal and derived data: securing information portals’, ACM Transactions on Information Systems Security, Vol. 5, pp.62–94.
    • (2002) ACM Transactions on Information Systems Security , vol.5 , pp. 62-94
    • Atluri, V.1    Gal, A.2
  • 4
    • 84949747356 scopus 로고    scopus 로고
    • Paper presented at the Fifth European Symposium on Research in Computer Security, Rome, Italy, and Lecture Notes in Computer Science, Springer-Verlag
    • Atluri, V. and Huang, W-K. (1996) ‘An authorization model for workflows’, Paper presented at the Fifth European Symposium on Research in Computer Security, Rome, Italy, and Lecture Notes in Computer Science, Springer-Verlag, pp.44–64. In proceedings.
    • (1996) An authorization model for workflows , pp. 44-64
    • Atluri, V.1    Huang, W.-K.2
  • 7
    • 2442558027 scopus 로고    scopus 로고
    • Paper presented at the 14th International Workshop on Research Issues in Data Engineering, Web Services for E-Commerce and E-Government Applications, 28–29 March 2004, Boston, MA IEEE Computer Society. In proceedings
    • Bertino E., Damiani M.L. and Momini D. (2004) ‘An access control system for a web map management service’, Paper presented at the 14th International Workshop on Research Issues in Data Engineering, Web Services for E-Commerce and E-Government Applications, 28–29 March 2004, Boston, MA, (pp.33–39). IEEE Computer Society. In proceedings.
    • (2004) An access control system for a web map management service , pp. 33-39
    • Bertino, E.1    Damiani, M.L.2    Momini, D.3
  • 8
    • 85134887303 scopus 로고    scopus 로고
    • Specifying and enforcing access control policies for XML document sources
    • Bertino, E., Castano, S., Ferrari, E. and Mesiti, M. (2000) ‘Specifying and enforcing access control policies for XML document sources’, World Wide Web Journal, Vol. 3, pp.139–151.
    • (2000) World Wide Web Journal , vol.3 , pp. 139-151
    • Bertino, E.1    Castano, S.2    Ferrari, E.3    Mesiti, M.4
  • 9
    • 30644474741 scopus 로고    scopus 로고
    • Paper presented at the SACMAT ‘05: the 10th ACM symposium on Access control models and technologies
    • Bertino, E., Catania, B., Damiani, M.L., and Perlasca, P. (2005) ‘Geo-rbac: a spatially aware rbac’, Paper presented at the SACMAT ‘05: the 10th ACM symposium on Access control models and technologies, pp.29–37, In proceedings.
    • (2005) Geo-rbac: a spatially aware rbac , pp. 29-37
    • Bertino, E.1    Catania, B.2    Damiani, M.L.3    Perlasca, P.4
  • 18
    • 84951713331 scopus 로고    scopus 로고
    • Google Press Center
    • Google Earth (2004) Google acquires Keyhole Corp, Google Press Center, Available at: http://www.google.com/press/pressrel/keyhole.html
    • (2004) Google acquires Keyhole Corp
    • Google Earth1
  • 20
    • 30744448197 scopus 로고    scopus 로고
    • paper presented at SACMAT ‘05: the tenth ACM symposium on Access control models and technologies In proceedings
    • Hulsebosch, R., Salden, A., Bargh, M., Ebben, P. and Reitsma, J. (2005) ‘Context sensitive access control’, paper presented at SACMAT ‘05: the tenth ACM symposium on Access control models and technologies, pp.111–119. In proceedings.
    • (2005) Context sensitive access control , pp. 111-119
    • Hulsebosch, R.1    Salden, A.2    Bargh, M.3    Ebben, P.4    Reitsma, J.5
  • 21
    • 84951717852 scopus 로고    scopus 로고
    • System demo presented at Vortex 2001
    • Keyhole Inc. (2001) Keyhole’s EarthViewer Technology, System demo presented at Vortex 2001, http://www.keyhole.com//body.php?h=news&t=20010522
    • (2001) Keyhole’s EarthViewer Technology
  • 22
    • 84951717852 scopus 로고    scopus 로고
    • System demo presented at Vortex 2001
    • Keyhole Inc. (2001) ‘Keyhole’s EarthViewer technology’, System demo presented at Vortex 2001, Available at: http://ww.keyhole.com//body.php?h=news&t=20010522
    • (2001) Keyhole’s EarthViewer technology
  • 23
    • 0034450091 scopus 로고    scopus 로고
    • Paper presented at the ACM Conference on Computer and Communication Security (CCS 2000). In proceedings
    • Kudo, M. and Hada, S. (2000) ‘XML document security based on provisional authorization’, Paper presented at the ACM Conference on Computer and Communication Security (CCS 2000). In proceedings.
    • (2000) XML document security based on provisional authorization
    • Kudo, M.1    Hada, S.2
  • 27
    • 19944409397 scopus 로고    scopus 로고
    • Paper presented at the International Workshop on Interactive Distributed Multimedia Systems and Telcommunication Services Springer Verlag. In proceedings
    • Wang, J., Li, J., Wiederhold, G. and Firschein, O. (1998) ‘System for classifying objectionable websites’, Paper presented at the International Workshop on Interactive Distributed Multimedia Systems and Telcommunication Services, Vol. 1483, pp.113–124, Springer Verlag. In proceedings.
    • (1998) System for classifying objectionable websites , vol.1483 , pp. 113-124
    • Wang, J.1    Li, J.2    Wiederhold, G.3    Firschein, O.4
  • 28
    • 0032312612 scopus 로고    scopus 로고
    • Paper presented at the IEEE International Conference on Image Processing Chicago, USA. In proceedings
    • Wong, P. (1998) ‘A public key watermark for image verification and authentication’, Paper presented at the IEEE International Conference on Image Processing, pp.425–429, Chicago, USA. In proceedings.
    • (1998) A public key watermark for image verification and authentication , pp. 425-429
    • Wong, P.1
  • 30
    • 84951717855 scopus 로고    scopus 로고
    • Paper presented at the 19th International Symposium of Computer and Information Sciences (ISCIS 2004), Kemer- Antalya, Turkey. In proceedings
    • Zhang, J. and Xiong, F. (2004) ‘A novel watermarking for image security’, Paper presented at the 19th International Symposium of Computer and Information Sciences (ISCIS 2004), Kemer- Antalya, Turkey. In proceedings.
    • (2004) A novel watermarking for image security
    • Zhang, J.1    Xiong, F.2
  • 31
    • 84951717856 scopus 로고    scopus 로고
    • http://earth.google.com
  • 32
    • 84951717857 scopus 로고    scopus 로고
    • This figure is based on the time of this report
    • This figure is based on the time of this report.
  • 33
    • 84951717858 scopus 로고    scopus 로고
    • http://earth.google.com/coverage/coverage_list.pdf
  • 34
    • 84951717859 scopus 로고    scopus 로고
    • In the strictest sense, subjects include the users and the processes invoked by the users
    • In the strictest sense, subjects include the users and the processes invoked by the users.
  • 35
    • 84951717860 scopus 로고    scopus 로고
    • Available at http://cimic.rutgers.edu/spatial
  • 36
    • 84951717861 scopus 로고    scopus 로고
    • http://www.njmeadowlands.gov
  • 37
    • 84951717862 scopus 로고    scopus 로고
    • For example: http://www.geocode.com/eagle.html-ssi
  • 38
    • 84951717863 scopus 로고    scopus 로고
    • The PKI and public certificate can be used to authenticate not only the user’s identity but also the user’s past scene (geotemporal) credentials
    • The PKI and public certificate can be used to authenticate not only the user’s identity but also the user’s past scene (geotemporal) credentials.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.