메뉴 건너뛰기




Volumn , Issue , 2010, Pages 160-166

Risk analysis in access control systems

Author keywords

Access control; Model; RBAC; RBACR; Risk analysis

Indexed keywords

ACCESS CONTROL DECISIONS; ACCESS CONTROL POLICIES; PARTIAL ORDERING; PROTECTED OBJECT; RBAC; RBACR; RISK ASSESSMENT METHODS; ROLE DELEGATION; ROLE-BASED ACCESS CONTROL MODEL;

EID: 78549269431     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PST.2010.5593248     Document Type: Conference Paper
Times cited : (17)

References (11)
  • 1
    • 84948950552 scopus 로고    scopus 로고
    • A model for attribute-based user-role assignment
    • M. A. Al-Kahtani and R. S. Sandhu. A model for attribute-based user-role assignment. In ACSAC, pages 353-364, 2002.
    • (2002) ACSAC , pp. 353-364
    • Al-Kahtani, M.A.1    Sandhu, R.S.2
  • 2
    • 33747817026 scopus 로고    scopus 로고
    • Reconfiguring role based access control policies using risk semantics
    • B. Aziz, S. N. Foley, J. Herbert, and G. Swart. Reconfiguring role based access control policies using risk semantics. J. High Speed Networks, 15(3):261-273, 2006.
    • (2006) J. High Speed Networks , vol.15 , Issue.3 , pp. 261-273
    • Aziz, B.1    Foley, S.N.2    Herbert, J.3    Swart, G.4
  • 5
    • 50249130272 scopus 로고    scopus 로고
    • Extending RBAC for large enterprises and its quantitative risk evaluation
    • S. Kondo, M. Iwaihara, M. Yoshikawa, and M. Torato. Extending RBAC for large enterprises and its quantitative risk evaluation. In II3E, pages 99-112, 2008.
    • (2008) II3E , pp. 99-112
    • Kondo, S.1    Iwaihara, M.2    Yoshikawa, M.3    Torato, M.4
  • 6
    • 33747815548 scopus 로고    scopus 로고
    • Risk based security analysis of permissions in rbac
    • N. Nissanke and E. J. Khayat. Risk based security analysis of permissions in rbac. In WOSIS, pages 332-341, 2004.
    • (2004) WOSIS , pp. 332-341
    • Nissanke, N.1    Khayat, E.J.2
  • 7
    • 33746648223 scopus 로고    scopus 로고
    • On lattices in access control models
    • S. A. Obiedkov, D. G. Kourie, and J. H. P. Eloff. On lattices in access control models. In ICCS, pages 374-387, 2006.
    • (2006) ICCS , pp. 374-387
    • Obiedkov, S.A.1    Kourie, D.G.2    Eloff, J.H.P.3
  • 8
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • R. S. Sandhu. Lattice-based access control models. IEEE Computer, 26(11):9-19, 1993.
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 9
    • 50249183308 scopus 로고    scopus 로고
    • Role hierarchies and constraints for lattice-based access controls
    • R. S. Sandhu. Role hierarchies and constraints for lattice-based access controls. In ESORICS, pages 65-79, 1996.
    • (1996) ESORICS , pp. 65-79
    • Sandhu, R.S.1
  • 10
    • 0031600971 scopus 로고    scopus 로고
    • An oracle implementation of the PRA97 model for permission-role assignment
    • R. S. Sandhu and V. Bhamidipati. An oracle implementation of the PRA97 model for permission-role assignment. In ACM Workshop on Role-Based Access Control, pages 13-21, 1998.
    • (1998) ACM Workshop on Role-Based Access Control , pp. 13-21
    • Sandhu, R.S.1    Bhamidipati, V.2
  • 11
    • 36249018901 scopus 로고    scopus 로고
    • Trust-based user-role assignment in role-based access control
    • H. Takabi, M. Amini, and R. Jalili. Trust-based user-role assignment in role-based access control. In AICCSA, pages 807-814, 2007.
    • (2007) AICCSA , pp. 807-814
    • Takabi, H.1    Amini, M.2    Jalili, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.