메뉴 건너뛰기




Volumn 6047 LNCS, Issue , 2010, Pages 201-216

Security analysis and validation for access control in multi-domain environment based on risk

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL POLICIES; DYNAMIC ADJUSTMENT; EFFICIENT ALGORITHM; MULTI DOMAINS; PRECISE DEFINITION; RISK MODEL; ROLE-BASED; SAFETY ANALYSIS; SAFETY REQUIREMENTS; SECURITY ANALYSIS; SECURITY PROPERTIES; SIMILAR ANALYSIS; SINGLE DOMAINS; STATE TRANSITION SYSTEMS; TWO STAGE;

EID: 78650285206     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-12827-1_15     Document Type: Conference Paper
Times cited : (4)

References (15)
  • 2
    • 38549096135 scopus 로고    scopus 로고
    • Dynamic access control research for inter-operation in multi-domain environment based on risk
    • Kim, S. Yung, M. Lee, H.-W. (eds.), LNCS, . Springer, Heidelberg
    • Tang, Z., Li, R., Lu, Z., Wen, Z.: Dynamic Access Control Research for Inter-operation in Multi-domain Environment Based on Risk. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol. 4867, pp. 277-290. Springer, Heidelberg (2008).
    • (2008) WISA 2007 , vol.4867 , pp. 277-290
    • Tang, Z.1    Li, R.2    Lu, Z.3    Wen, Z.4
  • 3
    • 49549111832 scopus 로고    scopus 로고
    • A request-driven policy framework for secure interoperation in multi-domain environment
    • Li, R., Tang, Z., Lu, Z.: A Request-driven Policy Framework for Secure Interoperation in Multi-domain Environment. International Journal of Computer Systems Science & Engineering 23(3), 193-206 (2008).
    • (2008) International Journal of Computer Systems Science & Engineering , vol.23 , Issue.3 , pp. 193-206
    • Li, R.1    Tang, Z.2    Lu, Z.3
  • 4
    • 30544438141 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Security analysis in trust management
    • Li, N., Mitchell, J.C., Winsborough, W.H.: Beyond proof-of-compliance: Security analysis in trust management. Journal of the ACM 52(3), 474-514 (2005).
    • (2005) Journal of the ACM , vol.52 , Issue.3 , pp. 474-514
    • Li, N.1    Mitchell, J.C.2    Winsborough, W.H.3
  • 10
    • 0009481412 scopus 로고    scopus 로고
    • A survey of trust in internet applications
    • Fourth Quarter
    • Grandison, T., Sloman, M.: A Survey of Trust in Internet Applications. IEEE Communications Surveys 3(4), 2-16 (Fourth Quarter 2000).
    • (2000) IEEE Communications Surveys , vol.3 , Issue.4 , pp. 2-16
    • Grandison, T.1    Sloman, M.2
  • 13
    • 35248894984 scopus 로고    scopus 로고
    • Fidelis: A policy-driven trust management framework
    • Nixon, P. Terzis, S. (eds.), LNCS, Springer, Heidelberg
    • Yao, W.T.-M.: Fidelis: A policy-driven trust management framework. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 301-317. Springer, Heidelberg (2003).
    • (2003) ITrust 2003 , vol.2692 , pp. 301-317
    • Yao, W.T.-M.1
  • 14
    • 4143058053 scopus 로고    scopus 로고
    • Using trust and risk in role-based access control policies
    • New York, USA, June 2-4
    • Dimmock, N., Belokosztolszki, A., Eyers, D., et al.: Using Trust and Risk in Role-Based Access Control Policies. In: SACMAT 2004, New York, USA, June 2-4 (2004).
    • (2004) SACMAT 2004
    • Dimmock, N.1    Belokosztolszki, A.2    Eyers, D.3
  • 15
    • 84957011508 scopus 로고    scopus 로고
    • Decidability of safety in graph-based models for access control
    • Gollmann, D. Karjoth, G. Waidner, M. (eds.), LNCS, Springer, Heidelberg
    • Koch, M., Mancini, L.V., Parisi-Presicce, F.: Decidability of safety in graph-based models for access control. In: Gollmann, D., Karjoth, G., Waidner, M. (eds.) ESORICS 2002. LNCS, vol. 2502, pp. 229-243. Springer, Heidelberg (2002).
    • (2002) ESORICS 2002 , vol.2502 , pp. 229-243
    • Koch, M.1    Mancini, L.V.2    Parisi-Presicce, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.