메뉴 건너뛰기




Volumn , Issue , 2010, Pages 137-146

Representing and reasoning about web access control policies

Author keywords

Answer set programming; Role based access control; XACML

Indexed keywords

APPLICATION PROGRAMS; COMPUTATION THEORY; INFORMATION SERVICES; LOGIC PROGRAMMING; MARKUP LANGUAGES; SERVICE ORIENTED ARCHITECTURE (SOA); WEB SERVICES;

EID: 78751691290     PISSN: 07303157     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COMPSAC.2010.20     Document Type: Conference Paper
Times cited : (51)

References (29)
  • 1
    • 21144450607 scopus 로고    scopus 로고
    • American National Standards Institute Inc. ANSI-INCITS 359-2004
    • American National Standards Institute Inc. Role Based Access Control, ANSI-INCITS 359-2004, 2004.
    • (2004) Role Based Access Control
  • 4
    • 33748079186 scopus 로고    scopus 로고
    • Core and hierarchical role based access control (RBAC) profile of XACML v2. 0
    • A. Anderson. Core and hierarchical role based access control (RBAC) profile of XACML v2. 0. OASIS Standard, 2005.
    • (2005) OASIS Standard
    • Anderson, A.1
  • 23
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • R. S. Sandhu. Lattice-based access control models. IEEE Computer, 26(11):9-19, 1993.
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.S.1
  • 24
  • 26
    • 33646027053 scopus 로고    scopus 로고
    • Specification and validation of authorisation constraints using UML and OCL
    • K. Sohr, G.-J. Ahn, M. Gogolla, and L. Migge. Specification and validation of authorisation constraints using UML and OCL. Lecture notes in computer science, 3679:64, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3679 , pp. 64
    • Sohr, K.1    Ahn, G.-J.2    Gogolla, M.3    Migge, L.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.