메뉴 건너뛰기




Volumn 5, Issue 3, 2007, Pages 299-316

A policy-oriented language for expressing security specifications

Author keywords

Authorization; Coherency; History; Obligation; Policy

Indexed keywords

AUTHORIZATION; AUTHORIZATION POLICY; COHERENCY; GLOBAL SECURITY; OBLIGATION; POLICY ENFORCEMENT; POLICY-ORIENTED; PROTECTED OBJECT; SECURITY ACCESS; SECURITY MODEL; SECURITY POLICY; SINGLE POINT;

EID: 79951871897     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (6)

References (53)
  • 3
    • 0005908365 scopus 로고    scopus 로고
    • Distributed firewalls
    • special issue on security, Nov
    • S. M. Bellovin, "Distributed firewalls," ;login: magazine, special issue on security, Nov. 1999.
    • (1999) login: magazine
    • Bellovin, S.M.1
  • 4
    • 0032153903 scopus 로고    scopus 로고
    • An access control model supporting periodicity con-straints and temporal reasoning
    • Sep
    • E. Bertino, C. Bettini, E. Ferrari, and P. Samarati, "An access control model supporting periodicity con-straints and temporal reasoning," ACM Transactions on Database Systems, vol. 23, no. 3, pp. 231-285, Sep. 1998.
    • (1998) ACM Transactions on Database Systems , vol.23 , Issue.3 , pp. 231-285
    • Bertino, E.1    Bettini, C.2    Ferrari, E.3    Samarati, P.4
  • 8
    • 0029700918 scopus 로고    scopus 로고
    • Support-ing multiple access control policies in database sys-tems
    • IEEE Computer Society Press, Oakland, CA, May
    • E. Bertino, S. Jajodia, and P. Samarati, "Support-ing multiple access control policies in database sys-tems," in Proceedings of the IEEE Symposium on Security and Privacy, pp. 94-109, IEEE Computer Society Press, Oakland, CA, May 1996.
    • (1996) Proceedings of the IEEE Symposium on Security and Privacy , pp. 94-109
    • Bertino, E.1    Jajodia, S.2    Samarati, P.3
  • 9
    • 84874816496 scopus 로고    scopus 로고
    • A Constraint Language for Adage
    • Computational Logic, Inc., April
    • W. R. Bevier, and W. D. Young, A Constraint Language for Adage, Technical report, Computational Logic, Inc., April 1997.
    • (1997) Technical report
    • Bevier, W.R.1    Young, W.D.2
  • 14
    • 0004043780 scopus 로고
    • Camdbridge University Press
    • B. Chellas, Modal Logic, Camdbridge University Press, 1980.
    • (1980) Modal Logic
    • Chellas, B.1
  • 23
    • 0032186691 scopus 로고    scopus 로고
    • Theory and practice of constraint han-dling rules, special issue on constraint logic program-ming
    • Oct
    • T. F. Wirth, "Theory and practice of constraint han-dling rules, special issue on constraint logic program-ming," Journal of Logic Programming, pp. 95-138, Oct. 1998.
    • (1998) Journal of Logic Programming , pp. 95-138
    • Wirth, T.F.1
  • 26
    • 13244254629 scopus 로고    scopus 로고
    • OASIS eXtensible access control markup language (XACML)
    • Aug
    • S. Godik and T. Moses, "OASIS eXtensible access control markup language (XACML), OASIS draft version 16, Aug. 2002.
    • (2002) OASIS draft version 16
    • Godik, S.1    Moses, T.2
  • 27
    • 0005307288 scopus 로고
    • Transaction Processing: Concepts and Techniques
    • Morgan Kaufmann Publishers, Inc., SanMateo (CA), USA
    • J. Gray and A. Reuter, Transaction Processing: Concepts and Techniques, Data Management Sys-tems, Morgan Kaufmann Publishers, Inc., SanMateo (CA), USA, 1993.
    • (1993) Data Management Sys-tems
    • Gray, J.1    Reuter, A.2
  • 29
    • 84874797554 scopus 로고    scopus 로고
    • IBM Corporation, Entrepise Security Architecture Using Tivoli Security Solutions
    • IBM Corporation, Entrepise Security Architecture Using Tivoli Security Solutions, 2002.
    • (2002)
  • 30
    • 84874806114 scopus 로고    scopus 로고
    • Sotiris Ioannidis, Security Policy Consistency and Distributed Evalution in Heterogeneous Environments , PhD thesis, University of Pennsylvania
    • Sotiris Ioannidis, Security Policy Consistency and Distributed Evalution in Heterogeneous Environments , PhD thesis, University of Pennsylvania, 2005.
    • (2005)
  • 33
    • 84874814211 scopus 로고    scopus 로고
    • Security Policy Specification Using a Graphical Approach, Technical Report CSE-98-3, University of California
    • H. James, R. Pandey, and K. Levitt, Security Policy Specification Using a Graphical Approach, Technical Report CSE-98-3, University of California, Davis De-partment of Computer Science, 1998.
    • (1998) Davis De-partment of Computer Science
    • James, H.1    Pandey, R.2    Levitt, K.3
  • 37
    • 0000788149 scopus 로고    scopus 로고
    • Law-governed in-teraction: a coordination and control mechanism for heterogeneous distributed systems
    • Jul
    • N. H. Minsky and V. Ungureanu, "Law-governed in-teraction: a coordination and control mechanism for heterogeneous distributed systems," ACM Transactions on Software Engineering and Methodology, vol. 9, no. 3, pp. 273-305, Jul. 2000.
    • (2000) ACM Transactions on Software Engineering and Methodology , vol.9 , Issue.3 , pp. 273-305
    • Minsky, N.H.1    Ungureanu, V.2
  • 38
    • 84874791014 scopus 로고    scopus 로고
    • Uma Plataforma Para Poíiticas de Autoriza ç~ao Para Organizaç~oes
    • PhD thesis, Instituto Superior Técnico, Lisbon, Portugal, Jul
    • C. Ribeiro, Uma Plataforma Para Poíiticas de Autoriza ç~ao Para Organizaç~oes, PhD thesis, Instituto Superior Técnico, Lisbon, Portugal, Jul. 2002.
    • (2002)
    • Ribeiro, C.1
  • 43
    • 0003342146 scopus 로고
    • Separation of duties in computarized information systems
    • Halifax, UK, Sep. 18-21
    • R. Sandhu, "Separation of duties in computarized information systems," in Proceedings of the IFIP WG11.3 Workshop on Database Security, pp. 179-190, Halifax, UK, Sep. 18-21 1990.
    • (1990) Proceedings of the IFIP WG11.3 Workshop on Database Security , pp. 179-190
    • Sandhu, R.1
  • 44
    • 0027699087 scopus 로고
    • Lattice-based access control models
    • Nov
    • R. Sandhu, "Lattice-based access control models," IEEE Computer, vol. 26, no. 11, pp. 9-19, Nov. 1993.
    • (1993) IEEE Computer , vol.26 , Issue.11 , pp. 9-19
    • Sandhu, R.1
  • 45
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • Feb
    • R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-based access control models," Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996.
    • (1996) Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Youman, C.4
  • 47
    • 0345980113 scopus 로고    scopus 로고
    • Adage: An Architecture for Distributed Authorization
    • OSF Research Institute, Cambridge
    • R. Simon and M. E. Zurko, Adage: An Architecture for Distributed Authorization, Technical report, OSF Research Institute, Cambridge, 1997.
    • (1997) Technical report
    • Simon, R.1    Zurko, M.E.2
  • 51
    • 0026851844 scopus 로고
    • Authorization in dis-tributed systems: A formal approach
    • IEEE Computer Society Press, May
    • T. Y. C. Woo and S. S. Lam, "Authorization in dis-tributed systems: A formal approach," in Proceedings of the IEEE Symposium on Security and Privacy , pp. 33-51, IEEE Computer Society Press, May 1992.
    • (1992) Proceedings of the IEEE Symposium on Security and Privacy , pp. 33-51
    • Woo, T.Y.C.1    Lam, S.S.2
  • 53
    • 84940100462 scopus 로고    scopus 로고
    • A user-centered, modular authorization service built on an RBAC foundation
    • IEEE Computer Society Press, May
    • M. E. Zurko, R. Simon, and T. Sanfilipo, "A user-centered, modular authorization service built on an RBAC foundation," in Proceedings of the IEEE Symposium on Security and Privacy, pp. 57-73. IEEE Computer Society Press, May 1999.
    • (1999) Proceedings of the IEEE Symposium on Security and Privacy , pp. 57-73
    • Zurko, M.E.1    Simon, R.2    Sanfilipo, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.