메뉴 건너뛰기




Volumn , Issue , 2011, Pages

UACML: Unified access control modeling language

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL MODELS; ALTERNATIVE APPROACH; CONTROL REQUIREMENTS; GENERIC MODELING; META MODEL; MODELING LANGUAGES; SECURITY REQUIREMENTS; SYSTEM DESIGN; SYSTEM SECURITY;

EID: 79952860136     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/NTMS.2011.5721143     Document Type: Conference Paper
Times cited : (23)

References (18)
  • 3
    • 0003400251 scopus 로고
    • Secure computer systems: A mathematical model
    • Mitre Corporation, Bedford, Massachusetts
    • D.E. Bell and L. LaPadula. Secure computer systems: A mathematical model. Technical Report MTR-2547, Volume I & II, Mitre Corporation, Bedford, Massachusetts, 1973.
    • (1973) Technical Report MTR-2547 , vol.1-2
    • Bell, D.E.1    LaPadula, L.2
  • 4
    • 79952843400 scopus 로고    scopus 로고
    • International Business Machines Corporation Administration. Available at
    • International Business Machines Corporation. IBM WebSphere Portal version 6.0, Administration. Available at http://publib.boulder.ibm.com/infocenter/ wpdoc/v6r0/topic/com.ibm.wp.ent.doc/wp-admin-pdf.pdf.
    • IBM WebSphere Portal Version 6.0
  • 5
    • 27644540336 scopus 로고    scopus 로고
    • On modelling access policies: Relating roles to their organisational context
    • Proceedings - 13th IEEE International Conference on Requirements Engineering, RE 2005
    • R. Crook, D. Ince, and B. Nuseibeh. On modelling access policies: Relating roles to their organisational context. In Proceedings of 13th IEEE International Requirements Engineering Conference, pages 157-166, 2005. (Pubitemid 41563786)
    • (2005) Proceedings of the IEEE International Conference on Requirements Engineering , pp. 157-166
    • Crook, R.1    Ince, D.2    Nuseibeh, B.3
  • 9
    • 84944220091 scopus 로고    scopus 로고
    • Towards Development of Secure Systems Using UMLsec
    • Fundamental Approaches to Software Engineering
    • J. Jürjens. Towards development of secure systems using UMLsec. In Proceedings of 4th International Conference on Fundamental Approaches to Software Engineering (FASE/ETAPS'01), volume 2029 of LNCS, pages 187-200, 2001. (Pubitemid 33256474)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2029 , pp. 187-200
    • Jurjens, J.1
  • 10
    • 0013137299 scopus 로고    scopus 로고
    • Object Management Group version 2.2, 2010. OMG Document Number: formal/2010-02-01
    • Object Management Group. Object constraint language, version 2.2, 2010. OMG Document Number: formal/2010-02-01.
    • Object Constraint Language
  • 11
    • 50949102921 scopus 로고    scopus 로고
    • Object Management Group version 2.3, 2010. OMG Document Number: formal/2010-05-03
    • Object Management Group. OMG Unified Modeling Language, version 2.3, 2010. OMG Document Number: formal/2010-05-03.
    • OMG Unified Modeling Language
  • 12
    • 77949562741 scopus 로고    scopus 로고
    • A framework of composable access control features: Preserving separation of access control concerns from models to code
    • J. Pavlich-Mariscal, S. Demurjian, and L. Michel. A framework of composable access control features: Preserving separation of access control concerns from models to code. Computers & Security, 29(3):350-379, 2010.
    • (2010) Computers & Security , vol.29 , Issue.3 , pp. 350-379
    • Pavlich-Mariscal, J.1    Demurjian, S.2    Michel, L.3
  • 14
    • 84964853055 scopus 로고    scopus 로고
    • Access Control: Policies, Models, and Mechanisms
    • Foundations of Security Analysis and Design
    • Pierangela Samarati and Sabrina De Capitani di Vimer-cati. Access control: Policies, models, and mechanisms. I n Foundations of Security Ananlysis and Design, volume 2172 of LNCS, pages 137-196. Springer-Verlag, 2001. (Pubitemid 33364380)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2171 , pp. 137-196
    • Samarati, P.1    De Capitani Di Vimercati, S.2
  • 16
    • 0028513932 scopus 로고
    • Access control: Principles and practice
    • R. Sandhu and P. Samarati. Access control: Principles and practice. IEEE Communications, 32(9):40-48, 1994.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.1    Samarati, P.2
  • 18
    • 33749080076 scopus 로고    scopus 로고
    • Attributed Based Access Control (ABAC) for web services
    • DOI 10.1109/ICWS.2005.25, 1530847, Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005
    • E. Yuan and J. Tong. Attributed based access control (ABAC) for web services. In Proceedings of IEEE International Conference on Web Services (ICWS'05), pages 561-569, 2005. (Pubitemid 44460249)
    • (2005) Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005 , vol.2005 , pp. 561-569
    • Yuan, E.1    Tong, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.