메뉴 건너뛰기




Volumn , Issue , 2011, Pages 121-128

Role-based access-control using reference ontology in clouds

Author keywords

Cloud computing; Ontology; Policy; Role based access control model; Security

Indexed keywords

GRANULARITY LEVELS; ONTOLOGY TRANSFORMATION; POLICY; RBAC MODEL; ROLE HIERARCHY; ROLE-BASED; ROLE-BASED ACCESS CONTROL; ROLE-BASED ACCESS CONTROL MODEL; SECURITY; SYSTEM DESIGN;

EID: 79955709135     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISADS.2011.21     Document Type: Conference Paper
Times cited : (44)

References (40)
  • 1
    • 79955730631 scopus 로고    scopus 로고
    • [Online]. Available
    • "Multi-tenancy architecture." [Online]. Available: http://msdn.microsoft.com/en-us/library/aa479086.aspx
    • Multi-tenancy Architecture
  • 4
    • 84956993736 scopus 로고    scopus 로고
    • Role-based authorization constraints specification
    • G.-J. Ahn and R. Sandhu, "Role-based authorization constraints specification," ACM Trans. Inf. Syst. Secur, pp. 207-226, 2000.
    • (2000) ACM Trans. Inf. Syst. Secur. , pp. 207-226
    • Ahn, G.-J.1    Sandhu, R.2
  • 5
    • 69549094553 scopus 로고    scopus 로고
    • [Online]. Available
    • Ontology. [Online]. Available: http://en.wikipedia.org/wiki/Ontology- (information-science)
    • Ontology
  • 6
    • 0030193478 scopus 로고    scopus 로고
    • An organisation ontology for enterprise modeling: Preliminary concepts for linking structure and behaviour
    • M. S. Fox, M. Barbuceanu, and M. Gruninger, "An organisation ontology for enterprise modeling: preliminary concepts for linking structure and behaviour," Comput. Ind., pp. 123-134, 1996. (Pubitemid 126371718)
    • (1996) Computers in Industry , vol.29 , Issue.SPEC. ISS. , pp. 123-134
    • Fox, M.S.1    Barbuceanu, M.2    Gruninger, M.3
  • 7
    • 84890006492 scopus 로고    scopus 로고
    • Ontologies: How can they be built?
    • H. S. Pinto and J. P. Martins, "Ontologies: How can they be built?" Knowl. Inf. Syst., pp. 441-464, 2004.
    • (2004) Knowl. Inf. Syst. , pp. 441-464
    • Pinto, H.S.1    Martins, J.P.2
  • 8
    • 0035789870 scopus 로고    scopus 로고
    • A methodology for ontology integration
    • H. S. Pinto and a. P. Martins, Jo "A methodology for ontology integration," in K-CAP '01, 2001, pp. 131-138.
    • (2001) K-CAP '01 , pp. 131-138
    • Pinto, H.S.1    Martins, A.P.2    Jo3
  • 9
    • 51049095973 scopus 로고    scopus 로고
    • Enriching an ontology with wordnet based on similarity measures
    • M. Warin, H. Oxhammar, and M. Volk, "Enriching an ontology with wordnet based on similarity measures," in MEANING-2005 Workshop, 2005.
    • (2005) MEANING-2005 Workshop
    • Warin, M.1    Oxhammar, H.2    Volk, M.3
  • 10
    • 0003585297 scopus 로고    scopus 로고
    • San Francisco, CA, USA: Morgan Kaufmann Publishers Inc.
    • J. Han, Data Mining: Concepts and Techniques. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2005.
    • (2005) Data Mining: Concepts and Techniques
    • Han, J.1
  • 14
    • 18444373554 scopus 로고    scopus 로고
    • A survey on tree edit distance and related problems
    • DOI 10.1016/j.tcs.2004.12.030, PII S0304397505000174
    • P. Bille, "A survey on tree edit distance and related problems," Theor. Comput. Sci., pp. 217-239, 2005. (Pubitemid 40644674)
    • (2005) Theoretical Computer Science , vol.337 , Issue.1-3 , pp. 217-239
    • Bille, P.1
  • 15
    • 0018491659 scopus 로고
    • The tree-to-tree correction problem
    • K.-C. Tai, "The tree-to-tree correction problem," J. ACM, pp. 422-433, 1979.
    • (1979) J. ACM , pp. 422-433
    • Tai, K.-C.1
  • 16
    • 0024889169 scopus 로고
    • Simple fast algorithms for the editing distance between trees and related problems
    • K. Zhang and D. Shasha, "Simple fast algorithms for the editing distance between trees and related problems," SIAM J. Comput., pp. 1245-1262, 1989. (Pubitemid 20613578)
    • (1989) SIAM Journal on Computing , vol.18 , Issue.6 , pp. 1245-1262
    • Zhang Kaizhong1    Shasha Dennis2
  • 17
    • 84896693236 scopus 로고    scopus 로고
    • Computing the Edit-Distance Between Unrooted Ordered Trees
    • P. N. Klein, "Computing the edit-distance between unrooted ordered trees," in ESA'98, 1998, pp. 91-102. (Pubitemid 128117046)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1461 , pp. 91-102
    • Klein, P.N.1
  • 18
    • 0035790675 scopus 로고    scopus 로고
    • The role-based access control system of a european bank: A case study and discussion
    • A. Schaad, J. Moffett, and J. Jacob, "The role-based access control system of a european bank: a case study and discussion," in SACMAT '01, 2001, pp. 3-9.
    • (2001) SACMAT '01 , pp. 3-9
    • Schaad, A.1    Moffett, J.2    Jacob, J.3
  • 22
    • 0033652039 scopus 로고    scopus 로고
    • The nist model for role-based access control: Towards a unified standard
    • R. Sandhu, D. Ferraiolo, and R. Kuhn, "The nist model for role-based access control: towards a unified standard," in RBAC '00, 2000, pp. 47-63.
    • (2000) RBAC '00 , pp. 47-63
    • Sandhu, R.1    Ferraiolo, D.2    Kuhn, R.3
  • 23
    • 1942532238 scopus 로고    scopus 로고
    • Xml-based specification for web services document security
    • R. Bhatti, E. Bertino, A. Ghafoor, and J. B. D. Joshi, "Xml-based specification for web services document security," Computer, pp. 41-49, 2004.
    • (2004) Computer , pp. 41-49
    • Bhatti, R.1    Bertino, E.2    Ghafoor, A.3    Joshi, J.B.D.4
  • 25
    • 4143123270 scopus 로고    scopus 로고
    • A meta model for authorisations in application security systems and their integration into rbac administration
    • A. Kern, M. Kuhlmann, R. Kuropka, and A. Ruthert, "A meta model for authorisations in application security systems and their integration into rbac administration," in SACMAT '04, 2004, pp. 87-96.
    • (2004) SACMAT '04 , pp. 87-96
    • Kern, A.1    Kuhlmann, M.2    Kuropka, R.3    Ruthert, A.4
  • 26
    • 4143092573 scopus 로고    scopus 로고
    • Administrative scope in the graph-based framework
    • M. Koch, L. V. Mancini, and F. Parisi-Presicce, "Administrative scope in the graph-based framework," in SACMAT '04, 2004, pp. 97-104.
    • (2004) SACMAT '04 , pp. 97-104
    • Koch, M.1    Mancini, L.V.2    Parisi-Presicce, F.3
  • 27
    • 84944792110 scopus 로고    scopus 로고
    • Trbac: A temporal role-based access control model
    • E. Bertino, P. A. Bonatti, and E. Ferrari, "Trbac: A temporal role-based access control model," ACM Trans. Inf. Syst. Secur., vol. 4, no. 3, pp. 191-233, 2001.
    • (2001) ACM Trans. Inf. Syst. Secur. , vol.4 , Issue.3 , pp. 191-233
    • Bertino, E.1    Bonatti, P.A.2    Ferrari, E.3
  • 30
    • 3042530575 scopus 로고    scopus 로고
    • Role-based access control features in commercial database management systems
    • R. S
    • C. Ramaswamy, R. Sandhu, R. Ramaswamy, and R. S, "Role-based access control features in commercial database management systems," in NIST-NCSC, 1998, pp. 503-511.
    • (1998) NIST-NCSC , pp. 503-511
    • Ramaswamy, C.1    Sandhu, R.2    Ramaswamy, R.3
  • 31
    • 0037362986 scopus 로고    scopus 로고
    • Role-based access control with x.509 attribute certificates
    • D. W. Chadwick, A. Otenko, and E. Ball, "Role-based access control with x.509 attribute certificates," IEEE Internet Computing, pp. 62-69, 2003.
    • (2003) IEEE Internet Computing , pp. 62-69
    • Chadwick, D.W.1    Otenko, A.2    Ball, E.3
  • 32
    • 85034775239 scopus 로고    scopus 로고
    • Views and security in distributed database management systems
    • E. Bertino and L. M. Haas, "Views and security in distributed database management systems," in EDBT '88, pp. 155-169.
    • EDBT '88 , pp. 155-169
    • Bertino, E.1    Haas, L.M.2
  • 35
    • 33646406549 scopus 로고    scopus 로고
    • Representation and reasoning on rbac: A description logic approach
    • C. Zhao, N. Heilili, S. Liu, and Z. Lin, "Representation and reasoning on rbac: A description logic approach," in In ICTAC, 2005, pp. 381-393.
    • (2005) ICTAC , pp. 381-393
    • Zhao, C.1    Heilili, N.2    Liu, S.3    Lin, Z.4
  • 36
    • 55549143296 scopus 로고    scopus 로고
    • Automated verification of access control policies using a sat solver
    • G. Hughes and T. Bultan, "Automated verification of access control policies using a sat solver," Int. J. Softw. Tools Technol. Transf., pp. 503-520, 2008.
    • (2008) Int. J. Softw. Tools Technol. Transf. , pp. 503-520
    • Hughes, G.1    Bultan, T.2
  • 38
    • 79955738144 scopus 로고    scopus 로고
    • Ontology based access control derived from dynamic rbac and its context constraints
    • A. Macfie, P. Kataria, N. Koay, H. Dagdeviren, R. Juric, and K. Madani, "Ontology based access control derived from dynamic rbac and its context constraints." in IDPT 2008, 2008.
    • (2008) IDPT 2008
    • Macfie, A.1    Kataria, P.2    Koay, N.3    Dagdeviren, H.4    Juric, R.5    Madani, K.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.