메뉴 건너뛰기




Volumn 84, Issue 7, 2011, Pages 1144-1159

Dynamic deployment of context-aware access control policies for constrained security devices

Author keywords

Authorization; IT security; Network security; OrBAC

Indexed keywords

AUTHORIZATION; CENTRAL-ENTITY; CONTEXT-AWARE ACCESS CONTROL; COUNTER MEASURES; DYNAMIC DEPLOYMENT; ENCRYPTED COMMUNICATION; IT SECURITY; ORBAC; POLICY EVALUATION; RESOURCE ACCESS; SECURITY COMPONENTS; SECURITY DEVICES; SECURITY POLICY; SECURITY REQUIREMENTS; STATE EVOLUTIONS; SYSTEM BEHAVIORS; SYSTEM VULNERABILITY;

EID: 79956194649     PISSN: 01641212     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jss.2011.02.005     Document Type: Article
Times cited : (24)

References (45)
  • 6
    • 79952415405 scopus 로고    scopus 로고
    • Formal Characterizations of Active Databases: Part II
    • Deductive and Object-Oriented Databases
    • C. Baral, J. Lobo, and G. Trajcevski Formal characterization of active databases: Part II Proceedings of the 5th International Conference on Deductive and Object-Oriented Databases, vol. 1341 Montreux, Switzerland, Lecture Notes in Computer Science, Springer 1997 247 264 (Pubitemid 127157144)
    • (1997) Lecture Notes in Computer Science , Issue.1341 , pp. 247-264
    • Baral, C.1    Lobo, J.2    Trajcevski, G.3
  • 13
    • 34347273369 scopus 로고    scopus 로고
    • High Level Conflict Management Strategies in Advanced Access Control Models
    • DOI 10.1016/j.entcs.2007.01.064, PII S1571066107004562
    • F. Cuppens, N. Cuppens-Boulahia, and B. Ben-Ghorbel High-level conflict management strategies in advanced access control models Proceedings of the Electronic Notes in Theoretical Computer Science (ENTCS 2007), vol. 186 Elsevier 2007 3 26 (Pubitemid 47001803)
    • (2007) Electronic Notes in Theoretical Computer Science , vol.186 , Issue.SPEC. ISS. , pp. 3-26
    • Cuppens, F.1    Cuppens-Boulahia, N.2    Ghorbel, M.B.3
  • 17
    • 34547465100 scopus 로고    scopus 로고
    • Enabling automated threat response through the use of a dynamic security policy
    • DOI 10.1007/s11416-007-0039-z
    • H. Debar, Y. Thomas, F. Cuppens, and N. Cuppens-Boulahia Enabling automated threat response through the use of a dynamic security policy Journal in Computer Virology (JCV), Springer 3 3 2007 195 210 (Pubitemid 47167359)
    • (2007) Journal in Computer Virology , vol.3 , Issue.3 , pp. 195-210
    • Debar, H.1    Thomas, Y.2    Cuppens, F.3    Cuppens-Boulahia, N.4
  • 20
    • 79956226973 scopus 로고    scopus 로고
    • Ensuite framework, 2010. http://ensuite.sourceforge.net/ (accessed 27.12.10).
    • (2010) Ensuite Framework
  • 22
    • 79956192392 scopus 로고    scopus 로고
    • Freeradius project
    • Freeradius project, 2010. http://freeradius.org/ (accessed 27.12.10).
    • (2010)
  • 24
    • 41849107232 scopus 로고    scopus 로고
    • Complete analysis of configuration rules to guarantee reliable network security policies
    • DOI 10.1007/s10207-007-0045-7
    • J. Garcia-Alfaro, N. Boulahia-Cuppens, and F. Cuppens Complete analysis of configuration rules to guarantee reliable network security policies International Journal of Information Security, Springer 7 2 2008 103 122 (Pubitemid 351493917)
    • (2008) International Journal of Information Security , vol.7 , Issue.2 , pp. 103-122
    • Alfaro, J.G.1    Boulahia-Cuppens, N.2    Cuppens, F.3
  • 27
    • 32544451794 scopus 로고    scopus 로고
    • Matching information security vulnerabilities to organizational security profiles: A genetic algorithm approach
    • DOI 10.1016/j.dss.2004.06.004, PII S0167923604001332
    • M. Gupta, J. Rees, A. Chaturvedi, and J. Ch Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach. In Decision Support Systems 41 2006 592 603 (Pubitemid 43233889)
    • (2006) Decision Support Systems , vol.41 , Issue.3 , pp. 592-603
    • Gupta, M.1    Rees, J.2    Chaturvedi, A.3    Chi, J.4
  • 29
    • 64249112993 scopus 로고    scopus 로고
    • SAT-solving approaches to contextaware enterprise network security management
    • J. Homer, and X. Ou SAT-solving approaches to contextaware enterprise network security management IEEE Journal on Selected Areas in Communications 27 3 2009 315 322
    • (2009) IEEE Journal on Selected Areas in Communications , vol.27 , Issue.3 , pp. 315-322
    • Homer, J.1    Ou, X.2
  • 31
    • 79956207151 scopus 로고    scopus 로고
    • Jena Java Library, 2010. http://jena.sourceforge.net/ (accessed 27.12.10).
    • (2010) Jena Java Library
  • 33
    • 37349056999 scopus 로고    scopus 로고
    • Test generation from security policies specified in Or-BAC
    • DOI 10.1109/COMPSAC.2007.210, 4291133, Proceedings - 31st Annual International Computer Software and Applications Conference, COMPSAC 2007
    • K. Li, L. Mounier, and R. Groz Test generation from security policies specified in Or-BAC Proceedings of the 31st Annual International Computer Software and Applications Conference (COMPSAC 2007) IEEE, Beijing, China 2007 255 260 (Pubitemid 350301802)
    • (2007) Proceedings - International Computer Software and Applications Conference , vol.2 , pp. 255-260
    • Li, K.1    Mounier, L.2    Groz, R.3
  • 34
    • 26444568158 scopus 로고    scopus 로고
    • Zchaff2004: An efficient SAT solver
    • Theory and Applications of Satisfiability Testing: 7th International Conference, SAT 2004. Revised Selected Papers
    • Y.S. Mahajan, Z. Fu, and S. Malik Zchaff2004: an efficient SAT solver Proceedings of the 7th International Conference on Theory and Applications of Satisfiability Testing (SAT 2004) Springer 2004 360 375 (Pubitemid 41422894)
    • (2005) Lecture Notes in Computer Science , vol.3542 , pp. 360-375
    • Mahajan, Y.S.1    Fu, Z.2    Malik, S.3
  • 36
    • 79956222680 scopus 로고    scopus 로고
    • MotOrBAC website
    • MotOrBAC website, 2010. http://motorbac.sourceforge.net/ (accessed 27.12.10).
    • (2010)
  • 43
    • 3142715261 scopus 로고    scopus 로고
    • Policy-based Network Management
    • Morgan Kaufmann Publishers, 1st edition
    • Strassner, C.J., 2003. Policy-based Network Management, Solutions for the Next Generation. Morgan Kaufmann Publishers, 1st edition.
    • (2003) Solutions for the Next Generation
    • Strassner, C.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.