메뉴 건너뛰기




Volumn , Issue , 2011, Pages 175-184

On the management of user obligations

Author keywords

Accountability; Authorization; Obligations; Policy; RBAC

Indexed keywords

ACCOUNTABILITY; AUTHORIZATION; AUTHORIZATION SYSTEMS; OBLIGATIONS; PROGRAM SLICING; RBAC; REFERENCE MONITORS; SYSTEM ARCHITECTURES;

EID: 79960179819     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1998441.1998473     Document Type: Conference Paper
Times cited : (16)

References (20)
  • 2
    • 77951543455 scopus 로고    scopus 로고
    • Obligation language and framework to enable privacy-aware SOA
    • Volume 5939 of Lecture Notes in Computer Science, Springer Berlin, Heidelberg
    • M. Ali, L. Bussard, and U. Pinsdorf. Obligation Language and Framework to Enable Privacy-Aware SOA. In Data Privacy Management and Autonomous Spontaneous Security, volume 5939 of Lecture Notes in Computer Science, pages 18-32. Springer Berlin, Heidelberg, 2010.
    • (2010) Data Privacy Management and Autonomous Spontaneous Security , pp. 18-32
    • Ali, M.1    Bussard, L.2    Pinsdorf, U.3
  • 7
    • 38049040380 scopus 로고    scopus 로고
    • A policy language for distributed usage control
    • J. Biskup and J. Lopez, editors, volume 4734 of Lecture Notes in Computer Science, Springer Berlin, Heidelberg
    • M. Hilty, A. Pretschner, D. Basin, C. Schaefer, and T. Walter. A policy language for distributed usage control. In J. Biskup and J. Lopez, editors, Computer Security - ESORICS 2007, volume 4734 of Lecture Notes in Computer Science, pages 531-546. Springer Berlin, Heidelberg, 2008.
    • (2008) Computer Security - ESORICS 2007 , pp. 531-546
    • Hilty, M.1    Pretschner, A.2    Basin, D.3    Schaefer, C.4    Walter, T.5
  • 8
    • 34547346853 scopus 로고    scopus 로고
    • On the modeling and analysis of obligations
    • DOI 10.1145/1180405.1180423, 1180423, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
    • K. Irwin, T. Yu, and W. H. Winsborough. On the modeling and analysis of obligations. In Proceedings of the 13th ACM conference on Computer and communications security, pages 134-143, New York, NY, USA, 2006. ACM. (Pubitemid 47131363)
    • (2006) Proceedings of the ACM Conference on Computer and Communications Security , pp. 134-143
    • Irwin, K.1    Yu, T.2    Winsborough, W.H.3
  • 14
    • 3142523603 scopus 로고    scopus 로고
    • The uconabc usage control model
    • J. Park and R. Sandhu. The uconabc usage control model. ACM Trans. Inf. Syst. Secur., 7(1):128-174, 2004.
    • (2004) ACM Trans. Inf. Syst. Secur. , vol.7 , Issue.1 , pp. 128-174
    • Park, J.1    Sandhu, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.