메뉴 건너뛰기




Volumn , Issue , 2011, Pages 79-86

I-RBAC: Isolation enabled role-based access control

Author keywords

Access Control Model; I RBAC; Isolation; Role based Access Control; Security Policy

Indexed keywords

ACCESS CONTROL MODELS; I-RBAC; ISOLATION; ROLE-BASED ACCESS CONTROL; SECURITY POLICY;

EID: 80052096520     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PST.2011.5971967     Document Type: Conference Paper
Times cited : (10)

References (34)
  • 1
    • 33845475230 scopus 로고
    • An introduction to role-based access control
    • "An Introduction to Role-based Access Control," NIST/ITL Bulletin, 1995.
    • (1995) NIST/ITL Bulletin
  • 6
    • 84884311106 scopus 로고    scopus 로고
    • Configuring role-based access control to enforce mandatory and discretionary access control policies
    • May
    • S. Osborn, R. Sandhu and Q. Munawer, "Configuring Role-Based Access Control to Enforce Mandatory and Discretionary Access Control Policies," ACM Trans. on Information and System Security, vol. 3, no. 2, pp. 85-106, May 2000.
    • (2000) ACM Trans. on Information and System Security , vol.3 , Issue.2 , pp. 85-106
    • Osborn, S.1    Sandhu, R.2    Munawer, Q.3
  • 21
    • 0036434226 scopus 로고    scopus 로고
    • Information flow analysis on role-based access control model
    • DOI 10.1108/09685220210446579
    • C. N. Zhang and C. Yang, "Information Flow Analysis on Role-Based Access Control Model," in Proc. Information Management and Computer Security, vol. 10, no. 5, pp. 225-236, 2002. (Pubitemid 35359380)
    • (2002) Information Management and Computer Security , vol.10 , Issue.5 , pp. 225-236
    • Zhang, C.N.1    Yang, C.2
  • 22
    • 0038825675 scopus 로고    scopus 로고
    • Task role-based access control model
    • Sept.
    • S. Oh and S. Park, "Task Role-Based Access Control Model," in Proc. Information Systems, vol. 28, no. 6, pp. 533-562, Sept. 2003.
    • (2003) Proc. Information Systems , vol.28 , Issue.6 , pp. 533-562
    • Oh, S.1    Park, S.2
  • 23
    • 24144477860 scopus 로고    scopus 로고
    • Representation of extended RBAC model using UML language
    • SOFSEM 2005: Theory and Practice of Computer Science - 31st Conference on Current Trends in Theory and Practice of Computer Science, Proceedings
    • A. P. Maranda, G. Goncalves and F. Hemery, "Representation of Extended RBAC Model using UML Language," ACM Trans. On Information and System Security (TISSEC), pp. 413-417, 2005. (Pubitemid 41231150)
    • (2005) Lecture Notes in Computer Science , vol.3381 , pp. 413-417
    • Poniszewska-Maranda, A.1    Goncalves, G.2    Hemery, F.3
  • 25
    • 0141977659 scopus 로고    scopus 로고
    • Issues in the Design of a Language for Role Based Access Control
    • M. Hitchens and V. Varadharajan, "Issues in the Design of a Language for Role Based Access Control," in Proc. ICICS, pp. 22-38, 1999.
    • (1999) Proc. ICICS , pp. 22-38
    • Hitchens, M.1    Varadharajan, V.2
  • 26
    • 26444466082 scopus 로고    scopus 로고
    • A privacy enhanced Role-based access control model for enterprises
    • Networking and Mobile Computing: Third International Conference, ICCNMC 2005. Proceedings
    • C. Yang and C. N. Zhang, "A Privacy Enhanced Role-Based Access Control Model for Enterprises," in Proc. ICCNMC, vol. 3619, pp. 1012-1021, 2005. (Pubitemid 41435842)
    • (2005) Lecture Notes in Computer Science , vol.3619 , pp. 1012-1021
    • Yang, C.1    Zhang, C.N.2
  • 28
    • 85011571668 scopus 로고    scopus 로고
    • Towards a UML based approach to role engineering
    • ACM Workshop on Role-based Access Control
    • P. Epstein and R. Sandhu, "Towards A UML Based Approach to Role Engineering," in Proc. Fourth ACM Workshop on Role-based Access Control, pp. 135-143, 1999.
    • (1999) Proc. Fourth , pp. 135-143
    • Epstein, P.1    Sandhu, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.