메뉴 건너뛰기




Volumn , Issue , 2011, Pages 105-112

A framework for managing and analyzing changes of security policies

Author keywords

[No Author keywords available]

Indexed keywords

AMOUNT OF INFORMATION; BASEL II; DYNAMIC ACCESS CONTROL; ENTERPRISE SYSTEM; EXTENSIBLE FRAMEWORK; LEGAL REGULATION; LOG FILE; SECURITY POLICY; VERSIONING;

EID: 80052395728     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/POLICY.2011.47     Document Type: Conference Paper
Times cited : (5)

References (28)
  • 1
    • 2442516401 scopus 로고    scopus 로고
    • Efficient comparison of enterprise privacy policies
    • H. Haddad, A. Omicini, R. L. Wainwright, and L. M. Liebrock, editors, New York, NY USA, ACM Press. doi: 10.1145/967900.967983
    • M. Backes, G. Karjoth, W. Bagga, and M. Schunter. Efficient comparison of enterprise privacy policies. In H. Haddad, A. Omicini, R. L. Wainwright, and L. M. Liebrock, editors, SAC, pages 375-382, New York, NY USA, 2004. ACM Press. doi: 10.1145/967900.967983.
    • (2004) SAC , pp. 375-382
    • Backes, M.1    Karjoth, G.2    Bagga, W.3    Schunter, M.4
  • 2
    • 23944491974 scopus 로고    scopus 로고
    • Basel Committee on Banking Supervision. Technical report, Bank for International Settlements, Basel, Switzerland
    • Basel Committee on Banking Supervision. Basel II: International convergence of capital measurement and capital standards. Technical report, Bank for International Settlements, Basel, Switzerland, 2004. URL http://www.bis.org/publ/bcbsca.htm.
    • (2004) Basel II: International Convergence of Capital Measurement and Capital Standards
  • 3
    • 60849104397 scopus 로고    scopus 로고
    • Automated analysis of security-design models
    • ISSN 0950- 5849. doi: 10.1016/j.infsof.2008.05.011. Special Issue on Model-Driven Development for Secure Information Systems
    • D. Basin, M. Clavel, J. Doser, and M. Egea. Automated analysis of security-design models. Information and Software Technology, 51(5):815-831, 2009. ISSN 0950- 5849. doi: 10.1016/j.infsof.2008.05.011. Special Issue on Model-Driven Development for Secure Information Systems.
    • (2009) Information and Software Technology , vol.51 , Issue.5 , pp. 815-831
    • Basin, D.1    Clavel, M.2    Doser, J.3    Egea, M.4
  • 4
    • 70450235104 scopus 로고    scopus 로고
    • Extending access control models with break-glass. In B. Carminati and J. Joshi, editors
    • ACM Press, doi: 10.1145/1542207.1542239
    • A. D. Brucker and H. Petritsch. Extending access control models with break-glass. In B. Carminati and J. Joshi, editors, ACM symposium on access control models and technologies (SACMAT), pages 197-206. ACM Press, 2009. doi: 10.1145/1542207.1542239.
    • (2009) ACM Symposium on Access Control Models and Technologies (SACMAT) , pp. 197-206
    • Brucker, A.D.1    Petritsch, H.2
  • 5
    • 24144442859 scopus 로고    scopus 로고
    • Symbolic test case generation for primitive recursive functions
    • J. Grabowski and B. Nielsen, editors, Formal Approaches to Testing of Software, Springer-Verlag, doi: 10.1007/b106767
    • A. D. Brucker and B. Wolff. Symbolic test case generation for primitive recursive functions. In J. Grabowski and B. Nielsen, editors, Formal Approaches to Testing of Software, number 3395 in Lecture Notes in Computer Science, pages 16-32. Springer-Verlag, 2004. doi: 10.1007/b106767.
    • (2004) Lecture Notes in Computer Science , vol.3395 , pp. 16-32
    • Brucker, A.D.1    Wolff, B.2
  • 6
    • 67650139577 scopus 로고    scopus 로고
    • HOL-TESTGEN: An interactive test-case generation framework
    • M. Chechik and M. Wirsing, editors, Fundamental Approaches to Software Engineering (FASE09), Springer- Verlag, doi: 10.1007/978-3-642-00593-0 28
    • A. D. Brucker and B. Wolff. HOL-TESTGEN: An interactive test-case generation framework. In M. Chechik and M. Wirsing, editors, Fundamental Approaches to Software Engineering (FASE09), number 5503 in Lecture Notes in Computer Science, pages 417-420. Springer- Verlag, 2009. doi: 10.1007/978-3-642-00593-0 28.
    • (2009) Lecture Notes in Computer Science , vol.5503 , pp. 417-420
    • Brucker, A.D.1    Wolff, B.2
  • 10
    • 85015362530 scopus 로고
    • Automating the generation and sequencing of test cases from model-based specifications
    • J. Woodcock and P. Larsen, editors, Formal Methods Europe 93: Industrial-Strength Formal Methods, Heidelberg, Apr. Springer-Verlag
    • J. Dick and A. Faivre. Automating the generation and sequencing of test cases from model-based specifications. In J. Woodcock and P. Larsen, editors, Formal Methods Europe 93: Industrial-Strength Formal Methods, volume 670 of Lecture Notes in Computer Science, pages 268- 284, Heidelberg, Apr. 1993. Springer-Verlag.
    • (1993) Lecture Notes in Computer Science , vol.670 , pp. 268-284
    • Dick, J.1    Faivre, A.2
  • 12
    • 33244470893 scopus 로고    scopus 로고
    • Verification and change-impact analysis of access-control policies
    • G.-C. Roman, W. G. Griswold, and B. Nuseibeh, editors, New York, NY USA, ACM Press. doi: 10.1145/1062455.1062502
    • K. Fisler, S. Krishnamurthi, L. A. Meyerovich, and M. C. Tschantz. Verification and change-impact analysis of access-control policies. In G.-C. Roman, W. G. Griswold, and B. Nuseibeh, editors, ICSE, pages 196- 205, New York, NY USA, 2005. ACM Press. doi: 10.1145/1062455.1062502.
    • (2005) ICSE , pp. 196-205
    • Fisler, K.1    Krishnamurthi, S.2    Meyerovich, L.A.3    Tschantz, M.C.4
  • 17
    • 57349119890 scopus 로고    scopus 로고
    • Enabling verification and conformance testing for access control model
    • New York, NY USA, ACM Press. doi: 10.1145/1377836.1377867.
    • H. Hu and G.-J. Ahn. Enabling verification and conformance testing for access control model. In ACM symposium on Access control models and technologies (SACMAT), pages 195-204, New York, NY USA, 2008. ACM Press. doi: 10.1145/1377836.1377867.
    • (2008) ACM Symposium on Access Control Models and Technologies (SACMAT) , pp. 195-204
    • Hu, H.1    Ahn, G.-J.2
  • 18
    • 55549143296 scopus 로고    scopus 로고
    • Automated verification of access control policies using a sat solver
    • October ISSN 1433-2779. doi: 10.1007/ s10009-008-0087-9
    • G. Hughes and T. Bultan. Automated verification of access control policies using a sat solver. International Journal on Software Tools for Technology, 10:503- 520, October 2008. ISSN 1433-2779. doi: 10.1007/ s10009-008-0087-9.
    • (2008) International Journal on Software Tools for Technology , vol.10 , pp. 503520
    • Hughes, G.1    Bultan, T.2
  • 19
    • 0038507387 scopus 로고    scopus 로고
    • Alloy: A lightweight object modelling notation
    • ISSN 1049-331X. doi: 10.1145/505145.505149
    • D. Jackson. Alloy: a lightweight object modelling notation. ACM Transactions on Software Engineering and Methodology, 11(2):256-290, 2002. ISSN 1049-331X. doi: 10.1145/505145.505149.
    • (2002) ACM Transactions on Software Engineering and Methodology , vol.11 , Issue.2 , pp. 256-290
    • Jackson, D.1
  • 21
    • 34548023083 scopus 로고    scopus 로고
    • An approach to evaluate policy similarity
    • V. Lotz and B. M. Thuraisingham, editors, New York, NY USA, ACM Press. doi: 10.1145/1266840.1266842
    • D. Lin, P. Rao, E. Bertino, and J. Lobo. An approach to evaluate policy similarity. In V. Lotz and B. M. Thuraisingham, editors, SACMAT, pages 1-10, New York, NY USA, 2007. ACM Press. doi: 10.1145/1266840.1266842.
    • (2007) SACMAT , pp. 1-10
    • Lin, D.1    Rao, P.2    Bertino, E.3    Lobo, J.4
  • 25
    • 0033489645 scopus 로고    scopus 로고
    • Optimistic security: A new access control paradigm
    • New York, NY USA, ACM Press. doi: 10.1145/335169.335188
    • D. Povey. Optimistic security: A new access control paradigm. In Proceedings of the 1999 workshop on new security paradigms, pages 40-45, New York, NY USA, 1999. ACM Press. doi: 10.1145/335169.335188.
    • (1999) Proceedings of the 1999 Workshop on New Security Paradigms , pp. 40-45
    • Povey, D.1
  • 26
    • 39049126192 scopus 로고    scopus 로고
    • A study of access control requirements for healthcare systems based on audit trails from access logs
    • Los Alamitos, CA, USA, IEEE Computer Society. doi: 10.1109/ACSAC.2006.8
    • L. Rostad and O. Edsberg. A study of access control requirements for healthcare systems based on audit trails from access logs. In Annual Computer Security Applications Conference (ACSAC), pages 175-186, Los Alamitos, CA, USA, 2006. IEEE Computer Society. doi: 10.1109/ACSAC.2006.8.
    • (2006) Annual Computer Security Applications Conference (ACSAC) , pp. 175-186
    • Rostad, L.1    Edsberg, O.2
  • 28
    • 33947244417 scopus 로고    scopus 로고
    • Sarbanes Oxley Section 404 Costs of Compliance: A case study
    • L. Sneller and H. Langendijk. Sarbanes Oxley Section 404 Costs of Compliance: a case study. Corporate Governance: An International Review, 15(2):101- 111, 2007. URL http://econpapers.repec.org/RePEc:bla: corgov:v:15:y:2007:i:2:p:101-111.
    • (2007) Corporate Governance: An International Review , vol.15 , Issue.2 , pp. 101-111
    • Sneller, L.1    Langendijk, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.