메뉴 건너뛰기




Volumn 11, Issue 3, 2010, Pages 139-148

Formal specification of common criteria based access control policy model

Author keywords

Access control; Evaluation criteria; Formal methods; Security policy model

Indexed keywords

ACCESS CONTROL MECHANISM; ACCESS CONTROL POLICIES; ENTERPRISE INFORMATION SYSTEM; EVALUATION CRITERIA; FORMAL SPECIFICATION; NETWORK ACCESS CONTROL; SECURITY POLICY MODEL; SECURITY SOLUTIONS;

EID: 80054057560     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (12)

References (27)
  • 7
    • 51349124362 scopus 로고    scopus 로고
    • Security engineering environment based on iso/iec standards: Providing standard, formal, and consistent supports for design, development, operation, and maintenance of secure information systems
    • J. Cheng, G. Yuichi, S. Morimoto, H. A. Daisuke, "Security engineering environment based on iso/iec standards: Providing standard, formal, and consistent supports for design, development, operation, and maintenance of secure information systems," International Conference on Information Security and Assurance, pp. 350-354, 2008.
    • (2008) International Conference on Information Security and Assurance , pp. 350-354
    • Cheng, J.1    Yuichi, G.2    Morimoto, S.3    Daisuke, H.A.4
  • 13
    • 0031162048 scopus 로고    scopus 로고
    • A unified framework for enforcing multiple access control policies
    • S. Jajodia et al., "A unified framework for enforcing multiple access control policies," Proceedings ACM SIGMOD Conference, pp. 474-485, 1997.
    • (1997) Proceedings ACM SIGMOD Conference , pp. 474-485
    • Jajodia, S.1
  • 16
    • 33646397613 scopus 로고    scopus 로고
    • Applying the Common Criteria in Systems Engineering
    • Mar.
    • F. Keblawi, and D. Sullivan, "Applying the Common Criteria in Systems Engineering," IEEE Security and Privacy, vol. 4, no. 2, pp. 50-55, Mar. 2006.
    • (2006) IEEE Security and Privacy , vol.4 , Issue.2 , pp. 50-55
    • Keblawi, F.1    Sullivan, D.2
  • 18
    • 84875290233 scopus 로고
    • 5th Princeton Symposium on Information Sciences and Systems
    • B. Lampson, "Protection," 5th Princeton Symposium on Information Sciences and Systems, pp. 417-429, 1971.
    • (1971) Protection , pp. 417-429
    • Lampson, B.1
  • 20
    • 33751416458 scopus 로고    scopus 로고
    • A common criteria based security requirements engineering process for the development of secure information systems
    • Feb.
    • D. Mellado, E. Fernåndez-Medina, and M. Piattini, "A common criteria based security requirements engineering process for the development of secure information systems," Computer Standard Interfaces, vol. 29, no. 2, Feb. 2007.
    • (2007) Computer Standard Interfaces , vol.29 , Issue.2
    • Mellado, D.1    Fernåndez-Medina, E.2    Piattini, M.3
  • 25
    • 51949113164 scopus 로고    scopus 로고
    • Security functional com-ponents for building a secure network computing environment
    • Nov.
    • M. Singh, and M. Patterh, "Security functional com-ponents for building a secure network computing environment," International Journal of Information Systems Security, vol. 16, no. 6, pp. 332-343, Nov. 2007.
    • (2007) International Journal of Information Systems Security , vol.16 , Issue.6 , pp. 332-343
    • Singh, M.1    Patterh, M.2
  • 26
    • 22944455834 scopus 로고    scopus 로고
    • Developerfocused assurance requirements
    • G. Stoneburner, "Developerfocused assurance requirements," Computer, vol. 38, no. 7, pp. 91-93, 2005.
    • (2005) Computer , vol.38 , Issue.7 , pp. 91-93
    • Stoneburner, G.1
  • 27
    • 0038348212 scopus 로고    scopus 로고
    • Secure systems development based on the common criteria: The PalME project
    • Nov.
    • M. Vetterling, G. Wimmel, and A. Wisspeintner, "Secure systems development based on the common criteria: The PalME project," SIGSOFT Software Engineering Notes, vol. 27, no. 6, Nov. 2002
    • (2002) SIGSOFT Software Engineering Notes , vol.27 , Issue.6
    • Vetterling, M.1    Wimmel, G.2    Wisspeintner, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.