메뉴 건너뛰기




Volumn 2, Issue 2, 2006, Pages 150-159

An access control system with time-constraint using support vector machines

Author keywords

Access control; Information protection; Neural network; Security; Support vector machines

Indexed keywords

ACCESS POLICIES; ACCESS RIGHTS; COMPLEX COMPUTER SYSTEMS; INFORMATION PROTECTION; REAL-TIME DATA; SECURITY; SECURITY MANAGEMENT; TIME-PERIODS;

EID: 80054061336     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (11)

References (18)
  • 1
    • 0022863851 scopus 로고
    • On the design of a key-lock-pair mech-anism in information protection system
    • C. C. Chang, "On the design of a key-lock-pair mech-anism in information protection system," BIT, vol. 26, pp. 410-417, 1986.
    • (1986) BIT , vol.26 , pp. 410-417
    • Chang, C.C.1
  • 2
    • 0023363075 scopus 로고
    • An information protection scheme based upon number theory
    • C. C. Chang, "An information protection scheme based upon number theory," Computer Journal, vol. 30, no. 3, pp. 249-253, 1987.
    • (1987) Computer Journal , vol.30 , Issue.3 , pp. 249-253
    • Chang, C.C.1
  • 3
    • 0030785019 scopus 로고    scopus 로고
    • A binary access con-trol method using prime factorization
    • C. C. Chang and D. C. Lou, "A binary access con-trol method using prime factorization," Information Science, vol. 96, no. 1-2, pp. 15-26, 1997.
    • (1997) Information Science , vol.96 , Issue.1-2 , pp. 15-26
    • Chang, C.C.1    Lou, D.C.2
  • 4
    • 84874861629 scopus 로고    scopus 로고
    • LIBSVM: a library for support vec-tor machines. [Online]. Available
    • C. C. Chang and C. J. Lin. (2001). LIBSVM: a library for support vec-tor machines. [Online]. Available WWW:http://www.csie.ntu.edu.tw/ cjlin/libsvm.
    • (2001)
    • Chang, C.C.1    Lin, C.J.2
  • 6
    • 34249753618 scopus 로고
    • Support-vector network
    • C. Cortes and V. Vapnik, "Support-vector network," Machine Learning, vol. 20, no. 3, pp. 273-297, 1995,
    • (1995) Machine Learning , vol.20 , Issue.3 , pp. 273-297
    • Cortes, C.1    Vapnik, V.2
  • 7
    • 0002422823 scopus 로고    scopus 로고
    • A role based access control model and reference implementation within a corporate
    • Feb
    • D. Ferraiolo, J. Barkley, and R. Kuhn, "A role based access control model and reference implementation within a corporate," ACM Transactions on Information and System Security, vol.2, no.1, pp. 34-64, Feb. 1999.
    • (1999) ACM Transactions on Information and System Security , vol.2 , Issue.1 , pp. 34-64
    • Ferraiolo, D.1    Barkley, J.2    Kuhn, R.3
  • 9
    • 0034240041 scopus 로고    scopus 로고
    • Design and specification of role based access control policies
    • M. Hitchens and V. Varadharajan, "Design and specification of role based access control policies," IEE Proceedings of Software, vol. 147, no. 4, pp. 117-129, 2000.
    • (2000) IEE Proceedings of Software , vol.147 , Issue.4 , pp. 117-129
    • Hitchens, M.1    Varadharajan, V.2
  • 10
    • 0036505670 scopus 로고    scopus 로고
    • A comparison of methods for multiclass support vector machines
    • C. W. Hsu and C. J. Lin, "A comparison of methods for multiclass support vector machines," IEEE Transactions on Neural Networks, vol. 13, no. 2, pp. 415-425, 2002.
    • (2002) IEEE Transactions on Neural Networks , vol.13 , Issue.2 , pp. 415-425
    • Hsu, C.W.1    Lin, C.J.2
  • 11
    • 0024738556 scopus 로고
    • On the design of a single-key-lock mechanism based on Newton's interpolating polynomial
    • C. S. Laih, L. Harn, and J. Y. Lee, "On the design of a single-key-lock mechanism based on Newton's interpolating polynomial," IEEE Transactions on Software Engineering, vol. 15, no. 9, pp. 1135-1137, 1989.
    • (1989) IEEE Transactions on Software Engineering , vol.15 , Issue.9 , pp. 1135-1137
    • Laih, C.S.1    Harn, L.2    Lee, J.Y.3
  • 12
    • 0023965320 scopus 로고
    • The source of authority for commercial access control
    • J. D. Moffett and M. S. Sloman, "The source of authority for commercial access control," IEEE Computer Journal, vol. 21, no. 2, pp. 59-69, 1988.
    • (1988) IEEE Computer Journal , vol.21 , Issue.2 , pp. 59-69
    • Moffett, J.D.1    Sloman, M.S.2
  • 13
    • 0033967085 scopus 로고    scopus 로고
    • How good are support vector machines?
    • S. Raudys, "How good are support vector machines?," Neural Networks, vol. 13, no. 1, pp. 17-19.
    • Neural Networks , vol.13 , Issue.1 , pp. 17-19
    • Raudys, S.1
  • 15
    • 0030086382 scopus 로고    scopus 로고
    • Role based access control models
    • Feb
    • R. Sandhu, E. J. Coyne, and H. L. Feinstein, "Role based access control models," IEEE Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996.
    • (1996) IEEE Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.J.2    Feinstein, H.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.