메뉴 건너뛰기




Volumn , Issue , 2003, Pages 77-80

Analysis of integrity policies using soft constraints

Author keywords

[No Author keywords available]

Indexed keywords

APPLICATION SYSTEMS; COMPLEX APPLICATIONS; CONSTRAINT SOLVING; INTEGRITY POLICY; QUANTITATIVE TECHNIQUES; SECURITY MECHANISM; SOFT CONSTRAINT;

EID: 84856166143     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/POLICY.2003.1206959     Document Type: Conference Paper
Times cited : (11)

References (16)
  • 1
    • 84948414101 scopus 로고    scopus 로고
    • Soft constraints for security protocol analysis: Confidentiality
    • In Proc. PADL'01 Springer
    • G. Bella and S. Bistarelli. Soft constraints for security protocol analysis: Confidentiality. In Proc. PADL'01, volume 1990 of Lecture Notes in Computer Science (LNCS). Springer, 2001.
    • (2001) Lecture Notes in Computer Science (LNCS) , vol.1990
    • Bella, G.1    Bistarelli, S.2
  • 3
    • 0003400255 scopus 로고
    • Integrity considerations for secure computer systems
    • MITRE Corp Bedford MA
    • K. Biba. Integrity considerations for secure computer systems. Technical Report MTR-3153 Rev 1 (ESD-TR-76-372), MITRE Corp Bedford MA, 1976.
    • (1976) Technical Report MTR-3153 Rev 1 (ESD-TR-76-372)
    • Biba, K.1
  • 4
    • 0031095278 scopus 로고    scopus 로고
    • Semiring-based Constraint Solving and Optimization
    • Mar
    • S. Bistarelli, U. Montanari, and F. Rossi. Semiring-based Constraint Solving and Optimization. Journal of the ACM, 44(2):201-236, Mar 1997.
    • (1997) Journal of the ACM , vol.44 , Issue.2 , pp. 201-236
    • Bistarelli, S.1    Montanari, U.2    Rossi, F.3
  • 5
    • 84948412454 scopus 로고    scopus 로고
    • Soft concurrent constraint programming
    • In Proc. ESOP April 6-14, 2002 Grenoble, France Springer-Verlag
    • S. Bistarelli, U. Montanari, and F. Rossi. Soft concurrent constraint programming. In Proc. ESOP, April 6-14, 2002, Grenoble, France, LNCS. Springer-Verlag, 2002.
    • (2002) LNCS
    • Bistarelli, S.1    Montanari, U.2    Rossi, F.3
  • 6
    • 0006782323 scopus 로고
    • Constraint-based software for concurrent engineering
    • Jan
    • J. Bowen and D. Bahler. Constraint-based software for concurrent engineering. IEEE Computer, 26(1):66-68, Jan. 1993.
    • (1993) IEEE Computer , vol.26 , Issue.1 , pp. 66-68
    • Bowen, J.1    Bahler, D.2
  • 7
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security models
    • IEEE Computer Society Press, Apr
    • D. D. Clark and D. R. Wilson. A comparison of commercial and military computer security models. In Proceedings Symposium on Security and Privacy, pages 184-194. IEEE Computer Society Press, Apr. 1987.
    • (1987) Proceedings Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 8
    • 33748435812 scopus 로고    scopus 로고
    • Computer Security Institute/US Federal Bureau of Investigation
    • Computer Security Institute/US Federal Bureau of Investigation. Computer Crime and Security Survey, 2001.
    • (2001) Computer Crime and Security Survey
  • 10
    • 33646428027 scopus 로고    scopus 로고
    • Optimal planning of digital cordless telecommunication systems
    • London, UH
    • T. Fr̈uhwirth and P. Brisset. Optimal planning of digital cordless telecommunication systems. In Proc. PACT97, London, UH, 1997.
    • (1997) Proc. PACT97
    • Fr̈uhwirth, T.1    Brisset, P.2
  • 12
    • 0000959937 scopus 로고
    • Constraint satisfaction
    • In S. Shapiro, editor John Wiley & Sons
    • A. Mackworth. Constraint satisfaction. In S. Shapiro, editor, Encyclopedia of AI (second edition), pages 285-293. John Wiley & Sons, 1992.
    • (1992) Encyclopedia of AI (Second Edition) , pp. 285-293
    • MacKworth, A.1
  • 14
    • 0030086382 scopus 로고    scopus 로고
    • Role based access control models
    • R. Sandhu et al. Role based access control models. IEEE Computer, 29(2), 1996.
    • (1996) IEEE Computer , vol.29 , pp. 2
    • Sandhu, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.