메뉴 건너뛰기




Volumn 173, Issue , 2005, Pages 219-232

Discretionary overriding of access control in the privilege calculus

Author keywords

[No Author keywords available]

Indexed keywords

CALCULATIONS;

EID: 84860699599     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/0-387-24098-5_16     Document Type: Conference Paper
Times cited : (10)

References (10)
  • 6
    • 84902509625 scopus 로고    scopus 로고
    • OASIS (2004). http://www.oasis-open.org/committees/tc_home.php?wg.abbrev=xacml.
    • (2004) OASIS
  • 7
    • 85084164092 scopus 로고    scopus 로고
    • Enforcing well-formed and partially formed transactions for UNIX
    • In
    • Povey, Dean (1999). Enforcing well-formed and partially formed transactions for UNIX. In Proceedings of the 8th USEN1X Security Symposium, pages 47-62.
    • (1999) Proceedings of the 8th USEN1X Security Symposium , pp. 47-62
    • Povey, D.1
  • 9
    • 84902521271 scopus 로고    scopus 로고
    • Towards a mechanism for discretionary overriding of access control, position paper
    • Presented at, Cambridge, UK
    • Rissanen, Erik, Firozabadi, Babak Sadighi, and Sergot, Marek (2004). Towards a mechanism for discretionary overriding of access control, position paper. Presented at Security Protocols, 12th International Workshop, Cambridge, UK.
    • (2004) Security Protocols, 12th International Workshop
    • Rissanen, E.1    Firozabadi, B.S.2    Sergot, M.3
  • 10
    • 0038336804 scopus 로고    scopus 로고
    • A new dimension in access control: Studying maintenance engineering across organizational boundaries
    • In, ACM Press
    • Stevens, Gunnar and Wulf, Volker (2002). A new dimension in access control: studying maintenance engineering across organizational boundaries. In Proceedings of the 2002 ACM conference on Computer supported cooperative work, pages 196-205. ACM Press.
    • (2002) Proceedings of the 2002 ACM conference on Computer supported cooperative work , pp. 196-205
    • Stevens, G.1    Wulf, V.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.