메뉴 건너뛰기




Volumn 31, Issue 4, 2012, Pages 540-556

DomRBAC: An access control model for modern collaborative systems

Author keywords

Access control; Cross domain authorization; Grid computing; RBAC; Resource usage management; Secure inter operation

Indexed keywords

ACCESS CONTROL MODELS; CARDINALITY CONSTRAINTS; COLLABORATIVE APPLICATION; COLLABORATIVE SYSTEMS; COMPUTING PARADIGM; CONTEXT INFORMATION; CROSS-DOMAIN; ENHANCED ROLE-BASED ACCESS CONTROL; EXPERIMENTAL STUDIES; HETEROGENEOUS RESOURCES; MULTIPLE DOMAINS; PROOF OF CONCEPT; RBAC; RESOURCE SHARING; RESOURCE USAGE; ROLE ASSIGNMENT; ROLE-BASED ACCESS CONTROL MODEL; SECURE INTER-OPERATION; SECURITY POLICY; SEPARATION OF DUTY; VIRTUAL ORGANIZATION;

EID: 84861095268     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2012.01.010     Document Type: Article
Times cited : (35)

References (45)
  • 7
    • 17044423787 scopus 로고    scopus 로고
    • Authorisation in Grid computing
    • DOI 10.1016/j.istr.2004.11.004, PII S1363412704000056
    • D. Chadwick Authorisation in grid computing Information Security Technical Report 10 2005 33 40 (Pubitemid 40497374)
    • (2005) Information Security Technical Report , vol.10 , Issue.1 , pp. 33-40
    • Chadwick, D.1
  • 8
    • 0037362986 scopus 로고    scopus 로고
    • Role-based access control with x. 509 attribute certificates
    • D. Chadwick, A. Otenko, and E. Ball Role-based access control with x. 509 attribute certificates Internet Computing, IEEE 7 2003 62 69
    • (2003) Internet Computing, IEEE , vol.7 , pp. 62-69
    • Chadwick, D.1    Otenko, A.2    Ball, E.3
  • 10
    • 34548013110 scopus 로고    scopus 로고
    • Inter-domain role mapping and least privilege
    • DOI 10.1145/1266840.1266866, SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
    • L. Chen, and J. Crampton Inter-domain role mapping and least privilege SACMAT'07: proceedings of the 12th ACM symposium on access control models and technologies 2007 ACM New York, NY, USA 157 162 (Pubitemid 47281550)
    • (2007) Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT , pp. 157-162
    • Chen, L.1    Crampton, J.2
  • 13
    • 85024279627 scopus 로고    scopus 로고
    • Describing the elephant: The different faces of it as service
    • I. Foster, and S. Tuecke Describing the elephant: the different faces of it as service Queue 3 2005 26 29
    • (2005) Queue , vol.3 , pp. 26-29
    • Foster, I.1    Tuecke, S.2
  • 15
    • 79958784381 scopus 로고    scopus 로고
    • Role-based secure inter-operation and resource usage management in mobile grid systems
    • C. Ardagna, J. Zhou, Springer Berlin/Heidelberg Volume 6633 of Lecture Notes in Computer Science
    • A. Gouglidis, and I. Mavridis Role-based secure inter-operation and resource usage management in mobile grid systems C. Ardagna, J. Zhou, Information security theory and practice. Security and privacy of mobile devices in wireless communication 2011 Springer Berlin/Heidelberg 38 53 Volume 6633 of Lecture Notes in Computer Science
    • (2011) Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication , pp. 38-53
    • Gouglidis, A.1    Mavridis, I.2
  • 22
    • 37249020924 scopus 로고    scopus 로고
    • A critique of the ANSI standard on role-based access control
    • DOI 10.1109/MSP.2007.158
    • N. Li, J. Byun, and E. Bertino A critique of the ansi standard on role-based access control Security Privacy, IEEE 5 2007 41 49 (Pubitemid 350274187)
    • (2007) IEEE Security and Privacy , vol.5 , Issue.6 , pp. 41-49
    • Li, N.1    Byun, J.-W.2    Bertino, E.3
  • 23
    • 84861100668 scopus 로고    scopus 로고
    • Networkx
    • NetworkX Networkx 2011
    • (2011) Networkx
  • 30
    • 0348001131 scopus 로고
    • A transitive closure algorithm
    • 10.1007/BF01940892
    • P. Purdom A transitive closure algorithm BIT Numerical Mathematics 10 1970 76 94 10.1007/BF01940892
    • (1970) BIT Numerical Mathematics , vol.10 , pp. 76-94
    • Purdom, P.1
  • 33
    • 35248873795 scopus 로고    scopus 로고
    • Usage control: A vision for next generation access control
    • Springer Berlin/Heidelberg
    • R. Sandhu, and J. Park Usage control: a vision for next generation access control Computer network security vol. 2776 2003 Springer Berlin/Heidelberg 17 31
    • (2003) Computer Network Security , vol.2776 , pp. 17-31
    • Sandhu, R.1    Park, J.2
  • 37
    • 30644461515 scopus 로고    scopus 로고
    • SERAT: SEcure Role mApping Technique for decentralized secure interoperability
    • DOI 10.1145/1063979.1064007, SACMAT 2005: Proceedings of 10th ACM Symposium on Access Control Models and Technologies
    • M. Shehab, E. Bertino, and A. Ghafoor Serat: secure role mapping technique for decentralized secure interoperability SACMAT'05: proceedings of the tenth ACM symposium on Access control models and technologies 2005 ACM New York, NY, USA 159 167 (Pubitemid 43087472)
    • (2005) Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT , pp. 159-167
    • Shehab, M.1    Bertino, E.2    Ghafoor, A.3
  • 42
    • 33749080076 scopus 로고    scopus 로고
    • Attributed Based Access Control (ABAC) for web services
    • DOI 10.1109/ICWS.2005.25, 1530847, Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005
    • E. Yuan, and J. Tong Attributed based access control (abac) for web services Web Services, IEEE International Conference on 0 2005 561 569 (Pubitemid 44460249)
    • (2005) Proceedings - 2005 IEEE International Conference on Web Services, ICWS 2005 , vol.2005 , pp. 561-569
    • Yuan, E.1    Tong, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.