메뉴 건너뛰기




Volumn 6, Issue 2, 2012, Pages

Integrating trust management and access control in data-intensive web applications

Author keywords

Access control; Relational databases; Trust management

Indexed keywords

SECURITY OF DATA; WEB CRAWLER; WEB SERVICES; WEBSITES;

EID: 84863623874     PISSN: 15591131     EISSN: 1559114X     Source Type: Journal    
DOI: 10.1145/2180861.2180863     Document Type: Article
Times cited : (27)

References (48)
  • 4
    • 0036311802 scopus 로고    scopus 로고
    • A unified framework for regulating access and information release on the Web
    • BONATTI, P. AND SAMARATI, P. 2002. A unified framework for regulating access and information release on the Web. J. Comput, Secur. 10, 3, 241-272.
    • (2002) J. Comput, Secur. , vol.10 , Issue.3 , pp. 241-272
    • Bonatti, P.1    Samarati, P.2
  • 8
    • 0028515678 scopus 로고
    • Automatic generation of production rules for integrity maintenance
    • CERI, S., FRATERNALI, P., PARABOSCHI, S., AND TANCA, L. 1994. Automatic generation of production rules for integrity maintenance. ACM Trans. Datab. Syst. 19, 3, 367-422.
    • (1994) ACM Trans. Datab. Syst. , vol.19 , Issue.3 , pp. 367-422
    • Ceri, S.1    Fraternali, P.2    Paraboschi, S.3    Tanca, L.4
  • 14
    • 0003981627 scopus 로고    scopus 로고
    • SPKI requirements
    • ELLISON, C. 1999. SPKI requirements. Internet RFC 2692. http://www.ietf.org/rfc/rfc2692.txt.
    • (1999) Internet RFC 2692
    • Ellison, C.1
  • 23
    • 57949107810 scopus 로고    scopus 로고
    • Enforcing safety and consistency constraints in policy-based authorization systems
    • LEE, A. AND WINSLETT, M. 2008a. Enforcing safety and consistency constraints in policy-based authorization systems. ACM Trans. Inf. Syst. Secur. 12, 2, 1-33.
    • (2008) ACM Trans. Inf. Syst. Secur. , vol.12 , Issue.2 , pp. 1-33
    • Lee, A.1    Winslett, M.2
  • 27
    • 30544438141 scopus 로고    scopus 로고
    • Beyond proof-of-compliance: Security analysis in trust management
    • DOI 10.1145/1066100.1066103
    • LI, N., MITCHELL, J., AND WINSBOROUGH, W. 2005b. Beyond proof-of compliance: Security analysis in trust management. J. ACM 52, 3, 474-514. (Pubitemid 43078378)
    • (2005) Journal of the ACM , vol.52 , Issue.3 , pp. 474-514
    • Li, N.1    Mitchell, J.C.2    Winsborough, W.H.3
  • 28
  • 29
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • LI, N., WINSBOROUGH, W., AND MITCHELL, J. 2003. Distributed credential chain discovery in trust management. J. Comput. Secur. 11, 1, 35-86.
    • (2003) J. Comput. Secur. , vol.11 , Issue.1 , pp. 35-86
    • Li, N.1    Winsborough, W.2    Mitchell, J.3
  • 33
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • NEEDHAM, R. M. AND SCHROEDER, M. D. 1978. Using encryption for authentication in large networks of computers. Comm. ACM 21, 12, 993-999.
    • (1978) Comm. ACM , vol.21 , Issue.12 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 38
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • SALTZER, J. AND SCHROEDER, M. 1975. The protection of information in computer systems. Proc. IEEE 63, 9, 1278-1308.
    • (1975) Proc. IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 43
    • 0031338080 scopus 로고    scopus 로고
    • Using digital credentials on the World Wide Web
    • WINSLETT, M., CHING, N., JONES, V., AND SLEPCHIN, I. 1997. Using digital credentials on the World Wide Web. J. Comput. Secur. 5, 3, 255-267.
    • (1997) J. Comput. Secur. , vol.5 , Issue.3 , pp. 255-267
    • Winslett, M.1    Ching, N.2    Jones, V.3    Slepchin, I.4
  • 46
  • 48
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • YU, T., WINSLETT, M., AND SEAMONS, K. 2003. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur. 6, 1, 1-42.
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.