메뉴 건너뛰기




Volumn 7140 LNCS, Issue , 2012, Pages 198-213

TBA: A hybrid of logic and extensional access control systems

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL MODELS; ACCESS CONTROL POLICIES; AUTHORIZATION POLICY; DAY-TO-DAY OPERATIONS; EASE-OF-USE; HYBRID APPROACH; LOGICAL LANGUAGE; LOGICAL SYSTEM; TAG-BASED;

EID: 84863898631     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-29420-4_13     Document Type: Conference Paper
Times cited : (7)

References (20)
  • 1
    • 79951880667 scopus 로고    scopus 로고
    • SecPAL: Design and semantics of a decentralized authorization language
    • Becker, M.Y., Fournet, C.Y., Gordon, A.D.: SecPAL: Design and semantics of a decentralized authorization language. JCS (2009)
    • (2009) JCS
    • Becker, M.Y.1    Fournet, C.Y.2    Gordon, A.D.3
  • 2
    • 0041524664 scopus 로고    scopus 로고
    • A logical framework for reasoning about access control models
    • Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A logical framework for reasoning about access control models. ACM TISSEC 6(1), 71-127 (2003)
    • (2003) ACM TISSEC , vol.6 , Issue.1 , pp. 71-127
    • Bertino, E.1    Catania, B.2    Ferrari, E.3    Perlasca, P.4
  • 3
    • 84863917765 scopus 로고    scopus 로고
    • A logical framework for reasoning on data access control policies
    • Bertino, E., Ferrari, E., Buccafurri, F., Rullo, P.: A logical framework for reasoning on data access control policies. In: IEEE CSFW(1999)
    • (1999) IEEE CSFW
    • Bertino, E.1    Ferrari, E.2    Buccafurri, F.3    Rullo, P.4
  • 4
    • 0040884892 scopus 로고    scopus 로고
    • A flexible authorization mechanism for relational data management systems
    • Bertino, E., Jajodia, S., Samarati, P.: A flexible authorization mechanism for relational data management systems. ACM TISSEC 17(2), 101-140 (1999)
    • (1999) ACM TISSEC , vol.17 , Issue.2 , pp. 101-140
    • Bertino, E.1    Jajodia, S.2    Samarati, P.3
  • 6
    • 0034446895 scopus 로고    scopus 로고
    • A modular approach to composing access control policies
    • Bonatti, P.A., di Vimercati, S.D., Samarati, P.: A modular approach to composing access control policies. In: ACM CCS, pp. 164-173 (2000)
    • (2000) ACM CCS , pp. 164-173
    • Bonatti, P.A.1    Di Vimercati, S.D.2    Samarati, P.3
  • 7
    • 80052494019 scopus 로고    scopus 로고
    • Consumable credentials in logic-based access-control systems
    • Bowers, K.D., Bauer, L., Garg, D., Pfenning, F., Reiter, M.K.: Consumable credentials in logic-based access-control systems. In: NDSS, pp. 143-157 (2007)
    • (2007) NDSS , pp. 143-157
    • Bowers, K.D.1    Bauer, L.2    Garg, D.3    Pfenning, F.4    Reiter, M.K.5
  • 8
    • 84863917764 scopus 로고    scopus 로고
    • Access-control policies via belnap logic: Effective and efficient composition and analysis
    • Bruns, G., Huth, M.: Access-control policies via belnap logic: Effective and efficient composition and analysis. In: IEEE CSF (2008)
    • (2008) IEEE CSF
    • Bruns, G.1    Huth, M.2
  • 9
    • 84863960986 scopus 로고    scopus 로고
    • Analyzing consistency of security policies
    • Cholvy, L., Cuppens, F.: Analyzing consistency of security policies. In: IEEE S&P (1997)
    • (1997) IEEE S&P
    • Cholvy, L.1    Cuppens, F.2
  • 10
    • 33745801960 scopus 로고    scopus 로고
    • Understanding and developing role-based administrative models
    • Crampton, J.: Understanding and developing role-based administrative models. In: ACM CCS, pp. 158-167 (2005)
    • (2005) ACM CCS , pp. 158-167
    • Crampton, J.1
  • 11
    • 84863962704 scopus 로고    scopus 로고
    • Merging security policies: Analysis of a practical example
    • Cuppens, F., Cholvy, L., Saurel, C., Carrere, J.: Merging security policies: analysis of a practical example. In: IEEE CSFW(1998)
    • (1998) IEEE CSFW
    • Cuppens, F.1    Cholvy, L.2    Saurel, C.3    Carrere, J.4
  • 12
    • 84863960988 scopus 로고    scopus 로고
    • Using first-order logic to reason about policies
    • Halpern, J.Y.,Weissman, V.: Using first-order logic to reason about policies. In: IEEE CSFW (2003)
    • (2003) IEEE CSFW
    • Halpern, J.Y.1    Weissman, V.2
  • 14
    • 84863920160 scopus 로고    scopus 로고
    • Design of a role-based trust-management framework
    • Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust-management framework. In: IEEE S&P (2002)
    • (2002) IEEE S&P
    • Li, N.1    Mitchell, J.C.2    Winsborough, W.H.3
  • 15
    • 57049146342 scopus 로고    scopus 로고
    • Supporting selective information sharing with people-tagging
    • Razavi, M.N., Iverson, L.: Supporting selective information sharing with people-tagging. In: CHI Extended Abstracts, pp. 3423-3428 (2008)
    • (2008) CHI Extended Abstracts , pp. 3423-3428
    • Razavi, M.N.1    Iverson, L.2
  • 16
    • 84945150402 scopus 로고    scopus 로고
    • SPL: An access control language for security policies with complex constraints
    • Ribeiro, C., Zuquete, A., Ferreira, P., Guedes, P.: SPL: An access control language for security policies with complex constraints. In: NDSS (2001)
    • (2001) NDSS
    • Ribeiro, C.1    Zuquete, A.2    Ferreira, P.3    Guedes, P.4
  • 17
    • 33847356528 scopus 로고    scopus 로고
    • A theory for comparing the expressive power of access control models
    • Tripunitara, M.V., Li, N.: A theory for comparing the expressive power of access control models. JCS 15(2), 231-272 (2007)
    • (2007) JCS , vol.15 , Issue.2 , pp. 231-272
    • Tripunitara, M.V.1    Li, N.2
  • 18
    • 84863962705 scopus 로고    scopus 로고
    • .S. Air Force Scientific Advisory Board Technical report, MITRE Corporation
    • U.S. Air Force Scientific Advisory Board. Networking to enable coalition operations. Technical report, MITRE Corporation (2004)
    • (2004) Networking to Enable Coalition Operations
  • 19
    • 70350353222 scopus 로고    scopus 로고
    • Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging
    • Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
    • Wang, Q., Jin, H., Li, N.: Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 268-284. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5789 , pp. 268-284
    • Wang, Q.1    Jin, H.2    Li, N.3
  • 20
    • 0037673317 scopus 로고    scopus 로고
    • Policy algebras for access control - The predicate case
    • Wijesekera, D., Jajodia, S.: Policy algebras for access control - the predicate case. In: ACM CCS, pp. 171-180 (2001)
    • (2001) ACM CCS , pp. 171-180
    • Wijesekera, D.1    Jajodia, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.