메뉴 건너뛰기




Volumn 9, Issue 5, 2012, Pages 670-683

Access control with privacy enhancements a unified approach

Author keywords

access control; metamodeling; privacy; Security

Indexed keywords

COMPUTATION THEORY; DATA PRIVACY; ELECTRICAL ENGINEERING;

EID: 84864743963     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2012.22     Document Type: Article
Times cited : (7)

References (31)
  • 1
    • 84864747393 scopus 로고    scopus 로고
    • ANSI, RBACiNCITS,359-2004
    • ANSI, "RBAC," iNCITS 359-2004, 2004.
    • (2004)
  • 4
    • 19244381332 scopus 로고
    • Logic programming and knowledge representation
    • C. Baral and M. Gelfond, "Logic Programming and Knowledge Representation," J. Logic Programming, vols. 19/20, pp. 73-148, 1994.
    • (1994) J. Logic Programming, vols. , vol.19-20 , pp. 73-148
    • Baral, C.1    Gelfond, M.2
  • 8
    • 3042584122 scopus 로고    scopus 로고
    • Flexible access control policy specification with constraint logic programming
    • S. Barker and P. Stuckey, "Flexible Access Control Policy Specification with Constraint Logic Programming," ACM Trans. Information and System Security, vol. 6, no. 4, pp. 501-546, 2003.
    • (2003) ACM Trans. Information and System Security , vol.6 , Issue.4 , pp. 501-546
    • Barker, S.1    Stuckey, P.2
  • 9
    • 77954754889 scopus 로고    scopus 로고
    • Secpal: Design and semantics of a decentralized authorization language
    • M.Y. Becker, C. Fournet, and A.D. Gordon, "SecPAL: Design and Semantics of a Decentralized Authorization Language," J. Computer Security, vol. 18, no. 4, pp. 619-665, 2010.
    • (2010) J. Computer Security , vol.18 , Issue.4 , pp. 619-665
    • Becker, M.Y.1    Fournet, C.2    Gordon, A.D.3
  • 15
    • 3042822164 scopus 로고    scopus 로고
    • P3p: Making privacy policies more useful
    • Nov./Dec.
    • L.F. Cranor, "P3P: Making Privacy Policies More Useful," IEEE Security & Privacy, vol. 1, no. 6, pp. 50-55, Nov./Dec. 2003.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.6 , pp. 50-55
    • Cranor, L.F.1
  • 19
    • 77951505493 scopus 로고
    • Classical negation in logic programs and disjunctive databases
    • M. Gelfond and V. Lifschitz, "Classical Negation in Logic Programs and Disjunctive Databases," New Generation Computing, vol. 9, pp. 365-385, 1991.
    • (1991) New Generation Computing , vol.9 , pp. 365-385
    • Gelfond, M.1    Lifschitz, V.2
  • 23
    • 58549107635 scopus 로고    scopus 로고
    • The dlv project: A tour from theory and research to applications and market
    • N. Leone and W. Faber, "The Dlv Project: A Tour from Theory and Research to Applications and Market," Proc. Int'l Conf. Logic Programming (ICLP), pp. 53-68, 2008.
    • (2008) Proc. Int'l Conf. Logic Programming (ICLP) , pp. 53-68
    • Leone, N.1    Faber, W.2
  • 26
  • 29
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • Feb.
    • R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-Based Access Control Models," Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996.
    • (1996) Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Youman, C.4
  • 31
    • 33845705535 scopus 로고    scopus 로고
    • Handling distributed authorization with delegation through answer set programming
    • DOI 10.1007/s10207-006-0008-4
    • S. Wang and Y. Zhang, "Handling Distributed Authorization with Delegation through Answer Set Programming," Int'l J. Information Security, vol. 6, no. 1, pp. 27-46, 2007. (Pubitemid 44963967)
    • (2007) International Journal of Information Security , vol.6 , Issue.1 , pp. 27-46
    • Wang, S.1    Zhang, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.