메뉴 건너뛰기




Volumn , Issue , 2012, Pages 176-182

Bayesian networks for modeling failure dependency in access control models

Author keywords

access control modeling; asset control Bayesian network; asset control graph; object right relationship; security engineering

Indexed keywords

ACCESS AUTHENTICATIONS; ACCESS CONTROL MODELS; ACCESS TO RESOURCES; ASSET-CONTROL GRAPH; GRAPH-THEORETIC; IDENTIFICATION AND EVALUATION; MODELING FAILURES; MODELING FORMALISMS; MODELING TECHNIQUE; OBJECT-RIGHT RELATIONSHIP; RESEARCH DIRECTIONS; SECURITY ENGINEERING; SECURITY GOALS;

EID: 84867177526     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (1)

References (11)
  • 1
    • 0028513932 scopus 로고
    • Access control: Principle and practice
    • R. S. Sandhu and P. Samarati, "Access control: principle and practice," Communications Magazine, IEEE, vol. 32, no. 9, pp. 40-48, 1994.
    • (1994) Communications Magazine, IEEE , vol.32 , Issue.9 , pp. 40-48
    • Sandhu, R.S.1    Samarati, P.2
  • 4
    • 33749069296 scopus 로고
    • US DoD, National Computer Security Center
    • US DoD, Glossary of Computer Security Terms. National Computer Security Center, 1988.
    • (1988) Glossary of Computer Security Terms
  • 7
    • 0035283768 scopus 로고    scopus 로고
    • Improving the analysis of dependable systems by mappin fault trees into bayesian networks
    • A. Bobbio, L. Portinale, M. Minichino, and E. Ciancamerla, "Improving the analysis of dependable systems by mappin fault trees into bayesian networks," Reliability Engineering & System Safety, vol. 71, no. 3, pp. 249-260, 2001.
    • (2001) Reliability Engineering & System Safety , vol.71 , Issue.3 , pp. 249-260
    • Bobbio, A.1    Portinale, L.2    Minichino, M.3    Ciancamerla, E.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.