메뉴 건너뛰기




Volumn , Issue , 2012, Pages 137-144

A provenance-based access control model

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL MODELS; ACCESS CONTROL POLICIES; BASE MODELS; DATA PROVENANCE; DYNAMIC SEPARATION OF DUTY; ESSENTIAL COMPONENT; OBJECT VERSIONING; POLICY SPECIFICATION; WORKFLOW CONTROL;

EID: 84868256261     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PST.2012.6297930     Document Type: Conference Paper
Times cited : (96)

References (27)
  • 1
    • 84868259107 scopus 로고    scopus 로고
    • Accessed: 03/31/2012
    • Pql-path query language. http://www.eecs.harvard.edu/syrah/pql/. Accessed: 03/31/2012.
    • Pql-path Query Language
  • 4
    • 24144435318 scopus 로고    scopus 로고
    • History-based access control and secure information flow
    • Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, International Workshop (CASSIS 2004), Revised Selected Papers, Springer-Verlag
    • A. Banerjee and D. A. Naumann. History-based access control and secure information flow. In Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, International Workshop (CASSIS 2004), Revised Selected Papers, volume 3362 of Lecture Notes in Computer Science, pages 27-48. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3362 , pp. 27-48
    • Banerjee, A.1    Naumann, D.A.2
  • 12
    • 67349098774 scopus 로고    scopus 로고
    • Regular paths in sparql: Querying the nci thesaurus
    • American Medical Informatics Association
    • L. Detwiler, D. Suciu, and J. Brinkley. Regular paths in sparql: querying the nci thesaurus. In AMIA Annual Symposium Proceedings. American Medical Informatics Association, 2008.
    • (2008) AMIA Annual Symposium Proceedings
    • Detwiler, L.1    Suciu, D.2    Brinkley, J.3
  • 14
    • 79953212555 scopus 로고    scopus 로고
    • Representing distributed systems using the open provenance model
    • P. Groth and L. Moreau. Representing distributed systems using the open provenance model. Future Generation Computer Systems, 27(6):757-765, 2011.
    • (2011) Future Generation Computer Systems , vol.27 , Issue.6 , pp. 757-765
    • Groth, P.1    Moreau, L.2
  • 17
    • 73849140516 scopus 로고    scopus 로고
    • Preventing history forgery with secure provenance
    • Dec.
    • R. Hasan, R. Sion, and M. Winslett. Preventing history forgery with secure provenance. Trans. Storage, 5(4):12:1-12:43, Dec. 2009.
    • (2009) Trans. Storage , vol.5 , Issue.4
    • Hasan, R.1    Sion, R.2    Winslett, M.3
  • 25
    • 0347380518 scopus 로고
    • Separation of duties in computerized information systems
    • North-Holland
    • R. Sandhu. Separation of duties in computerized information systems. In IN DATABASE SECURITY IV: STATUS AND PROSPECTS, pages 179-189. North-Holland, 1990.
    • (1990) Database Security IV: Status and Prospects , pp. 179-189
    • Sandhu, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.