메뉴 건너뛰기




Volumn 63, Issue 9, 2012, Pages 930-940

Access control for semantic data federations in industrial product-lifecycle management

Author keywords

Access control; Data federation; Information integration; Product lifecycle management; Semantic data

Indexed keywords

BUSINESS PARTNERS; COMPLEX SUPPLY CHAIN; CONFIDENTIAL DATA; CONTROLLED SHARING; DATA FEDERATION; INDUSTRIAL SERVICES; INFORMATION INTEGRATION; PERFORMANCE EXPERIMENT; PRODUCT LIFE CYCLE MANAGEMENT; SECURITY SERVICES; SEMANTIC DATA; SEMANTIC REPOSITORY; SEMANTIC TECHNOLOGIES;

EID: 84868510699     PISSN: 01663615     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.compind.2012.08.015     Document Type: Article
Times cited : (19)

References (53)
  • 1
    • 33744823157 scopus 로고    scopus 로고
    • Product lifecycle management: Closing the knowledge loops
    • F. Ameri, and D. Dutta Product lifecycle management: closing the knowledge loops Computer-Aided Design and Applications 2 5 2005 577 590
    • (2005) Computer-Aided Design and Applications , vol.2 , Issue.5 , pp. 577-590
    • Ameri, F.1    Dutta, D.2
  • 4
    • 84868467411 scopus 로고    scopus 로고
    • Aletheia
    • Aletheia, Aletheia Project Web Site (2010). http://www.aletheia-projekt. de.
    • (2010) Aletheia Project Web Site
  • 6
    • 84957006898 scopus 로고    scopus 로고
    • Access control and trust in the use of widely distributed services
    • Springer
    • J. Bacon, K. Moody, and W. Yao Access control and trust in the use of widely distributed services Middleware 2001 2001 Springer 295 310
    • (2001) Middleware 2001 , pp. 295-310
    • Bacon, J.1    Moody, K.2    Yao, W.3
  • 8
    • 84864067675 scopus 로고    scopus 로고
    • Economic Analysis of Role-Based Access Control
    • December 2010
    • A.C. O'Connor, R.J. Loomis, 2010. Economic Analysis of Role-Based Access Control, NIST Final Report (December 2010).
    • (2010) NIST Final Report
    • O'Connor, A.C.1    Loomis, R.J.2
  • 9
    • 84868476756 scopus 로고    scopus 로고
    • Comparing Administrative Cost for Hierarchical and Non-hierarchical Role Representations
    • November
    • D. Ferraiolo, J. Barkley, Comparing Administrative Cost for Hierarchical and Non-hierarchical Role Representations, Second ACM Workshop on Role-Based Access Control (November 1997).
    • (1997) Second ACM Workshop on Role-Based Access Control
    • Ferraiolo, D.1    Barkley, J.2
  • 12
    • 0002841051 scopus 로고    scopus 로고
    • Task-Based Authorization Controls (TBAC): A family of models for active and enterprise-oriented authorization management
    • R. Thomas, and R. Sandhu Task-Based Authorization Controls (TBAC): a family of models for active and enterprise-oriented authorization management Database Security 11 1998 166 181
    • (1998) Database Security , vol.11 , pp. 166-181
    • Thomas, R.1    Sandhu, R.2
  • 15
    • 0038825675 scopus 로고    scopus 로고
    • Task-role-based access control model
    • S. Oh, and S. Park Task-role-based access control model Information Systems 28 6 2003 533 562
    • (2003) Information Systems , vol.28 , Issue.6 , pp. 533-562
    • Oh, S.1    Park, S.2
  • 20
    • 37249020924 scopus 로고    scopus 로고
    • A critique of the ANSI standard on role-based access control
    • N. Li, J.-W. Byun, and E. Bertino A critique of the ANSI standard on role-based access control IEEE Security and Privacy 5 6 2007 41 49
    • (2007) IEEE Security and Privacy , vol.5 , Issue.6 , pp. 41-49
    • Li, N.1    Byun, J.-W.2    Bertino, E.3
  • 21
    • 37249093004 scopus 로고    scopus 로고
    • RBAC standard rationale: Comments on a critique of the ANSI standard on role based access control
    • D. Ferraiolo, R. Kuhn, and R. Sandhu RBAC standard rationale: comments on a critique of the ANSI standard on role based access control IEEE Security & Privacy 5 6 2007 51 53
    • (2007) IEEE Security & Privacy , vol.5 , Issue.6 , pp. 51-53
    • Ferraiolo, D.1    Kuhn, R.2    Sandhu, R.3
  • 24
    • 3543052334 scopus 로고    scopus 로고
    • First experiences using XACML for access control in distributed systems
    • Fairfax, Virginia
    • M. Lorch, S. Proctor, R. Lepro, D. Kafura, and S. Shah First experiences using XACML for access control in distributed systems ACM Workshop on XML Security Fairfax, Virginia 2003 25 37
    • (2003) ACM Workshop on XML Security , pp. 25-37
    • Lorch, M.1    Proctor, S.2    Lepro, R.3    Kafura, D.4    Shah, S.5
  • 25
  • 39
    • 54249094230 scopus 로고    scopus 로고
    • Query rewriting for access control on semantic web
    • J. Li, and W. Cheung Query rewriting for access control on semantic web Secure Data Management 2008 151 168
    • (2008) Secure Data Management , pp. 151-168
    • Li, J.1    Cheung, W.2
  • 51
    • 84868498165 scopus 로고    scopus 로고
    • Jena
    • Jena, Jena Project Web Site (2010). http://www.openjena.org/.
    • (2010) Jena Project Web Site
  • 52
    • 84868444665 scopus 로고    scopus 로고
    • OpenSSO
    • OpenSSO, OpenSSO Project Web Site (2010). https://opensso.dev.java.net/.
    • (2010) OpenSSO Project Web Site


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.